Security vulnerabilities are a fact of life in the cloud world. We have examined a number of practices and patterns for ensuring the integrity and confidentiality of your services. Our discussion focused on defending your assets while they are at rest or on the wire. By reducing exposure to intrusion by establishing our perimeter, we can move on to delivering new features while lessening risk.
The next chapter mainly covers some of the practices that you can use to provide a continuous deployment pipeline.