Summary
In this chapter, we have focused on the various network services offered by AWS, Azure, and Google.
This has included virtual networking, DNS, CDN, VPN, DDoS protection, and WAF services.
In each section, we have reviewed the best practices for configuration, authentication, monitoring, and auditing.
Managing these services allows us to control who has access to them and to monitor their activity.
In the next chapter, we will review how to manage identities in the cloud (including directory services and cloud based SAML authentication) and how to enforce MFA.