paint-brush
Enterprise Cloud Security: Setting Up Structure, Identity-Based Access, and Network Controlby@jhash
209 reads

Enterprise Cloud Security: Setting Up Structure, Identity-Based Access, and Network Control

by Shekhar Jha10mFebruary 15th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

This article is part of the Enterprise Cloud Security Series with Part I: Introduction introducing the space and how it differs from on-premise security. Part II covers the security consideration for building the cloud foundation. The foundation refers to infrastructure setup typically performed by the cloud platform team within the enterprise. The application landing zone is the part of infrastructure provided to developers with appropriate guardrails in place to deploy applications and associated infrastructure. There may be a business unit, geolocation and/or privacy/sensitivity specific landing zones to meet its organizational or regulatory needs.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Enterprise Cloud Security: Setting Up Structure, Identity-Based Access, and Network Control
Shekhar Jha HackerNoon profile picture
Shekhar Jha

Shekhar Jha

@jhash

Focus on enterprise security with background in IAM & cloud security

About @jhash
LEARN MORE ABOUT @JHASH'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Shekhar Jha HackerNoon profile picture
Shekhar Jha@jhash
Focus on enterprise security with background in IAM & cloud security

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here
Learnrepo
Samtigis