Summary
In this chapter, we covered the last pillar of the WAF: security. We already covered other pillars such as cost optimization, operational excellence, performance efficiency, and reliability in the previous chapters. We started the chapter with an introduction to security and the relevance of security controls. Then we discussed the key areas and security resources. These are the core topics of this chapter; the later sections were mere expansions of the ideas covered in the key areas and security resources. After covering the key areas, we covered design areas such as governance, identity and access management, network security, data protection, and application and services. The last section in this chapter was about monitoring, where we covered a checklist for monitoring and reference architectures. Monitoring workload security can help administrators to irradicate attacks before they reach your data. Notifications and dashboards should be set up so that SOCs can identify...