Summary

This chapter was all about automation, the automation process, and the tools, needs, and benefits of cloud automation. In the next chapter, we will have a look at Identity and Access Management in the cloud.

Get Cloud Security Automation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.