Book Image

Multi-Cloud Strategy for Cloud Architects - Second Edition

By : Jeroen Mulder
Book Image

Multi-Cloud Strategy for Cloud Architects - Second Edition

By: Jeroen Mulder

Overview of this book

Are you ready to unlock the full potential of your enterprise with the transformative power of multi-cloud adoption? As a cloud architect, you understand the challenges of navigating the vast array of cloud services and moving data and applications to public clouds. But with 'Multi-Cloud Strategy for Cloud Architects, Second Edition', you'll gain the confidence to tackle these complexities head-on. This edition delves into the latest concepts of BaseOps, FinOps, and DevSecOps, including the use of the DevSecOps Maturity Model. You'll learn how to optimize costs and maximize security using the major public clouds - Azure, AWS, and Google Cloud. Examples of solutions by the increasingly popular Oracle Cloud Infrastructure (OCI) and Alibaba Cloud have been added in this edition. Plus, you will discover cutting-edge ideas like AIOps and GreenOps. With practical use cases, including IoT, data mining, Web3, and financial management, this book empowers you with the skills needed to develop, release, and manage products and services in a multi-cloud environment. By the end of this book, you'll have mastered the intricacies of multi-cloud operations, financial management, and security. Don't miss your chance to revolutionize your enterprise with multi-cloud adoption.
Table of Contents (23 chapters)
Other Books You May Enjoy

Monitoring IoT ecosystems

The most important challenge that architects should address in IoT is, not surprisingly, security. The security estate of IoT devices must be monitored continuously. To understand the risks better, we can have a look at top risks that are listed by OWASP, the Open Web Application Security Project. We only list the top five.

  • Weak passwords
  • Poorly protected network services
  • Poorly secured interfaces
  • lack of update mechanisms for security rules and patches
  • Use of outdated components

The top risk however is the lack of device management and leaving the data transfer unmonitored. However, this starts with knowing where the devices are. But knowing where devices sit is not sufficient; we must also know what these devices are doing, what sort of data the devices collect and how they collect it. Observability is the key principle that any IoT architecture must comply with.

This is already the biggest challenge in IoT. Think of the fact that an IoT ecosystem might consist...