HYBRID CLOUD SECURITY PATTERNS leverage modern repeatable architecture patterns to secure your workloads on the cloud

Book Cover
Average Rating
Published
[S.l.] : PACKT PUBLISHING LIMITED, 2022.
Status
Available Online

Description

Loading Description...

More Details

Format
Edition
1st edition.
Language
English
ISBN
9781803233970, 1803233974

Notes

Description
Understand unique security patterns related to identity and access management, infrastructure, data and workload protection, compliance and posture management, and zero trust for your hybrid cloud deployments Key Features Secure cloud infrastructure, applications, data, and shift left security to create DevSecOps Explore patterns for continuous security, automated threat detection and accelerated incident response Leverage hybrid cloud security patterns for protecting critical data using a zero trust model Purchase of the print or Kindle book includes a free eBook in the PDF format Book Description Security is a primary concern for enterprises going through digital transformation and accelerating their journey to multi-cloud environments. This book recommends a simple pattern-based approach to architecting, designing and implementing security for workloads deployed on AWS, Microsoft Azure, Google Cloud, and IBM Cloud. The book discusses enterprise modernization trends and related security opportunities and challenges. You'll understand how to implement identity and access management for your cloud resources and applications. Later chapters discuss patterns to protect cloud infrastructure (compute, storage and network) and provide protection for data at rest, in transit and in use. You'll also learn how to shift left and include security in the early stages of application development to adopt DevSecOps. The book also deep dives into threat monitoring, configuration and vulnerability management, and automated incident response. Finally, you'll discover patterns to implement security posture management backed with intelligence and automated protection to stay ahead of threats. By the end of this book, you'll have learned all the hybrid cloud security patterns and be able to use them to create zero trust architecture that provides continuous security and compliance for your cloud workloads. What you will learn Address hybrid cloud security challenges with a pattern-based approach Manage identity and access for users, services, and applications Use patterns for secure compute, network isolation, protection, and connectivity Protect data at rest, in transit and in use with data security patterns Understand how to shift left security for applications with DevSecOps Manage security posture centrally with CSPM Automate incident response with SOAR Use hybrid cloud security patterns to build a zero trust security model Who this book is for The book is for cloud solution architects, security professionals, cloud engineers, and DevOps engineers, providing prescriptive guidance on architecture and design patterns for protecting their data and securing applications deployed on hybrid cloud environments. Basic knowledge of different types of cloud providers, cloud deployment models, and cloud consumption models is expected.
Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition

Discover More

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Iyer, S. (2022). HYBRID CLOUD SECURITY PATTERNS: leverage modern repeatable architecture patterns to secure your workloads on the cloud (1st edition.). PACKT PUBLISHING LIMITED.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Iyer, Sreekanth. 2022. HYBRID CLOUD SECURITY PATTERNS: Leverage Modern Repeatable Architecture Patterns to Secure Your Workloads On the Cloud. [S.l.]: PACKT PUBLISHING LIMITED.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Iyer, Sreekanth. HYBRID CLOUD SECURITY PATTERNS: Leverage Modern Repeatable Architecture Patterns to Secure Your Workloads On the Cloud [S.l.]: PACKT PUBLISHING LIMITED, 2022.

Harvard Citation (style guide)

Iyer, S. (2022). HYBRID CLOUD SECURITY PATTERNS: leverage modern repeatable architecture patterns to secure your workloads on the cloud. 1st edn. [S.l.]: PACKT PUBLISHING LIMITED.

MLA Citation, 9th Edition (style guide)

Iyer, Sreekanth. HYBRID CLOUD SECURITY PATTERNS: Leverage Modern Repeatable Architecture Patterns to Secure Your Workloads On the Cloud 1st edition., PACKT PUBLISHING LIMITED, 2022.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
2db54eb2-f9f5-f9c1-11de-f5994f6834c2-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work ID2db54eb2-f9f5-f9c1-11de-f5994f6834c2-eng
Full titlehybrid cloud security patterns leverage modern repeatable architecture patterns to secure your workloads on the cloud
Authoriyer sreekanth
Grouping Categorybook
Last Update2025-01-24 12:33:29PM
Last Indexed2025-02-07 03:06:45AM

Book Cover Information

Image Sourcedefault
First LoadedMar 18, 2023
Last UsedJan 22, 2025

Marc Record

First DetectedMar 14, 2023 08:42:23 AM
Last File Modification TimeDec 17, 2024 08:23:23 AM
SuppressedRecord had no items

