Summary
In this chapter, we discussed how an application-centric approach to connectivity could increase application deployment velocity by orders of magnitude, thus enabling freedom of movement for applications, services, and software-based infrastructure. Furthermore, if this approach is implemented with a tool using declarative configuration and autonomous implementation, frictionless and reactive application component movement is possible in minutes instead of hours or days.
We covered security frameworks and paradigms that have recently emerged to handle zero-trust scenarios. These standards ensure that all connected components and systems are proactively identified and authorized for granular access.
We also covered the benefits of decoupling edge applications from the network underlay through an overlay abstraction. This allows application isolation from other network users and systems. Consider using approaches provided by application-centric multi-cloud networking connectivity...