Skip to Content
Security Architecture for Hybrid Cloud
book

Security Architecture for Hybrid Cloud

by Mark Buckwell, Stefaan Van daele, Carsten Horst
July 2024
Intermediate to advanced
476 pages
12h 37m
English
O'Reilly Media, Inc.
Audio summary available

Overview

As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection.

This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures.

Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine:

  • The importance of developing a solution architecture that integrates security for clear communication
  • Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts
  • How security solution architecture is related to design thinking, enterprise security architecture, and engineering
  • How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices
  • How to apply architectural thinking to the development of new security solutions

About the authors

Mark Buckwell is a cloud security architect at IBM with 30 years of information security experience.

Carsten Horst with more than 20 years of experience in Cybersecurity is a certified security architect and Associate Partner at IBM.

Stefaan Van daele has 25 years experience in Cybersecurity and is a Level 3 certified security architect at IBM.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Security Architecture

Security Architecture

Jeremy Green
Cloud Application Architecture Patterns

Cloud Application Architecture Patterns

Kyle Brown, Bobby Woolf, Joseph Yoder
Networking and Kubernetes

Networking and Kubernetes

James Strong, Vallery Lancey

Publisher Resources

ISBN: 9781098157760Errata Page