Cloud security architecture should, wherever possible, leverage cloud infrastructure design characteristics in order to achieve immutable security. Implementing the Cloud blueprint 2.0 gives you the following benefits:
•Advanced security for networks as well as data, compute, messaging, and identity attack vectors.
•Systematic separation of all traffic flows (to, from, and within cloud environments).
•Segmentation by application or service and micro-segmentation of hosts running within the same segment or remotely.
•Cultivating agility for DevOps and lines of business without compromising the corporate security posture.
•Automation, efficiency, and elasticity in order to keep up with the velocity of business, while reducing risky human errors and misconfigurations by embedding security into code.
•A platform-agnostic, borderless architecture in which security policies can be enforced consistently across all environments.