InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Secure Connection Requirements of Hybrid Cloud

Presented by

Narudom Roongsiriwong, SVP, Senior Cloud Architect, Digital Innovation and Data Group, Bank of Ayudhya

About this talk

Hybrid cloud environments provide enterprises with diverse resources to run different workloads depending on the Cloud Service Customer (CSC) needs. On one hand, enterprises can quickly use innovative services, deploy Internet applications, and provide optimal performance through public clouds. At the same time, the security and reliability of the private cloud can be used to run core applications in the local data center. Therefore, hybrid clouds are becoming an essential form of enterprise cloud model that allows the best of both worlds approach. The hybrid deployment forms a diverse connected ecosystem. Data and applications flowing between clouds pose new security challenges as each cloud platform is proprietary and managed independently by Cloud Service Providers (CSPs) such as AWS, Microsoft, and Google. To successfully secure this unique and complex landscape, the enterprise should develop and employ cross-cloud security capabilities in these four areas: perimeter, transmission, storage, and management security. This presentation describes the applicability of the CSA Cloud Controls Matrix (CCM) to the hybrid cloud.
Cloud Security Alliance: CloudBytes

Cloud Security Alliance: CloudBytes

80669 subscribers1017 talks
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa
Related topics