Summary
In the first chapter of this book, we learned the definition of a cloud, the different cloud deployment models, and the different cloud service models.
We also learned what the shared cloud responsibility model is, and how AWS, Azure, and GCP look at this concept from their own point of view.
Lastly, we had a short introduction to the AWS, Azure, and GCP built-in command-line tools, and, during the next chapters, I will provide you with examples of how to implement various tasks using the command-line tools.
This introduction will be referred to in the following chapters, where we will dive deeper into the best practices for securing cloud services using (in most cases) the cloud providers' built-in capabilities.
Securing cloud environments can be challenging, depending on your previous knowledge in IT or information security or cloud services in general.
Reading this book will assist you in gaining the necessary knowledge of how to secure cloud environments, regardless of your role in the organization or your previous experience.
In the next chapter, we will review the various compute services in the cloud (including virtual machines, managed databases, container services, and finally serverless services).