Chapter 8: Augmenting Security and Registering for Support
It’s hard to believe, but we’re down to our last two foundational layers: security and support. In a way, holding off on getting your support package in place until you are close to going live with production systems makes a bit of sense, but security? Zero trust security is something you have to do in layers, and that’s why we’ve been securing our foundation one step at a time since Chapter 2, IAM, Users, Groups, and Admin Access. I mean, the first thing we did was to set up our identity provider. Then, we configured the users and groups, got some administrative access in place, figured out who was paying for everything and who could control billing, set up our initial resource hierarchy, configured user access, built our initial network, and set up some logging and monitoring. Think about all the security that we have in place already.
In this final chapter, our goal is to review elements of...