There is not a “one size fits all” model for architecting cloud security.
A great first step and best practice is to insert a control point between cloud workloads and the internet. Depending on your needs, you can use a centralized, distributed, or hybrid model.
Although the idea of centralized control and enforcement sounds great in principle, it’s not always the best approach. For example, centralized control with distributed (or local) enforcement may work better in many cases because it avoids sending traffic across trust boundaries to secure it. Some applications may also require more isolation for compliance reasons. Knowing which model is right for your multicloud environment requires understanding the benefits and drawbacks of each approach.