Securing hybrid cloud operations
So far in this chapter, we have looked at best practices to prevent access to unauthorized data in our hybrid cloud architecture. Since the hybrid cloud architecture is dispersed across different infrastructures, operations become very challenging. Beyond application data, a lot of systems data is also generated by our hybrid cloud infrastructure and platform. Besides securing that data using IAM best practices, there are other responsibilities for us to be aware of (some of which we listed earlier) as part of security around operations.
Tasks as part of building and deploying secure infrastructure and applications include the following:
- Automate creation, hardening, and maintenance of base VM images (nodes) and base container images (applications)
- Automate security scanning for common vulnerabilities and exposure through CI/CD as part of the DevSecOps life cycle
- Automate the detection of potentially dangerous behavior at runtime ...