Summary
In this chapter, we learned about how to use the CSPM pattern to create a security and compliance dashboard. The dashboard is powered by threat monitoring and intelligence components that need to continuously ingest and monitor events and activities across all clouds and on-premises resources. Threat intelligence can be used to narrow down the huge volume of data to create actionable insights. Responding to events in time is equally important as detecting threats. Security automation and incident response patterns help provide an automated response to threats and vulnerabilities and accelerate incident response.
In the next chapter, we will learn how to put together all the patterns that we have discussed so far to build security solutions in a zero-trust model.