Book Image

Hybrid Cloud Infrastructure and Operations Explained

By : Mansura Habiba
Book Image

Hybrid Cloud Infrastructure and Operations Explained

By: Mansura Habiba

Overview of this book

Most organizations are now either moving to the cloud through modernization or building their apps in the cloud. Hybrid cloud is one of the best approaches for cloud migration and the modernization journey for any enterprise. This is why, along with coding skills, developers need to know the big picture of cloud footprint and be aware of the integration models between apps in a hybrid and multi-cloud infrastructure. This book represents an overview of your end-to-end journey to the cloud. To be future agnostic, the journey starts with a hybrid cloud. You'll gain an overall understanding of how to approach migration to the cloud using hybrid cloud technologies from IBM and Red Hat. Next, you’ll be able to explore the challenges, requirements (both functional and non-functional), and the process of app modernization for enterprises by analyzing various use cases. The book then provides you with insights into the different reference solutions for app modernization on the cloud, which will help you to learn how to design and implement patterns and best practices in your job. By the end of this book, you’ll be able to successfully modernize applications and cloud infrastructure in hyperscaler public clouds such as IBM and hybrid clouds using Red Hat technologies as well as develop secure applications for cloud environments.
Table of Contents (16 chapters)
1
Part 1: Moving to Hybrid Cloud
5
Part 2: Cloud-Native Methods, Practices, and Technology
8
Part 3: Elements of Embedded Linux

Solution design – security in action

Security needs to be designed, implemented, and practiced on every platform component, including the hardware, middleware, software, and containers. The following subsections will discuss the different controls that are used to manage and support access to the client’s systems, production environment, personal information, sensitive personal information, and business-sensitive information.

Change management and planning

Security should be started from the bottom layer, which is hardware. Standard policies must be defined to enforce change management and access control management to establish the proper structure for security management. Here is a list of best practices for secure operations:

  • Use a set of standard information security change management policy controls to make any changes to the specification or configuration of a system’s hardware or software component. These policies define the life cycle of any...