Book Image

Simplifying Hybrid Cloud Adoption with AWS

By : Frankie Costa Negro
Book Image

Simplifying Hybrid Cloud Adoption with AWS

By: Frankie Costa Negro

Overview of this book

The hybrid edge specialty is often misunderstood because it began with an on-premises-focused view encompassing everything not running inside the traditional data center. If you too have workloads that need to live on premises and need a solution to bridge the gap between both worlds, this book will show you how AWS Outposts allows workloads to leverage the benefits of the cloud running on top of AWS technology. In this book, you’ll learn what the Edge space is, the capabilities to look for when selecting a solution to operate in this realm, and how AWS Outposts delivers. The use cases for Outposts are thoroughly explained and the physical characteristics are detailed alongside the service logical constructs and facility requirements. You’ll gain a comprehensive understanding of the sales process—from order placement to rack delivery to your location. As you advance, you’ll explore how AWS Outposts works in real life with step-by-step examples using AWS CLI and AWS Console before concluding your journey with an extensive overview of security and business continuity for maximizing the value delivered by the product. By the end of this book, you’ll be able to create compelling hybrid architectures, solve complex use cases for hybrid scenarios, and get ready for your way forward with the help of expert guidance.
Table of Contents (14 chapters)
Part 1: Understanding AWS Outposts – What It Is, Its Components, and How It Works
Part 2: Security, Monitoring, and Maintenance
Part 3: Maintenance, Architecture References, and Additional Information


In this chapter, we have covered most security aspects pertaining to Outposts. You can never have enough information in regard to security; the topic is so vast and complex. I encourage people to specialize in security. It is frequently a neglected area of knowledge because, well, when you ask people about it, the most common answer is, “I think we are secure.”

The intention here was not to make you a CISO, but to enable you to be an authoritative reference and act as an advisor in regard to embedding security practices and principles when selecting, implementing, and operating your Outposts. If we have succeeded at this, your response would probably be, “I know how secure we are and the risks we assumed.”

You should now know how to implement security for your data, your entities, and your facilities. You know how to design resilient services and apps running on Outposts and how to handle inquiries about compliance and certifications awarded...