Part 3: Infrastructure Security Patterns
Enterprises can take advantage of the variety of compute options that are now available in hybrid multi-cloud environments, namely: bare-metal servers, VMs, containers, and serverless, as well as specialized infrastructure to develop and run their software. This chapter provides the context to the type of attacks that can happen against different compute types of the modern hybrid cloud infrastructure and how to protect them. It is also important to know how to isolate network traffic based on purpose and establish secure connectivity across these compute environments. In this part, we will discuss the patterns on how to secure the hybrid cloud compute and network, which are the most essential components of hybrid cloud infrastructure.
This part comprises the following chapters:
- Chapter 5, How to Secure Compute Infrastructure?
- Chapter 6, Implementing Network Protection, Isolation, and Secure Connectivity