Chapter 9. Network Security, Identity & Access Management and Trust Assurance Patterns
Secure On-Premise Internet Access
Secure External Cloud Connection
Secure Connection for Scaled VMs
Cloud Denial-of-Service Protection
Cloud Traffic Hijacking Protection
Automatically Defined Perimeter
Federated Cloud Authentication
This chapter acts as a continuation of Chapter 8 in that it continues to focus on cloud security architectures and solutions. This time, the areas covered are ...
Get Cloud Computing Design Patterns now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.