Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Multi-Cloud Architecture and Governance

You're reading from   Multi-Cloud Architecture and Governance Leverage Azure, AWS, GCP, and VMware vSphere to build effective multi-cloud solutions

Arrow left icon
Product type Paperback
Published in Dec 2020
Publisher Packt
ISBN-13 9781800203198
Length 412 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Jeroen Mulder Jeroen Mulder
Author Profile Icon Jeroen Mulder
Jeroen Mulder
Jeroen Mulder Jeroen Mulder
Author Profile Icon Jeroen Mulder
Jeroen Mulder
Arrow right icon
View More author details
Toc

Table of Contents (28) Chapters Close

Preface 1. Section 1 – Introduction to Architecture and Governance for Multi-Cloud Environments
2. Chapter 1: Introduction to Multi-Cloud FREE CHAPTER 3. Chapter 2: Business Acceleration Using a Multi-Cloud Strategy 4. Chapter 3: Getting Connected – Designing Connectivity 5. Chapter 4: Service Designs for Multi-Cloud 6. Chapter 5: Managing the Enterprise Cloud Architecture 7. Section 2 – Getting the Basics Right with BaseOps
8. Chapter 6: Designing, Implementing, and Managing the Landing Zone 9. Chapter 7: Designing Resilience and Performance 10. Chapter 8: Defining Automation Tools and Processes 11. Chapter 9: Defining and Using Monitoring and Management Tools 12. Section 3 – Cost Control in Multi-Cloud with FinOps
13. Chapter 10: Managing Licenses 14. Chapter 11: Defining Principles for Resource Provisioning and Consumption 15. Chapter 12: Defining Naming Conventions and Tagging 16. Chapter 13: Validating and Managing Bills 17. Section 4 – Security Control in Multi-Cloud with SecOps
18. Chapter 14: Defining Security Policies 19. Chapter 15: Implementing Identity and Access Management 20. Chapter 16: Defining Security Policies for Data 21. Chapter 17: Implementing and Integrating Security Monitoring 22. Section 5 – Structured Development on Multi-Cloud Environments with DevOps
23. Chapter 18: Designing and Implementing CI/CD Pipelines 24. Chapter 19: Introducing AIOps in Multi-Cloud 25. Chapter 20: Introducing Site Reliability Engineering in Multi-Cloud 26. Assessments 27. Other Books You May Enjoy

Understanding data encryption

One of the first, if not the first, encryption devices to be created was the Enigma machine. It was invented in the 1920s and was mostly known for its usage in World War II to encrypt messages. The British scientist Alan Turing and his team managed to crack the encryption code after 6 months of hard work.

The encryption that Enigma used in those days was very advanced. The principle is still the same – we translate data into something that can't be read without knowing how the data was translated. To be able to read the data, we need a way to decipher or decrypt the data. There are two ways to encrypt data – asymmetric, or public key, and symmetric. In the next section, we will briefly explain these encryption technologies, before diving into the services that the leading cloud providers offer in terms of securing data.

Encryption uses an encryption algorithm and an encryption key – symmetric or asymmetric. With symmetric...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at R$50/month. Cancel anytime