HYBRID CLOUD SECURITY PATTERNS leverage modern repeatable architecture patterns to secure your workloads on the cloud /
Understand unique security patterns related to identity and access management, infrastructure, data and workload protection, compliance and posture management, and zero trust for your hybrid cloud deployments Key Features Secure cloud infrastructure, applications, data, and shift left security to cr...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[S.l.] :
PACKT PUBLISHING LIMITED,
2022.
|
Edición: | 1st edition. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Foreword
- Contributors
- Table of Contents
- Preface
- Part 1: Introduction to Cloud Security
- Chapter 1: Opportunities and Challenges with Hybrid Multi-cloud Solutions
- The evolution of the cloud
- Defining cloud computing
- Cloud personas
- Cloud deployment models
- Cloud delivery models
- From cloud to hybrid multi-cloud
- Digitization trends
- Application modernization
- Data modernization and the emergence of data fabric
- Integration, coexistence, and interoperability
- Event hubs and intelligent workflows
- Coexistence and interoperability
- DevOps
- Optimization of operations
- Leveraging observability for a better customer experience
- Automation, automation, automation
- Building pipeline of pipelines for hybrid multi-cloud
- Security for the digital hybrid multi-cloud era
- App modernization and security
- Data security
- Security for integration, coexistence, and interoperability
- Shift left security
- from DevOps to DevSecOps
- Configuration management
- Security Orchestration, Automation, and Response
- Integrated security and continuous compliance
- Zero-trust architecture and security models
- Summary
- Chapter 2: Understanding Shared Responsibility Model for Cloud Security
- A strategic approach to cloud security
- A shared responsibility model
- Cloud security domains
- A pattern-based approach to address hybrid cloud security
- Summary
- Part 2: Identity and Access Management Patterns
- Chapter 3: Cloud Identity and Access Management
- User management patterns
- Registration pattern
- Identity federation pattern
- Cloud identity pattern
- User group management patterns
- Service accounts
- User de-provisioning
- Authentication patterns
- Logging in with user ID and credentials
- Application access key or API key
- SSH keys
- SSO
- Multi-factor authentication
- Single logout
- Physical authentication pattern
- Authorization patterns
- Access control pattern
- Governance and administration patterns
- Identity governance and administration pattern
- Related patterns
- Summary
- Chapter 4: Implementing Identity and Access Management for Cloud Applications
- Authentication pattern for cloud application users
- Problem
- Context
- Solution
- Known uses
- Service-to-service authentication
- Problem
- Context
- Solution
- Known uses
- Cloud application authorization patterns
- Problem
- Context
- Solution
- Known uses
- Summary
- References
- Part 3: Infrastructure Security Patterns
- Chapter 5: How to Secure Compute Infrastructure
- Securing physical (bare-metal) servers
- Problem
- Context
- Solution
- Known uses
- Trusted compute patterns
- Problem
- Context
- Solution
- Known uses
- Securing hypervisors
- Problem
- Context
- Solution
- Known uses
- Protecting VMs
- Problem
- Context
- Solution
- Known uses
- Securing containers
- Problem