Summary
In this chapter, we focused on the various IAM services in AWS, Azure, and GCP.
We discussed everything from managed Active Directory services to modern IAM services, and, finally, we provided recommendations regarding how to use MFA for extra protection of your identities.
In each section, we reviewed best practices for configuration, account management, monitoring, and auditing.
IdM services allow us to control access to resources and services in our cloud environment. They provide least privilege access to resources and monitor what actions were performed using identities in our cloud environments.
In the next chapter, we will review how to conduct security monitoring and auditing in the cloud (from audit trails and threat detection to digital forensics in the cloud).