Book Image

Hybrid Cloud Infrastructure and Operations Explained

By : Mansura Habiba
Book Image

Hybrid Cloud Infrastructure and Operations Explained

By: Mansura Habiba

Overview of this book

Most organizations are now either moving to the cloud through modernization or building their apps in the cloud. Hybrid cloud is one of the best approaches for cloud migration and the modernization journey for any enterprise. This is why, along with coding skills, developers need to know the big picture of cloud footprint and be aware of the integration models between apps in a hybrid and multi-cloud infrastructure. This book represents an overview of your end-to-end journey to the cloud. To be future agnostic, the journey starts with a hybrid cloud. You'll gain an overall understanding of how to approach migration to the cloud using hybrid cloud technologies from IBM and Red Hat. Next, you’ll be able to explore the challenges, requirements (both functional and non-functional), and the process of app modernization for enterprises by analyzing various use cases. The book then provides you with insights into the different reference solutions for app modernization on the cloud, which will help you to learn how to design and implement patterns and best practices in your job. By the end of this book, you’ll be able to successfully modernize applications and cloud infrastructure in hyperscaler public clouds such as IBM and hybrid clouds using Red Hat technologies as well as develop secure applications for cloud environments.
Table of Contents (16 chapters)
1
Part 1: Moving to Hybrid Cloud
5
Part 2: Cloud-Native Methods, Practices, and Technology
8
Part 3: Elements of Embedded Linux

Planning for the adoption of security as a culture

Organizations need to establish engineering policies for their data and systems. It is essential to establish the necessary standards and policies to ensure the confidentiality, integrity, and availability of information. The implementation process should follow standards and policies. Organizations need to classify each system based on their corresponding security sensitivity. These systems must be installed, configured, administered, and maintained at the corresponding security levels. They must follow industry security best practices to safeguard against accidental or malicious loss, damage, theft, unauthorized access, or destruction.

In addition, the system should be designed while the security and confidentiality of the systems are considered to achieve security by design, all while ensuring balance among risk, performance, accessibility, and business functionality. The core goals of adopting security as a culture are as follows...