Wählen Sie eine Sprache
Hybrid cloud environments stretch across physical systems and multiple clouds, introducing new environment borders and possible vulnerabilities. Past security approaches focused on locking down access points—so how does security work in an environment that by definition has open borders and complex architectures?
A more secure foundation is critical for hybrid cloud, and that starts with the operating system itself. While the security implementations for hybrid cloud are more complex, the basic principles and best practices remain the same as for physical and virtual environments. The fundamentals of security come down to understanding access, authentication, and auditing—understanding who is performing actions and what they’re doing.
Even as infrastructure technologies change with containers, serverless, and edge, the core security principles can be used to handle evolving needs.
Join a roundtable of Red Hat® security experts as they discuss some of the central issues surrounding security in hybrid cloud environments, including:
- Foundational security principles for hybrid cloud environments.
- Operating system-level security features.
- How to plan and execute user authentication across clouds.
- Planning security as infrastructure changes, from containers to serverless.
Live event date: Tuesday, January 26, 2021 | 11 a.m. ET
On-demand event: Available for one year afterward.