In our quest to understand the vast landscape of cloud security, we’ve ventured into all corners of the digital world. Have you ever wondered just how complex and interconnected this field truly is? Let’s break it down together.
Imagine creating a detailed map that captures everything we’ve encountered on our journey. It’s like piecing together a puzzle where each section, from hardware and software to gouvernance and IAM, plays a crucial role in the bigger picture of security. Sound complicated?
As we sifted through Online research and insightful articles, we started to see a clearer picture emerge, highlighting how diverse yet interrelated these topics are. Take Infrastructure as a Service (IaaS), for instance. It’s a unique concept, but you may guess that it involves on-demand self-service and is guided by a shared responsibility model? It relies heavily on technologies like containers and virtual machines and also needs careful consideration of compliance and cost management.
All these interconnections contribute to the complexity of cloud security, making it challenging to create a neat and tidy overview. So here is our best shot at it :
mindmap root((Cloud Security)) Caracteristics Of the cloud On-demand self-service Broad network access Resource pooling Rapid elasticity Measured service Abstraction and Simplification Backup and Disaster Recovery Operational Resilience and Cost Management FinOps Disaster Recovery Shared Reponsibilty Model Customer Responsibilities Data confidentiality and intergrity Identity and access management Application-level controls and configurations Provider Responsibilites X Y Z Models SaaS IaaS FaaS PaaS Technologies Physical Infrastructure Virtualisation Containerization Microservices Orchestration Serverless Web Application Data pipelines Identity and Access Management (IAM) Authorisation and Authentication Zero trust Compliance and Regulatory Governance GDPR ISO/IEC 27001 HIPAA PCI DSS ...
mindmap root((Cloud Security)) Technologies Containerization Registries Orchestration Virtualization