Book Image

The Cloud Adoption Playbook

By : Moe Abdula, Ingo Averdunk, Roland Barcia, Kyle Brown, Ndu Emuchay
Book Image

The Cloud Adoption Playbook

By: Moe Abdula, Ingo Averdunk, Roland Barcia, Kyle Brown, Ndu Emuchay

Overview of this book

As cloud technologies continue to challenge the fundamental understanding of how businesses work, smart companies are moving quickly to adapt to a changing set of rules. Adopting the cloud requires a clear roadmap backed by use cases, grounded in practical real-world experience, to show the routes to successful adoption. The Cloud Adoption Playbook helps business and technology leaders in enterprise organizations sort through the options and make the best choices for accelerating cloud adoption and digital transformation. Written by a team of IBM technical executives with a wealth of real-world client experience, this book cuts through the hype, answers your questions, and helps you tailor your cloud adoption and digital transformation journey to the needs of your organization.
Table of Contents (17 chapters)
Free Chapter
Title Page
End User License Agreement

How Do I Protect Against Networking Vulnerabilities?

In the shared-responsibility cloud model, the cloud provider handles underlying network management, including network cabling and network device management (physical routers and switches).

The cloud provider’s infrastructure provides basic, customer-level network isolation through individual virtual local-area networks (VLANs). From there, the cloud service provider typically gives the cloud consumer the ability to further isolate networks or systems from one another. You can further isolate your network traffic based on purpose (such as development/testing and production environments) and data sensitivity (such as regulated data versus public data).

Cloud-hosted firewalls

Purpose-built network security devices typically reside at the edge, or ingress/egress points, of a workload. These devices may include cloud-provider-ordered physical devices such as dedicated firewalls and virtual appliances such as gateway routers.