Book Image

Hybrid Cloud for Architects

By : Alok Shrivastwa
Book Image

Hybrid Cloud for Architects

By: Alok Shrivastwa

Overview of this book

Hybrid cloud is currently the buzz word in the cloud world. Organizations are planning to adopt hybrid cloud strategy due to its advantages such as untested workloads, cloud-bursting, cloud service brokering and so on. This book will help you understand the dynamics, design principles, and deployment strategies of a Hybrid Cloud. You will start by understanding the concepts of hybrid cloud and the problems it solves as compared to a stand-alone public and private cloud. You will be delving into the different architecture and design of hybrid cloud. The book will then cover advanced concepts such as building a deployment pipeline, containerization strategy, and data storage mechanism. Next up, you will be able to deploy an external CMP to run a Hybrid cloud and integrate it with your OpenStack and AWS environments. You will also understand the strategy for designing a Hybrid Cloud using containerization and work with pre-built solutions like vCloud Air, VMware for AWS, and Azure Stack. Finally, the book will cover security and monitoring related best practices that will help you secure your cloud infrastructure. By the end of the book, you will be in a position to build a hybrid cloud strategy for your organization.
Table of Contents (19 chapters)
Title Page
Copyright and Credits
Software Hardware List
Packt Upsell
Contributors
Preface
Index

Components of security


Security is such a vast topic that even a book to cover it will fall short, let alone a chapter. In this section, we will discuss the base components of security and its definitions. 

The CIA triad

The core of information security mainly focuses on the CIA triad, which stands for confidentiality, integrity, and availability of data.

Confidentiality

The data confidentiality principle dictates that access should be allowed only on a need-to-know basis, which means, by default, block all access and only open access when necessary.

Let's take a banking example to elucidate the principles. Say someone comes into the bank and requests to know your bank balance, and is successful. This would be considered a breach in confidentiality.

Integrity

The principle of data integrity is to protect the data from being modified in an unauthorized way while at rest or in motion. The prevention and detection of data tampering falls under this.

Extending the same bank example, say you have given...