Understanding the security pillar principles
Unlike other pillars, the security pillar principles can be applied to on-premises and cloud resources. The only difference is the alignment in the shared responsibility model we discussed in Figure 7.2; apart from that, the basic concepts are the same. The CIA triad is the foundation of the principles we are going to cover. Based on the principles, we can draw the following conclusions:
- They provide context for questions related to security. They allow us to determine the relevance or importance of specific aspects in relation to security.
- They also help establish the relationship between various aspects and security.
As described in the case of the other pillars that we’ve covered in previous chapters, the following principles should be used as lenses to assess the security of your workloads:
- Select resources and plan how to harden them: In the cloud, we have multiple services to host your application...