Book description
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection.
This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures.
Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine:
- The importance of developing a solution architecture that integrates security for clear communication
- Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts
- How security solution architecture is related to design thinking, enterprise security architecture, and engineering
- How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices
- How to apply architectural thinking to the development of new security solutions
About the authors
Mark Buckwell is a cloud security architect at IBM with 30 years of information security experience.
Carsten Horst with more than 20 years of experience in Cybersecurity is a certified security architect and Associate Partner at IBM.
Stefaan Van daele has 25 years experience in Cybersecurity and is a Level 3 certified security architect at IBM.
Publisher resources
Table of contents
- Preface
- I. Concepts
- 1. Introduction
- 2. Architecture Concepts
- II. Plan
- 3. Enterprise Context
- 4. Requirements and Constraints
- III. Design
- 5. System Context
- 6. Application Security
- 7. Shared Responsibilities
- 8. Infrastructure Security
- 9. Architecture Patterns and Decisions
- IV. Build
- 10. Secure Development and Assurance
- V. Run
-
11. Security Operations
- Chapter Artifacts
- Shared Responsibilities
- Defining Processes, Procedures, and Work Instructions
- Case Study: Vulnerability Management Service
- Case Study: Deployment Architecture Update
- Threat Detection Use Case
- Case Study: Threat Detection Use Case
- Incident Response Runbook
- Case Study: Incident Response Runbook
- Threat Traceability Matrix
- Summary
- Exercises
- VI. Close
- 12. Closing Thoughts
- A. Case Study
- B. Artifact Mapping
-
C. Exercise Solutions
- Chapter 1. Introduction
- Chapter 2. Architecture Concepts
- Chapter 3. Enterprise Context
- Chapter 4. Requirements and Constraints
- Chapter 5. System Context
- Chapter 6. Application Security
- Chapter 7. Shared Responsibilities
- Chapter 8. Infrastructure Security
- Chapter 9. Architecture Patterns and Decisions
- Chapter 10. Secure Development and Assurance
- Chapter 11. Security Operations
- Chapter 12. Closing Thoughts
- Index
- About the Authors
Product information
- Title: Security Architecture for Hybrid Cloud
- Author(s):
- Release date: July 2024
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098157777
You might also like
book
Security and Microservice Architecture on AWS
Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are …
video
AWS Certified Cloud Practitioner (CLF-C02)
10+ Hours of Video Instruction Get the edge you need to ace the AWS Cloud Practitioner …
book
API Security in Action
A web API is an efficient way to communicate with an application or service. However, this …
video
AWS Certified Solutions Architect Associate (SAA-C03)
8+ Hours of Video Instruction 8 Hours of Video Instruction and Test-Taking Strategies for the Topics …