Summary
In this chapter, you learned about some fundamental security concepts that are relevant to securing confidentiality, integrity, and availability of cloud resources. You also reviewed the five most common threats to cloud deployments that many cloud service providers and cloud customers face every day. This chapter also dealt with the most common control categories, types, and control functionalities many organizations use to secure information assets. In the next chapter, you will focus on service model security considerations for Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Security as a Service (SaaS).