Chapter 14. Cloud Infrastructure
Think about the last time you saved a picture on your phone, worked on a document on your MacBook, or pushed code to GitHub. When you did these things, your data zipped off into a vast, interconnected network of servers and storage systems that we collectively call “the cloud.” That term is used everywhere today, but what is it, exactly?
In essence, the cloud refers to a global network of remote servers that are hosted on the internet rather than on a local device or personal computer. These servers are designed to store, manage, and process data, providing you and your business with a wide range of services and applications accessible from anywhere with a stable internet connection.
The cloud has revolutionized the way we store, access, and share information, providing benefits like scalability, flexibility, and cost efficiency. Major tech companies such as Google, Microsoft, and Amazon have become leading providers, offering a wide array of storage, compute, and application development solutions.
As more and more data is stored in the cloud, ensuring that all the ways we use the cloud are secure has become more important than ever. Cloud security involves implementing technical controls and policies to protect everything from data to applications to infrastructure. It’s not dissimilar to a castle defense with multiple layers of security.
In this chapter, we’ll briefly explore the different types of cloud services and the unique security considerations ...
Get Defensive Security Handbook, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.