Best practices of cloud network security include the protection of data, applications, and infrastructure in the cloud. Here are some of the key strategies used:
- 
Apply Strong Authentication: Implement multi-factor authentication for better access control. 
- 
Ensure data is at rest and in transit as it relates to sensitive information and is encrypted. 
- 
Set up Firewalls and VPNs: Cloud firewalls and virtual private networks should be used to protect your infrastructure from threats outside your setup. 
- 
Access Control Policies: Least privilege concept (PoLP), where least privilege is the granting of least privileges to limit access to only essential resources. 
- 
Continuous Monitoring: Continual monitoring and auditing of network traffic for threat detection and real-time response 
Example: AWS implements network security using tools such as Security Groups, Network ACLs, and AWS WAF.