Protection of data
In the previous section, we looked at the network layer to understand the best practices along the journey of a request from the end user to the application. We also looked at other layers of the application stack and made sure each component of the hybrid cloud infrastructure was secure against any attack or infiltration. In this section, we are going to look at how we can protect the data that exists in all the components of the architecture. As with all other components, responsibility for securing data is also shared.
In our hybrid cloud infrastructure, there are many kinds of data that we need to protect. When we refer to data security, it’s not about just protecting the application data. The data in our architecture can be of many types:
- Infrastructure and systems information
- Network logs
- Platform logs
- Monitoring and metrics information
- Application logs
- Application data
- Transactional data
- Archived data
- Analytical...