Book Image

Achieving Digital Transformation Using Hybrid Cloud

By : Vikas Grover, Ishu Verma, Praveen Rajagopalan
Book Image

Achieving Digital Transformation Using Hybrid Cloud

By: Vikas Grover, Ishu Verma, Praveen Rajagopalan

Overview of this book

Hybrid cloud technology can be leveraged by organizations aiming to build next-gen applications while safeguarding prior technological investments. This book will help you explore different hybrid cloud architectural patterns, whether designing new projects or migrating legacy applications to the cloud. You'll learn about the key building blocks of hybrid cloud enabling you to deploy, manage, and secure applications and data while porting the workloads between environments without rebuilding. Further, you’ll explore Kubernetes, GitOps, and Layer 3/7 services to reduce operational complexity. You'll also learn about nuances of security and compliance in hybrid cloud followed by the economics of hybrid cloud. You’ll gain a deep understanding of the concepts with use cases from telecom 5G and industrial manufacturing, giving you a glimpse into real industry problems resolved by hybrid cloud, and unlocking millions of dollars of opportunities for enterprises. By the end of this book, you'll be well-equipped to design and develop efficient hybrid cloud strategies, lead conversations with senior IT and business executives, and succeed in hybrid cloud implementation or transformation opportunities.
Table of Contents (12 chapters)
1
Part 1: Containers, Kubernetes, and DevOps for Hybrid Cloud
6
Part 2: Design Patterns, DevOps, and GitOps

Securing hybrid cloud operations

So far in this chapter, we have looked at best practices to prevent access to unauthorized data in our hybrid cloud architecture. Since the hybrid cloud architecture is dispersed across different infrastructures, operations become very challenging. Beyond application data, a lot of systems data is also generated by our hybrid cloud infrastructure and platform. Besides securing that data using IAM best practices, there are other responsibilities for us to be aware of (some of which we listed earlier) as part of security around operations.

Tasks as part of building and deploying secure infrastructure and applications include the following:

  • Automate creation, hardening, and maintenance of base VM images (nodes) and base container images (applications)
  • Automate security scanning for common vulnerabilities and exposure through CI/CD as part of the DevSecOps life cycle
  • Automate the detection of potentially dangerous behavior at runtime
  • ...