Book Image

Hybrid Cloud Infrastructure and Operations Explained

By : Mansura Habiba
Book Image

Hybrid Cloud Infrastructure and Operations Explained

By: Mansura Habiba

Overview of this book

Most organizations are now either moving to the cloud through modernization or building their apps in the cloud. Hybrid cloud is one of the best approaches for cloud migration and the modernization journey for any enterprise. This is why, along with coding skills, developers need to know the big picture of cloud footprint and be aware of the integration models between apps in a hybrid and multi-cloud infrastructure. This book represents an overview of your end-to-end journey to the cloud. To be future agnostic, the journey starts with a hybrid cloud. You'll gain an overall understanding of how to approach migration to the cloud using hybrid cloud technologies from IBM and Red Hat. Next, you’ll be able to explore the challenges, requirements (both functional and non-functional), and the process of app modernization for enterprises by analyzing various use cases. The book then provides you with insights into the different reference solutions for app modernization on the cloud, which will help you to learn how to design and implement patterns and best practices in your job. By the end of this book, you’ll be able to successfully modernize applications and cloud infrastructure in hyperscaler public clouds such as IBM and hybrid clouds using Red Hat technologies as well as develop secure applications for cloud environments.
Table of Contents (16 chapters)
Part 1: Moving to Hybrid Cloud
Part 2: Cloud-Native Methods, Practices, and Technology
Part 3: Elements of Embedded Linux

Exploring the reference security architecture

In this section, we’ll discuss the security reference architecture for IBM Cloud. First, we will discuss the essential requirements for security in the case of the cloud platform. The following table shows the core requirements for the security reference architecture:

Table 8.3 – Basic requirements for security on IBM Cloud

The architecture shown in Figure 8.3 shows the main activities that must be followed for security solutions, such as container security and endpoint security. This reference architecture for security focuses on the requirements described in Table 8.3.

Figure 8.3 – Security reference architecture for IBM Cloud

Now let’s look at the recommended components mentioned in the reference architecture of security shown in Figure 8.3 in the following sub sections.

Identity and access management

Identity and access management should ensure that...