Summary
In this chapter, we've covered Google Cloud's suite of IAM services and how they can be used to create effective boundaries for access and ensure that individuals who need to stay out, stay out. Cloud IAM sits at the core of these services and does everything an IAM platform needs to do. However, with changing requirements such as remote working, developers may need to expand on their security capabilities. For this, we have new solutions and methods such as context-based conditions and BeyondCorp.
With this chapter, we've reached the end of the first part of this book. So far, we've learned about the various concepts and components involved in cloud-native infrastructure. We've also taken an in-depth look at the various services in the Google Cloud ecosystem and how we can use them together and leverage their strengths to create the app we want.
The upcoming chapters mark the start of the second part of this book, where we will begin creating...