Summary
In this chapter, you have gained an understanding of the security considerations when hosting data on-premises and off-premises. You learned how an enterprise will implement secure resource provisioning and deprovisioning, and the differences between type 1 and type 2 hypervisors. We then looked at containerization and learned how to choose an appropriate cloud deployment model. Then we learned the differences between the different cloud service models and gained an understanding of micro-segmentation and VPC peering, which will help us to select the correct storage model based on the storage technologies offered by cloud providers.
In this chapter, you have acquired the following skills:
- An understanding of how to implement data loss prevention
- An understanding of how to implement data loss detection
- An understanding of what is meant by data protection
- An understanding of how to implement secure cloud and virtualization solutions
- An understanding...