New applications developed specifically for the cloud using cloud infrastructure and platforms change the way applications need to be secured. The resources and services available from cloud service providers enable on-demand infrastructure defined as code, on-demand scalability, and new design, development, and delivery models—all of which have an impact on security.
While fundamental security objectives remain the same, cloud infrastructure introduces new layers of control, new resources to monitor and secure, and changes how security must be implemented.
Download this security blueprint, a how-to-guide for securing greenfield cloud applications, that overviews:
The final section of this security blueprint provides a step-by-step process to secure cloud applications using CloudPassage Halo, complete with product screenshots.