Summary
In this chapter, we have focused on the various monitoring/auditing, threat management, and incident response services in AWS, Azure, and GCP.
We learned how to enable auditing in our cloud environments. We also learned how to use built-in security services to monitor compliance by gathering information from multiple event sources. We reviewed the built-in services that enable us to detect and respond to threats in large-scale environments.
In this chapter, we have also reviewed the steps to conduct incident response by using built-in services (including preparation, detection, response, and finally recovery to normal actions).
In the next chapter, we will review cryptography in various aspects (encryption fundamentals, differences between symmetric and asymmetric algorithms, key management services, secrets management, and encryption at transit and at rest).