Multicloud and hybrid deployment models present security challenges that require more rigorous command, control, and policy mechanisms when compared to traditional IT strategies. Decentralized service-based architectures make the implementation of a perimeter difficult, while hybrid and multicloud deployments make it obsolete.
For organizations considering how to manage a security model across both cloud native and existing IT investments, this becomes vitally important.
It should allow for command and control, especially in terms of security Auth N / Auth Z across cloud native, on-premise, and even SaaS solutions being used by your enterprise.
Organizations shouldn’t think of security for cloud native apps and platforms, SaaS services, and existing systems as separate concerns.