官术网_书友最值得收藏!

  • Learn Azure Sentinel
  • Richard Diver Gary Bushey Jason S. Rader
  • 218字
  • 2021-06-30 15:08:14

The current cloud security landscape

To understand your security architecture requirements, you must first ensure that you have a solid understanding of the IT environment that you are trying to protect. Before deploying any new security solutions, there is a need to map out the solutions that are currently deployed and how they protect each area of the IT environment. The following list provides the major components of any modern IT environment:

  • Identity for authentication and authorization of access to systems.
  • Networks to gain access to internal resources and the internet.
  • Storage and compute in the data center for internal applications and sensitive information.
  • End user devices and the applications they use to interact with the data.
  • And in some environments, you can include Industrial Control Systems (ICS) and the Internet of Things (IoT).

When we start to look at the threats and vulnerabilities for these components, we quickly find ourselves deep in the alphabet soup of problems and solutions:

Figure 1.1 – The alphabet soup of cybersecurity

Figure 1.1 – The alphabet soup of cybersecurity

This is by no means an exhaustive list of the potential acronyms available. Understanding these acronyms is the first hurdle; matching them to the appropriate solutions and ensuring they are well deployed is another challenge altogether (a table of these acronyms can be found in the appendix of this book).

主站蜘蛛池模板: 淮南市| 麦盖提县| 湘潭市| 金门县| 京山县| 慈溪市| 集贤县| 隆尧县| 东丽区| 广河县| 夹江县| 黄浦区| 布尔津县| 峨眉山市| 正阳县| 绍兴市| 渭源县| 杂多县| 德安县| 行唐县| 新化县| 木里| 绥中县| 紫云| 三明市| 台江县| 桑植县| 喀喇| 延吉市| 会泽县| 新民市| 襄樊市| 师宗县| 新田县| 郧西县| 南丰县| 古蔺县| 弥勒县| 梅州市| 石屏县| 山东省|