MARC Record

LEADER07945cam a22005537a 4500
001on1350415654
003OCoLC
00520241217082051.0
006m     o  d        
007cr |n|||||||||
008221109s2022    xx      o     000 0 eng d
015 |a GBC2J0259|2 bnb
0167 |a 020787742|2 Uk
019 |a 1350422298|a 1350425972|a 1350426413|a 1350427597|a 1350439572
020 |a 9781803233970|q (electronic bk.)
020 |a 1803233974|q (electronic bk.)
035 |a (OCoLC)1350415654|z (OCoLC)1350422298|z (OCoLC)1350425972|z (OCoLC)1350426413|z (OCoLC)1350427597|z (OCoLC)1350439572
037 |a 9781803233970|b Packt Publishing Pvt. Ltd
037 |a 9781803233581|b O'Reilly Media
037 |a 10162854|b IEEE
040 |a YDX|b eng|c YDX|d UKMGB|d ORMDA|d UKAHL|d EBLCP|d OCLCQ|d UPM|d OCLCQ|d IEEEE|d OCLCO|d OCLCF|d OCLCO|d DEGRU
049 |a MAIN
050 4|a QA76.585
08204|a 004.67/82|2 23/eng/20221129
1001 |a Iyer, Sreekanth,|e author.
24510|a HYBRID CLOUD SECURITY PATTERNS|h [electronic resource] :|b leverage modern repeatable architecture patterns to secure your workloads on the cloud /|c Sreekanth Iyer.
250 |a 1st edition.
260 |a [S.l.] :|b PACKT PUBLISHING LIMITED,|c 2022.
300 |a 1 online resource
336 |a text|2 rdacontent
337 |a computer|2 rdamedia
338 |a online resource|2 rdacarrier
5050 |a Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Cloud Security -- Chapter 1: Opportunities and Challenges with Hybrid Multi-cloud Solutions -- The evolution of the cloud -- Defining cloud computing -- Cloud personas -- Cloud deployment models -- Cloud delivery models -- From cloud to hybrid multi-cloud -- Digitization trends -- Application modernization -- Data modernization and the emergence of data fabric -- Integration, coexistence, and interoperability -- Event hubs and intelligent workflows
5058 |a Coexistence and interoperability -- DevOps -- Optimization of operations -- Leveraging observability for a better customer experience -- Automation, automation, automation -- Building pipeline of pipelines for hybrid multi-cloud -- Security for the digital hybrid multi-cloud era -- App modernization and security -- Data security -- Security for integration, coexistence, and interoperability -- Shift left security -- from DevOps to DevSecOps -- Configuration management -- Security Orchestration, Automation, and Response -- Integrated security and continuous compliance
5058 |a Zero-trust architecture and security models -- Summary -- Chapter 2: Understanding Shared Responsibility Model for Cloud Security -- A strategic approach to cloud security -- A shared responsibility model -- Cloud security domains -- A pattern-based approach to address hybrid cloud security -- Summary -- Part 2: Identity and Access Management Patterns -- Chapter 3: Cloud Identity and Access Management -- User management patterns -- Registration pattern -- Identity federation pattern -- Cloud identity pattern -- User group management patterns -- Service accounts -- User de-provisioning
5058 |a Authentication patterns -- Logging in with user ID and credentials -- Application access key or API key -- SSH keys -- SSO -- Multi-factor authentication -- Single logout -- Physical authentication pattern -- Authorization patterns -- Access control pattern -- Governance and administration patterns -- Identity governance and administration pattern -- Related patterns -- Summary -- Chapter 4: Implementing Identity and Access Management for Cloud Applications -- Authentication pattern for cloud application users -- Problem -- Context -- Solution -- Known uses -- Service-to-service authentication
5058 |a Problem -- Context -- Solution -- Known uses -- Cloud application authorization patterns -- Problem -- Context -- Solution -- Known uses -- Summary -- References -- Part 3: Infrastructure Security Patterns -- Chapter 5: How to Secure Compute Infrastructure -- Securing physical (bare-metal) servers -- Problem -- Context -- Solution -- Known uses -- Trusted compute patterns -- Problem -- Context -- Solution -- Known uses -- Securing hypervisors -- Problem -- Context -- Solution -- Known uses -- Protecting VMs -- Problem -- Context -- Solution -- Known uses -- Securing containers -- Problem
520 |a Understand unique security patterns related to identity and access management, infrastructure, data and workload protection, compliance and posture management, and zero trust for your hybrid cloud deployments Key Features Secure cloud infrastructure, applications, data, and shift left security to create DevSecOps Explore patterns for continuous security, automated threat detection and accelerated incident response Leverage hybrid cloud security patterns for protecting critical data using a zero trust model Purchase of the print or Kindle book includes a free eBook in the PDF format Book Description Security is a primary concern for enterprises going through digital transformation and accelerating their journey to multi-cloud environments. This book recommends a simple pattern-based approach to architecting, designing and implementing security for workloads deployed on AWS, Microsoft Azure, Google Cloud, and IBM Cloud. The book discusses enterprise modernization trends and related security opportunities and challenges. You'll understand how to implement identity and access management for your cloud resources and applications. Later chapters discuss patterns to protect cloud infrastructure (compute, storage and network) and provide protection for data at rest, in transit and in use. You'll also learn how to shift left and include security in the early stages of application development to adopt DevSecOps. The book also deep dives into threat monitoring, configuration and vulnerability management, and automated incident response. Finally, you'll discover patterns to implement security posture management backed with intelligence and automated protection to stay ahead of threats. By the end of this book, you'll have learned all the hybrid cloud security patterns and be able to use them to create zero trust architecture that provides continuous security and compliance for your cloud workloads. What you will learn Address hybrid cloud security challenges with a pattern-based approach Manage identity and access for users, services, and applications Use patterns for secure compute, network isolation, protection, and connectivity Protect data at rest, in transit and in use with data security patterns Understand how to shift left security for applications with DevSecOps Manage security posture centrally with CSPM Automate incident response with SOAR Use hybrid cloud security patterns to build a zero trust security model Who this book is for The book is for cloud solution architects, security professionals, cloud engineers, and DevOps engineers, providing prescriptive guidance on architecture and design patterns for protecting their data and securing applications deployed on hybrid cloud environments. Basic knowledge of different types of cloud providers, cloud deployment models, and cloud consumption models is expected.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Cloud computing|x Security measures.
77608|i Print version:|z 9781803233970
77608|i Print version:|z 1803233583|z 9781803233581|w (OCoLC)1348139077
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781803233581/?ar|x O'Reilly|z eBook
938 |a De Gruyter|b DEGR|n 9781803233970
938 |a Askews and Holts Library Services|b ASKH|n AH40866214
938 |a YBP Library Services|b YANK|n 303232534
938 |a ProQuest Ebook Central|b EBLB|n EBL30208346
994 |a 92|b VIA
999 |c 282401|d 282401