Summary
In this chapter, we focused on the various network services offered by AWS, Azure, and Google. This included virtual networking, DNS, VPN services, and Zero Trust services. In each section, we reviewed the best practices for configuration, authentication, authorization, monitoring, and auditing. Managing these services allows us to control who has access to them and to monitor their activity.
In the next chapter, we will review additional networking services (including distributed denial-of-service (DDoS) protection and web application firewall (WAF) services) and the best practices for configuring and securing them.