Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Achieving Digital Transformation Using Hybrid Cloud

You're reading from   Achieving Digital Transformation Using Hybrid Cloud Design standardized next-generation applications for any infrastructure

Arrow left icon
Product type Paperback
Published in Jul 2023
Publisher Packt
ISBN-13 9781837633692
Length 234 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (3):
Arrow left icon
Praveen Rajagopalan Praveen Rajagopalan
Author Profile Icon Praveen Rajagopalan
Praveen Rajagopalan
Vikas G Vikas G
Author Profile Icon Vikas G
Vikas G
Ishu Verma Ishu Verma
Author Profile Icon Ishu Verma
Ishu Verma
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Part 1: Containers, Kubernetes, and DevOps for Hybrid Cloud
2. Chapter 1: Adopting the Right Strategy for Building a Hybrid Cloud FREE CHAPTER 3. Chapter 2: Dealing with VMs, Containers, and Kubernetes 4. Chapter 3: Provisioning Infrastructure with IaC 5. Chapter 4: Communicating across Kubernetes 6. Part 2: Design Patterns, DevOps, and GitOps
7. Chapter 5: Design Patterns for Telcos and Industrial Sectors 8. Chapter 6: Securing the Hybrid Cloud 9. Chapter 7: Hybrid Cloud Best Practices 10. Index 11. Other Books You May Enjoy

Summary

All layers in our application stack have data associated with them that necessitates a consideration of security. Responsibility for security lies with the enterprise or the cloud provider in differing proportions depending on the infrastructure footprint. Any architecture can be approved only after a detailed end-to-end security analysis.

Throughout this chapter, we focused on the different components of hybrid cloud across the entire application stack to understand the security implications of each layer from an architecture standpoint. To further understand the security aspects objectively, we looked at an example of an application that used a hybrid cloud architecture. This is just one of many architecture patterns that exist for hybrid cloud, but the fundamentals remain the same across other patterns.

The principles of security discussed weren’t something new, but are important for enterprises to acknowledge the danger associated with architectures that do...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image