Security Architecture for Hybrid Cloud

Security Architecture for Hybrid Cloud
Author :
Publisher : "O'Reilly Media, Inc."
Total Pages : 477
Release :
ISBN-10 : 9781098157746
ISBN-13 : 1098157745
Rating : 4/5 (46 Downloads)

Book Synopsis Security Architecture for Hybrid Cloud by : Mark Buckwell

Download or read book Security Architecture for Hybrid Cloud written by Mark Buckwell and published by "O'Reilly Media, Inc.". This book was released on 2024-07-25 with total page 477 pages. Available in PDF, EPUB and Kindle. Book excerpt: As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection. This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures. Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine: The importance of developing a solution architecture that integrates security for clear communication Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts How security solution architecture is related to design thinking, enterprise security architecture, and engineering How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices How to apply architectural thinking to the development of new security solutions About the authors Mark Buckwell is a cloud security architect at IBM with 30 years of information security experience. Carsten Horst with more than 20 years of experience in Cybersecurity is a certified security architect and Associate Partner at IBM. Stefaan Van daele has 25 years experience in Cybersecurity and is a Level 3 certified security architect at IBM.


Security Architecture for Hybrid Cloud Related Books

Security Architecture for Hybrid Cloud
Language: en
Pages: 477
Authors: Mark Buckwell
Categories: Computers
Type: BOOK - Published: 2024-07-25 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles dem
Machine Learning Techniques and Analytics for Cloud Security
Language: en
Pages: 484
Authors: Rajdeep Chakraborty
Categories: Computers
Type: BOOK - Published: 2021-11-30 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

MACHINE LEARNING TECHNIQUES AND ANALYTICS FOR CLOUD SECURITY This book covers new methods, surveys, case studies, and policy with almost all machine learning te
Hybrid Cloud for Architects
Language: en
Pages: 279
Authors: Alok Shrivastwa
Categories: Computers
Type: BOOK - Published: 2018-02-23 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Build your own hybrid cloud strategy with this comprehensive learning guide. Key Features Build a hybrid cloud strategy for your organization with AWS and OpenS
Cyber Security
Language: en
Pages: 235
Authors: Wei Lu
Categories: Computers
Type: BOOK - Published: 2021-01-18 - Publisher: Springer Nature

DOWNLOAD EBOOK

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, i
Security Architecture for Hybrid Cloud
Language: en
Pages: 523
Authors: Mark Buckwell
Categories: Computers
Type: BOOK - Published: 2024-07-25 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles dem