November 2022
Intermediate to advanced
252 pages
6h 10m
English
Enterprises can take advantage of the variety of compute options that are now available in hybrid multi-cloud environments, namely: bare-metal servers, VMs, containers, and serverless, as well as specialized infrastructure to develop and run their software. This chapter provides the context to the type of attacks that can happen against different compute types of the modern hybrid cloud infrastructure and how to protect them. It is also important to know how to isolate network traffic based on purpose and establish secure connectivity across these compute environments. In this part, we will discuss the patterns on how to secure the hybrid cloud compute and network, which are the most essential components ...
Read now
Unlock full access