Summary
In this chapter, we focused on FaaS in AWS, Azure, and GCP.
In each section, we reviewed how to manage access (for authentication and authorization), how to control network access (from access controls to network encryption), how to configure auditing and logging, and finally, how to configure compliance (for services that support those capabilities).
In the next chapter, we will review storage services in the cloud.