Summary
In this chapter, we covered a lot of useful information to help you better understand all the aspects related to a secure cloud implementation.
We learned about the different types of cloud and their associated security and we also saw how to secure Kubernetes. We finished by showing you some basics about database security and all the different tools available to assess the security of your cloud (before the bad guys do).
But we are not done yet. In the next chapter, we are going even deeper into this topic by learning how to master the implementation of security using web apps.