Enterprise Cloud Security: Setting Up Structure, Identity-Based Access, and Network Controlby@jhash

Enterprise Cloud Security: Setting Up Structure, Identity-Based Access, and Network Control

tldt arrow
Read on Terminal Reader🖨️

Too Long; Didn't Read

This article is part of the Enterprise Cloud Security Series with Part I: Introduction introducing the space and how it differs from on-premise security. Part II covers the security consideration for building the cloud foundation. The foundation refers to infrastructure setup typically performed by the cloud platform team within the enterprise. The application landing zone is the part of infrastructure provided to developers with appropriate guardrails in place to deploy applications and associated infrastructure. There may be a business unit, geolocation and/or privacy/sensitivity specific landing zones to meet its organizational or regulatory needs.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Enterprise Cloud Security: Setting Up Structure, Identity-Based Access, and Network Control
Shekhar Jha HackerNoon profile picture

@jhash

Shekhar Jha

About @jhash
LEARN MORE ABOUT @JHASH'S EXPERTISE AND PLACE ON THE INTERNET.
react to story with heart
Shekhar Jha HackerNoon profile picture
by Shekhar Jha @jhash.Focus on enterprise security with background in IAM & cloud security
Read My Stories

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa