eBooks & Reports

O'Reilly's Automating Security in the Cloud

Issue link: https://resources.threatstack.com/i/872576

Contents of this Issue

Navigation

Page 32 of 32

through automation. The idea of a perimeter that defines what you protect all but goes away. As a result, many of the tools and processes you used to secure your on- premise data center no longer do the job, or must be modified to work in the cloud. In the next chapter we will build on the foundation security elements you need in the cloud as well as look at automation techniques for deployments, automated opera‐ tions and subsequently wasy to auto heal miss-configuration and/or security vulnera‐ bilities. Identity & Access Management (IAM) | 31

Articles in this issue

view archives of eBooks & Reports - O'Reilly's Automating Security in the Cloud