Chapter 6: Monitoring and Auditing Your Cloud Environments
In chapters 2–5, we covered the fundamental building blocks of cloud services (from compute, storage, and networking services to identity and access management services).
Following previous chapters where we reviewed various network security-related services, the following diagram demonstrates traffic flow from external customers, through security controls (Distributed Denial of Service (DDoS) protection, Web Application Firewall (WAF), and access control lists such as AWS NACL and security groups), till the customer reaches a resource:
Important Note
AWS, Azure, and Google Cloud Platform (GCP) have similar capabilities to control traffic flow and audit events.
All services and security controls send their audit logs to a central audit service for alerts and further analysis.
This chapter will cover various concepts of monitoring and auditing...