Get Free Shipping on orders over $79
Security Architecture for Hybrid Cloud : A Practical Method for Designing Security Using Zero Trust Principles - Mark  Buckwell

Security Architecture for Hybrid Cloud

A Practical Method for Designing Security Using Zero Trust Principles

By: Mark Buckwell, Stefaan Van daele, Carsten Horst

eText | 25 July 2024 | Edition Number 1

At a Glance

eText


$64.89

or 4 interest-free payments of $16.22 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural process to ensure the effectiveness of security controls and continued protection.

This book provides the first comprehensive method for hybrid multicloud security, integrating proven architectural techniques to deliver a comprehensive end-to-end security method with compliance, threat modeling, and zero trust practices. This method ensures repeatability and consistency in the development of secure solution architectures.

Architects will learn how to effectively identify threats and implement countermeasures through a combination of techniques, work products, and a demonstrative case study to reinforce learning. You'll examine:

  • The importance of developing a solution architecture that integrates security for clear communication
  • Roles that security architects perform and how the techniques relate to nonsecurity subject matter experts
  • How security solution architecture is related to design thinking, enterprise security architecture, and engineering
  • How architects can integrate security into a solution architecture for applications and infrastructure using a consistent end-to-end set of practices
  • How to apply architectural thinking to the development of new security solutions

About the authors

Mark Buckwell is a cloud security architect at IBM with 30 years of information security experience.

Carsten Horst with more than 20 years of experience in Cybersecurity is a certified security architect and Associate Partner at IBM.

Stefaan Van daele has 25 years experience in Cybersecurity and is a Level 3 certified security architect at IBM.

on
Desktop
Tablet
Mobile

More in Network Security

Network Security : A Systems Approach - Larry L Peterson

eBOOK

Securing Cloud Native Apps - Michael Anderson

eBOOK

RRP $81.32

$65.99

19%
OFF
The (Un)Natural History of Malware - Lena Yu

eBOOK

RRP $54.23

$43.99

19%
OFF