Summary
In this chapter, we have covered most security aspects pertaining to Outposts. You can never have enough information in regard to security; the topic is so vast and complex. I encourage people to specialize in security. It is frequently a neglected area of knowledge because, well, when you ask people about it, the most common answer is, “I think we are secure.”
The intention here was not to make you a CISO, but to enable you to be an authoritative reference and act as an advisor in regard to embedding security practices and principles when selecting, implementing, and operating your Outposts. If we have succeeded at this, your response would probably be, “I know how secure we are and the risks we assumed.”
You should now know how to implement security for your data, your entities, and your facilities. You know how to design resilient services and apps running on Outposts and how to handle inquiries about compliance and certifications awarded...