000 02806nam a22002897a 4500
005 20260105110908.0
008 260105b2024 un a|||| |||| 00| 0 eng d
020 _a9781098157777
040 _aAUE
_cAUE
_erda
041 _aeng
050 _aQA76.585
_b .B83 2024
100 1 _aBuckwell, Mark
245 1 0 _aSecurity architecture for hybrid cloud :
_ba practical method for designing security using zero trust principles /
_cMark Buckwell, Stefaan Van daele, and Carsten Horst.
250 _aFirst edition.
264 _aSebastopol :
_bO'Reilly Media, Inc.
_c2024.
300 _a450 pages.
_billustrations,
_c24 cm
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
504 _aIncludes index.
520 _aAs the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection. This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures. Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine: The importance of developing a solution architecture that integrates security for clear communication Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts How security solution architecture is related to design thinking, enterprise security architecture, and engineering How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices How to apply architectural thinking to the development of new security solutions About the authors Mark Buckwell is a cloud security architect at IBM with 30 years of information security experience. Carsten Horst with more than 20 years of experience in Cybersecurity is a certified security architect and Associate Partner at IBM. Stefaan Van daele has 25 years experience in Cybersecurity and is a Level 3 certified security architect at IBM.
650 0 _2Cloud computing
_xSecurity measures
700 1 _aDaele, Stefaan van
_eauthor
700 1 _aHorst, Carsten
_eauthor
942 _2lcc
_cBK
_n0
999 _c30330
_d30330