Security overview
Cloudbreak utilizes cloud provider security resources such as virtual networks, security groups, and identity and access management:
- Network isolation is achieved via user-configured virtual networks and subnets.
- Network security is achieved via out-of-the-box security group settings.
- Controlled use of cloud resources using IAM roles (AWS, GCP) or Active Directory (Azure).