Summary
We have discussed the what and why of hybrid cloud security in these first two chapters. Now, we need to know the difficult part of how to achieve hybrid cloud security. That is what the remaining chapters of this book will focus on.
In the next chapter, we will learn about the IAM domain further and the patterns to implement authentication, access control, and auditing for the cloud.