Securing the Hybrid Cloud
In the previous chapter, we learned about how customers interested in a hybrid cloud architecture deploy solutions on a hybrid cloud and explored the design patterns in the context of operational excellence. In this chapter, we will go to the heart of all the design principles we have learned thus far and explore the application of security best practices. The fulcrum of any architecture design pattern is security. Particularly with hybrid cloud, security becomes increasingly more complex as it represents the culmination of security principles and practices from an array of different infrastructures, platforms, and application technologies.
It is especially important to understand the nuances of security principles in the world of hybrid cloud as consistency becomes a key consideration. A robust architecture with flexibility helps address all the enterprise requirements and minimize any security risk, thereby efficiently protecting the data, applications...