Book Image

Achieving Digital Transformation Using Hybrid Cloud

By : Vikas Grover, Ishu Verma, Praveen Rajagopalan
Book Image

Achieving Digital Transformation Using Hybrid Cloud

By: Vikas Grover, Ishu Verma, Praveen Rajagopalan

Overview of this book

Hybrid cloud technology can be leveraged by organizations aiming to build next-gen applications while safeguarding prior technological investments. This book will help you explore different hybrid cloud architectural patterns, whether designing new projects or migrating legacy applications to the cloud. You'll learn about the key building blocks of hybrid cloud enabling you to deploy, manage, and secure applications and data while porting the workloads between environments without rebuilding. Further, you’ll explore Kubernetes, GitOps, and Layer 3/7 services to reduce operational complexity. You'll also learn about nuances of security and compliance in hybrid cloud followed by the economics of hybrid cloud. You’ll gain a deep understanding of the concepts with use cases from telecom 5G and industrial manufacturing, giving you a glimpse into real industry problems resolved by hybrid cloud, and unlocking millions of dollars of opportunities for enterprises. By the end of this book, you'll be well-equipped to design and develop efficient hybrid cloud strategies, lead conversations with senior IT and business executives, and succeed in hybrid cloud implementation or transformation opportunities.
Table of Contents (12 chapters)
1
Part 1: Containers, Kubernetes, and DevOps for Hybrid Cloud
6
Part 2: Design Patterns, DevOps, and GitOps

Understanding the core security principles

To begin, let’s examine the fundamental principles of security so we can then see how to apply those principles to the various components of hybrid cloud. It is important for hybrid-cloud architects to take a very holistic approach to security as it has a notable impact on all components of the architecture. The security posture of an enterprise has widespread implications for the business as it touches on digital sovereignty, data protection, compliance, and regulations depending on the type of industry and the business’s geographical location.

This brings us to the core security principle, trust. Security should not be bolted on as an afterthought, but rather built from the ground up. One very common approach to a built-in model of security is the zero-trust approach.

Figure 6.1 – Zero-trust approach to security

Figure 6.1 – Zero-trust approach to security

In this approach, all the entities of the architecture (and all of the components...