
Sign up to save your library
With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.
Find this title in Libby, the library reading app by OverDrive.

Search for a digital library with this title
Title found at these libraries:
Library Name | Distance |
---|---|
Loading... |
Build a resilient cloud architecture to tackle data disasters with ease
About This Book
Who This Book Is For
If you are a cloud security professional who wants to ensure cloud security and data governance no matter the environment, then this book is for you. A basic understanding of working on any cloud platform would be beneficial.
What You Will Learn
In Detail
Modern day businesses and enterprises are moving to the cloud simply to improve efficiency and speed, achieve flexibility and cost-effectiveness, and to get access toon-demand cloud services. However, enterprise cloud security remains a major concern for many businesses because migrating to the public cloud requires transferring control over organizational assets to the cloud provider, and there is achance those assets could be mismanaged. Therefore, as a cloud security professional, you need to be on your toes and armed with techniques to help businesses minimize the risk, and to free management from worrying about misuse of business data.
This book starts with the basics of cloud security and gives you and understanding of various policies, governance, and compliance challenges in the cloud. This will lay a strong foundation before you dive deep into understanding what it takes to design a secure network infrastructure and an architecture application using various security services in the cloud environment.
You will be able to automate security tasks such as server hardening with Ansible and perform automation services such as Monit, that will monitor other security daemons and take appropriate actions in-case those security daemons are stopped maliciously. In short, this book has everything you need to secure your cloud environment with industry-adopted best practices to develop security, highly available, and fault tolerant architecture for organizations.
Style and approach
This book follows a step-by-step, practical approach to secure your applications and data when they are located remotely.