Different components of security in the hybrid cloud
The following diagram shows the various components of security across hybrid cloud infrastructure:
Figure 6.3 – Components of security in hybrid cloud infrastructure
Security must be applied across the entire stack of the application, from the infrastructure and platform to the end-user application itself. Applying this to the hybrid cloud architecture, this stack could be spread across a public cloud, a private cloud, and on-prem infrastructure, and could even be extended further to edge networks and edge devices. The term edge network refers to a local area network that connects to the internet and interfaces with public/private clouds or on-prem systems. With the advent of smart devices as part of the IoT, along with more powerful mobile devices, the scope of systems of record and systems of engagement has been significantly expanded. These are some examples of edge devices that could be part...