Summary
In this chapter, we have focused on container orchestrator services in AWS, Azure, and GCP.
In each section, we have reviewed how to manage identity management (for authentication and authorization), how to implement data protection (from access controls to networks and encryption), how to configure auditing and logging, and finally, how to implement industry best practices.
Next, we are going to see what the best practices are for securing common serverless/functions as a service from AWS, Azure, and GCP.