Table of Contents
- Fundamentals of Cloud Security
- Defense-In-Depth Based Approach
- Designing Defensive Network Infrastructure
- Server Hardening is vital
- Cryptography & Data Security
- Automation is Key to Security
- Vulnerability Assessment, Pentest & Patch Management
- Security Logging & Monitoring
- First Responder
- Best Practices

