Does the Infrastructure provide the necessary security safeguards? Did we increase our attack surface by standing up new ingress? Are we confidant our cloud infrastructure is protecting our data, identities, secrets, and network? How are we incorporating cloud-native functionality, like IAM, audit logging, and networking, in conjunction with the available underlying and non-native services to secure our Infrastructure?
A computer network is one of those things you don’t notice until it fails. Whether you’re at home, in the office, at the airport, in a coffee shop, on the factory floor, or almost any other place, you expect a computer network to be up, available, and free of congestion and other glitches.
As your IT environment grows and evolves, providing for its security becomes more complex. With increased complexity comes greater vulnerability: More things can go wrong or be overlooked, and hackers have a larger “attack surface” on which to find weak spots.
There was a time, not so long ago, when the lifecycle of a software application, from the end user’s perspective, was long periods of inactivity punctuated by occasional, incremental releases, each with a few new features and a bunch of new bugs.
Although it’s possible to implement cloud migration by “lifting and shifting” applications and data from an on-premise data center to a replica environment on a cloud service, doing so doesn’t take advantage of all the benefits cloud computing has to offer, such as automatic resource scaling...