Translating security requirements into technical capabilities
Now that we understand the security posture, Defense-in-depth, and shared responsibility as we begin to architect cybersecurity for the cloud, we will discuss the makeup of a security operations team and the levels of a cybersecurity attack.
In Chapter 1, Cybersecurity in the Cloud, the concept of building a defense-in-depth security strategy was discussed. In this section, we will take each of those defense-in-depth requirements and align them with some security products, services, and processes.
Figure 2.3 shows the defense-in-depth strategy:
Figure 2.3 – Defense-in-depth security diagram
Each of these layers can be protected with controls that a cybersecurity architect should address in the design.
Physical
The physical level of defense includes the actual hardware technology and spans the entire data center facility. In a cloud infrastructure, the cloud provider, such...