Summary
This chapter discussed how to design a strategy for securing SaaS, PaaS, and IaaS. This chapter showed you how to build a security baseline for each of these services and security requirements for containers, edge computing, application services, databases, and storage accounts within Azure.
The next chapter will discuss additional security requirements for applications, including prioritizing mitigating threats, standards for onboarding new applications, and security strategies for applications and APIs.