| 000 | 02806nam a22002897a 4500 | ||
|---|---|---|---|
| 005 | 20260105110908.0 | ||
| 008 | 260105b2024 un a|||| |||| 00| 0 eng d | ||
| 020 | _a9781098157777 | ||
| 040 |
_aAUE _cAUE _erda |
||
| 041 | _aeng | ||
| 050 |
_aQA76.585 _b .B83 2024 |
||
| 100 | 1 | _aBuckwell, Mark | |
| 245 | 1 | 0 |
_aSecurity architecture for hybrid cloud : _ba practical method for designing security using zero trust principles / _cMark Buckwell, Stefaan Van daele, and Carsten Horst. |
| 250 | _aFirst edition. | ||
| 264 |
_aSebastopol : _bO'Reilly Media, Inc. _c2024. |
||
| 300 |
_a450 pages. _billustrations, _c24 cm |
||
| 336 |
_2rdacontent _atext _btxt |
||
| 337 |
_2rdamedia _aunmediated _bn |
||
| 338 |
_2rdacarrier _avolume _bnc |
||
| 504 | _aIncludes index. | ||
| 520 | _aAs the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection. This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures. Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine: The importance of developing a solution architecture that integrates security for clear communication Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts How security solution architecture is related to design thinking, enterprise security architecture, and engineering How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices How to apply architectural thinking to the development of new security solutions About the authors Mark Buckwell is a cloud security architect at IBM with 30 years of information security experience. Carsten Horst with more than 20 years of experience in Cybersecurity is a certified security architect and Associate Partner at IBM. Stefaan Van daele has 25 years experience in Cybersecurity and is a Level 3 certified security architect at IBM. | ||
| 650 | 0 |
_2Cloud computing _xSecurity measures |
|
| 700 | 1 |
_aDaele, Stefaan van _eauthor |
|
| 700 | 1 |
_aHorst, Carsten _eauthor |
|
| 942 |
_2lcc _cBK _n0 |
||
| 999 |
_c30330 _d30330 |
||