Book Image

Achieving Digital Transformation Using Hybrid Cloud

By : Vikas Grover, Ishu Verma, Praveen Rajagopalan
Book Image

Achieving Digital Transformation Using Hybrid Cloud

By: Vikas Grover, Ishu Verma, Praveen Rajagopalan

Overview of this book

Hybrid cloud technology can be leveraged by organizations aiming to build next-gen applications while safeguarding prior technological investments. This book will help you explore different hybrid cloud architectural patterns, whether designing new projects or migrating legacy applications to the cloud. You'll learn about the key building blocks of hybrid cloud enabling you to deploy, manage, and secure applications and data while porting the workloads between environments without rebuilding. Further, you’ll explore Kubernetes, GitOps, and Layer 3/7 services to reduce operational complexity. You'll also learn about nuances of security and compliance in hybrid cloud followed by the economics of hybrid cloud. You’ll gain a deep understanding of the concepts with use cases from telecom 5G and industrial manufacturing, giving you a glimpse into real industry problems resolved by hybrid cloud, and unlocking millions of dollars of opportunities for enterprises. By the end of this book, you'll be well-equipped to design and develop efficient hybrid cloud strategies, lead conversations with senior IT and business executives, and succeed in hybrid cloud implementation or transformation opportunities.
Table of Contents (12 chapters)
1
Part 1: Containers, Kubernetes, and DevOps for Hybrid Cloud
6
Part 2: Design Patterns, DevOps, and GitOps

Automating security measures

When adopting a hybrid cloud, your workloads can deploy in a range of environments – bare metal, virtual machine, or public clouds – and thus security becomes more complex.

The growth of heterogeneous environments will increase the risk and make manual compliance monitoring almost impossible.

The application teams, infrastructure teams, and security teams of different environments work within their own boundaries and zones leaving a blind side to the vulnerabilities.

With growing footprints and the nature of distributed systems and teams, automation is the only way to prevent inconsistent patching and configurations. Automation helps with the rapid implementation of continuous security and day 2 security operations.

Also, having an enterprise-wide security strategy helps. By bringing a consistent strategy, automation becomes easier and thus you can have an assembly line model where software is delivered at scale in a secure manner. By automatically patching the software, your software and software supply chain can be trusted.

Automation needs to come at different levels. Let’s look at them:

  • Operating system (OS): Having a hardened OS as per compliance and performing patch management protects the OS from viruses, malware, and remote hacker intrusions. It is important to keep the OS safe by using techniques such as antivirus software, endpoint protection, patch updates, traffic monitoring, and firewalls, and by providing the least privileges.
  • Provisioning of systems: System provisioning is a repeated task and is a great candidate for automation. Integrated IT Service Management (ITSM) – for example, ServiceNow – to provision systems in pre-defined secure ways by running playbooks is key to achieving automation.
  • Workflow management: Workflows or pipelines can build a software factory where your applications have to pass security gates at the time of building. Before deployment and during packaging, your application components go through scanning and are key to DevSecOps.

You can start with iterative steps and start automating your daily tasks to secure your stack. Security at every step and every layer is important to keep your organization safe and mitigate your risk of misconfiguration and attacks. Now, let’s look at how to enable your applications for adopting a hybrid cloud.