Chapter 2
Security
Introduction
In a world where cyberattacks are escalating in both frequency and sophistication, security should be top of mind for every IT organization. The increasing complexity of applications and their supporting infrastructures, whether on premises or in the public cloud, only compounds the concerns surrounding IT security. Organizations must ensure that security is not an afterthought or a bolt-on to any given process or service but rather baked into their foundations from the beginning. Security is paramount in the design, development, integration, and testing of the Intersight platform. Intersight users can rest assured knowing that Intersight complies with the Cisco Secure Development Lifecycle guidelines (http://cs.co/9009HkkPd ...
Get Cisco Intersight: A Handbook for Intelligent Cloud Operations now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.