Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Achieving Digital Transformation Using Hybrid Cloud
  • Table Of Contents Toc
Achieving Digital Transformation Using Hybrid Cloud

Achieving Digital Transformation Using Hybrid Cloud

By : Vikas G, Ishu Verma, Praveen Rajagopalan
4.8 (6)
close
close
Achieving Digital Transformation Using Hybrid Cloud

Achieving Digital Transformation Using Hybrid Cloud

4.8 (6)
By: Vikas G, Ishu Verma, Praveen Rajagopalan

Overview of this book

Hybrid cloud technology can be leveraged by organizations aiming to build next-gen applications while safeguarding prior technological investments. This book will help you explore different hybrid cloud architectural patterns, whether designing new projects or migrating legacy applications to the cloud. You'll learn about the key building blocks of hybrid cloud enabling you to deploy, manage, and secure applications and data while porting the workloads between environments without rebuilding. Further, you’ll explore Kubernetes, GitOps, and Layer 3/7 services to reduce operational complexity. You'll also learn about nuances of security and compliance in hybrid cloud followed by the economics of hybrid cloud. You’ll gain a deep understanding of the concepts with use cases from telecom 5G and industrial manufacturing, giving you a glimpse into real industry problems resolved by hybrid cloud, and unlocking millions of dollars of opportunities for enterprises. By the end of this book, you'll be well-equipped to design and develop efficient hybrid cloud strategies, lead conversations with senior IT and business executives, and succeed in hybrid cloud implementation or transformation opportunities.
Table of Contents (12 chapters)
close
close
1
Part 1: Containers, Kubernetes, and DevOps for Hybrid Cloud
6
Part 2: Design Patterns, DevOps, and GitOps

Automating security measures

When adopting a hybrid cloud, your workloads can deploy in a range of environments – bare metal, virtual machine, or public clouds – and thus security becomes more complex.

The growth of heterogeneous environments will increase the risk and make manual compliance monitoring almost impossible.

The application teams, infrastructure teams, and security teams of different environments work within their own boundaries and zones leaving a blind side to the vulnerabilities.

With growing footprints and the nature of distributed systems and teams, automation is the only way to prevent inconsistent patching and configurations. Automation helps with the rapid implementation of continuous security and day 2 security operations.

Also, having an enterprise-wide security strategy helps. By bringing a consistent strategy, automation becomes easier and thus you can have an assembly line model where software is delivered at scale in a secure manner. By automatically patching the software, your software and software supply chain can be trusted.

Automation needs to come at different levels. Let’s look at them:

  • Operating system (OS): Having a hardened OS as per compliance and performing patch management protects the OS from viruses, malware, and remote hacker intrusions. It is important to keep the OS safe by using techniques such as antivirus software, endpoint protection, patch updates, traffic monitoring, and firewalls, and by providing the least privileges.
  • Provisioning of systems: System provisioning is a repeated task and is a great candidate for automation. Integrated IT Service Management (ITSM) – for example, ServiceNow – to provision systems in pre-defined secure ways by running playbooks is key to achieving automation.
  • Workflow management: Workflows or pipelines can build a software factory where your applications have to pass security gates at the time of building. Before deployment and during packaging, your application components go through scanning and are key to DevSecOps.

You can start with iterative steps and start automating your daily tasks to secure your stack. Security at every step and every layer is important to keep your organization safe and mitigate your risk of misconfiguration and attacks. Now, let’s look at how to enable your applications for adopting a hybrid cloud.

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Achieving Digital Transformation Using Hybrid Cloud
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon