6
Securing the Hybrid Cloud
In the previous chapter, we learned about how customers interested in a hybrid cloud architecture deploy solutions on a hybrid cloud and explored the design patterns in the context of operational excellence. In this chapter, we will go to the heart of all the design principles we have learned thus far and explore the application of security best practices. The fulcrum of any architecture design pattern is security. Particularly with hybrid cloud, security becomes increasingly more complex as it represents the culmination of security principles and practices from an array of different infrastructures, platforms, and application technologies.
It is especially important to understand the nuances of security principles ...
Get Achieving Digital Transformation Using Hybrid Cloud now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.