Mallory Mooney introduces the five-part cloud security series that covers protecting an organization's network perimeter, endpoints, application code, sensitive data, and service and user accounts from threats. Cloud-native infrastructure has become the standard for deploying applications that are performant and readily available to a globally distributed user base, but this rapid migration also makes cloud resources a primary target for security threats. Organizations are prioritizing efforts to secure their data, applications, and infrastructure from digital attacks, focusing on implementing controls that protect all cloud-based resources. However, cloud environments often include resources not managed by the organization, making it difficult to determine who is responsible for keeping these resources secure. To mitigate these risks, organizations rely on a shared responsibility model to manage expectations for securing cloud resources. The series will cover how organizations can create a manageable scope for cloud security in areas such as network boundaries, devices and services that access an organization's network, access management for all resources, application code, service and user data, and more. Part 1 of the series looks at the evolution of network perimeters in modern cloud environments and some best practices for securing them.