Summary
All layers in our application stack have data associated with them that necessitates a consideration of security. Responsibility for security lies with the enterprise or the cloud provider in differing proportions depending on the infrastructure footprint. Any architecture can be approved only after a detailed end-to-end security analysis.
Throughout this chapter, we focused on the different components of hybrid cloud across the entire application stack to understand the security implications of each layer from an architecture standpoint. To further understand the security aspects objectively, we looked at an example of an application that used a hybrid cloud architecture. This is just one of many architecture patterns that exist for hybrid cloud, but the fundamentals remain the same across other patterns.
The principles of security discussed weren’t something new, but are important for enterprises to acknowledge the danger associated with architectures that do...