Book Image

Simplifying Hybrid Cloud Adoption with AWS

By : Frankie Costa Negro
Book Image

Simplifying Hybrid Cloud Adoption with AWS

By: Frankie Costa Negro

Overview of this book

The hybrid edge specialty is often misunderstood because it began with an on-premises-focused view encompassing everything not running inside the traditional data center. If you too have workloads that need to live on premises and need a solution to bridge the gap between both worlds, this book will show you how AWS Outposts allows workloads to leverage the benefits of the cloud running on top of AWS technology. In this book, you’ll learn what the Edge space is, the capabilities to look for when selecting a solution to operate in this realm, and how AWS Outposts delivers. The use cases for Outposts are thoroughly explained and the physical characteristics are detailed alongside the service logical constructs and facility requirements. You’ll gain a comprehensive understanding of the sales process—from order placement to rack delivery to your location. As you advance, you’ll explore how AWS Outposts works in real life with step-by-step examples using AWS CLI and AWS Console before concluding your journey with an extensive overview of security and business continuity for maximizing the value delivered by the product. By the end of this book, you’ll be able to create compelling hybrid architectures, solve complex use cases for hybrid scenarios, and get ready for your way forward with the help of expert guidance.
Table of Contents (14 chapters)
1
Part 1: Understanding AWS Outposts – What It Is, Its Components, and How It Works
5
Part 2: Security, Monitoring, and Maintenance
9
Part 3: Maintenance, Architecture References, and Additional Information

Data protection

We had a lot of fun putting AWS Outposts to work, checking configurations, creating a network design from scratch, and launching instances. While this is great, we must remember that security is said at AWS to be job zero, so important that we have dedicated an entire chapter to discussing Outposts’ capabilities and security features.

As you would have learned to expect by now, AWS uses the same services and principles used in the Region to secure data stored in Outposts. Data must be secured in transit and at rest and data deleted must be completely non-recoverable. AWS is designed to meet the most stringent data compliance requirements with comprehensive capabilities complemented by AWS services available in the Region.

When it comes to security, one thing that customers must always remember is that no mechanism or system in the world will be able to protect you from a poorly designed and maintained authentication, authorization, and accounting (AAA)...