Summary
In this chapter, you have hopefully learned a thing or two about security. I also hope that you have figured out how to build your infrastructure in such a way that all of the access keys you use are secured.
In addition to this, you have also learned some methods (among hundreds of thousands) that can be used to help secure your infrastructure. You may have also gotten some insights into how you can use data to drive the response to incidents and also find better insight into certain incidents and their properties.
So, friends, I hope you enjoyed this chapter, which is all about security. I tried my best to explain a couple of concepts to you and I hope you found it interesting, at least. But now, it is time to flip the page and move on to the next chapter, where we will talk about one of my favorite topics: automation.