Configuring security within a hybrid cloud environment
Hybrid cloud security configuration involves multiple components across the entire application stack. Let’s now go a level deeper into what it actually means to configure security within a hybrid cloud environment. It is again important to reiterate the fact that security is always a shared responsibility, and so we will highlight who is responsible for the security of a given component when relevant.
Configuring identity
Identity spans all components of security. We mentioned previously the concept of zero trust and the extension of trust boundaries across multiple systems. Hence, it’s important for all components to always present an identity. Identity impacts many personas (user roles such as developers, sys admins, etc.) in the world of hybrid cloud and it’s important to apply the security principles consistently and appropriately across all the entities while delivering access, services, and data...