Summary
In this chapter, you learned how to design a Google Cloud solution for security and compliance from the ground up. You learned how to apply modern and cloud-based concepts to your security model, such as DevSecOps practices and policy constraints. You then learned how to protect users' identities and access to cloud resources with authorization, authentication, and IAM strategies.
From that foundational level of security, you learned to build a secure infrastructure that protects your networks and your data with access control and encryption, as well as best practices to keep your keys and secrets well protected. Finally, you learned about the security monitoring and operations ecosystem in Google Cloud with Security Command Center and integration options for SIEM products. With all that you've learned in this chapter, you should now be able to confidently take measures to improve the security posture of your organization.
Next, you will start learning design...