Summary
In this chapter, we learned how to isolate network traffic based on the purpose and target environments. We also learned how to establish secure connectivity in hybrid multi-cloud environments. Finally, we looked at the patterns to implement network protection for cloud workloads. The critical observation is how things are changing from a perimeter-based to a zero-trust-based model for network security.
In the next chapter, we will learn about data security patterns.