From the course: Cloud Architecture: Design Decisions
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Map to security and governance
From the course: Cloud Architecture: Design Decisions
Map to security and governance
- Of course, selecting a set of security tools and technology by leveraging our requirements is perhaps the most important aspect of making design decisions around your cloud-based solution. Thus, this is not only our ability to pick the right security approaches and technologies, but also to do so around a meta-design and framework that spans the entire enterprise. So, keep in mind that we're talking about security in the narrow sense here, but it needs to work and play well with the security in the wide. Narrow refers to solution details, such as encryption methods. Wide refers to the most holistic solutions, such as leveraging identity and access management as the overall approach. Governance works in tandem with security, and that is why we deal with it at this planning stage. Again, governance provides the ability to place limitations on how we deal with large and small resources, such as APIs and cloud storage. This allows us to deal with very powerful assets, such as sensitive…
Contents
-
-
-
-
-
-
(Locked)
Map requirements to storage2m 14s
-
(Locked)
Map requirements to compute3m 18s
-
(Locked)
Map requirements to databases4m 23s
-
(Locked)
Map to security and governance4m 10s
-
(Locked)
Map to cloud operations (CloudOps)2m 58s
-
(Locked)
Map requirements to an AI solution3m 21s
-
(Locked)
Making sense of it all2m 21s
-
(Locked)
Challenge: Defining the cloud architecture requirements for ABC Inc.1m 10s
-
(Locked)
Solution: Defining the cloud architecture requirements for ABC Inc.2m 39s
-
(Locked)
-
-