Summary
In this chapter, we learned how to securely maintain a VM, based on AWS, Azure, and GCP infrastructure.
In each section, we reviewed how to manage identity management (IdM) (for authentication and authorization), how to control network access (from access controls to network encryption), how to conduct patch management, and finally, how to configure backup for DR.
In the next chapter, we will review compute services in the cloud, with a focus on containers and Kubernetes.