Scale: The Cloud In Security

Where we encounter the problem of applying the most modern security model we have to the most capable data centers we run and discover the two may come from different eras.

Around 2002, the IT security industry began professing this idea: If a system could be built wherein all the components — software, operating system, central processor, hard disk drive, network interface card — could trust one another to work in a predictable, deterministic manner, all security needed to do to protect the integrity of that system was to seal off its entryway from the outside world and erect checkpoints at the gateways. It was the fortress security model, and a year after 9/11, just the thought of it made us feel better.
Previous
Previous

Scale: Quest for the One True DevOps

Next
Next

Rethinking Customer Experience: What Are We Measuring and Why?