More Related Content Similar to The Best Approach For Multi-cloud Infrastructure Provisioning (20) The Best Approach For Multi-cloud Infrastructure Provisioning2. “I need encryption
between my
application tiers”
“I need to control
the flow of traffic
in/out/through”
“I’ve need multiple
environments in
multiple clouds”
“How do I operate
in a mixed runtime
environment?”
“How do I handle
multi-tenancy and
management?”
“Is all of my existing
infrastructure wasted?”
Why is Cloud a challenge
3. © 2018 HashiCorp
CLOUD OPERATING MODEL
Private Cloud AWS Azure GCP
Provision
Operations
Secure
Security
Connect
Networking
Run
Development
A control plane for every layer of the cloud operating model
5. © 2018 HashiCorp
Cloud adoption is a secular trend
Digital experiences are now the
primary interface between a
customer and a business, or
business and business.
Experiences are typically device- and
cloud-first: rich, personal interface,
with large scale data processing and
intelligence.
This pattern demands a change in the
model for software delivery to meet
delivery goals, and transformation
objectives.
Digital transformation means pressure on application delivery
6. Copyright © 2018 HashiCorp ∕
Infrastructure for the Cloud
Copyright © 2018 HashiCorp ∕
∕ OPEN SOURCE AND ENTERPRISE 6
Terraform Enterprise provides collaboration, governance, and self-
service workflows on top of the infrastructure as code provisioning
from open source. Terraform Enterprise provides workspaces,
modules, and other powerful constructs for teams working together to
build infrastructure. Operators can package infrastructure as code
into reusable modules enabling developers to quickly provision in a
self-service fashion. Likewise, Policy as code and logging enable
organizations to secure, govern, and audit their entire deployment.
• Collaborate on infrastructure as code
• Multi-Cloud Compliance & Management
• Self-Service Infrastructure
7. Copyright © 2018 HashiCorp ∕
Security for the cloud
Copyright © 2018 HashiCorp ∕
∕ VAULT APPROACH TO DYNAMIC INFRASTRUCTURE
Vault tightly controls access to secrets and encryption keys by
authenticating against trusted sources of identity such as Active
Directory, LDAP, and cloud identity platforms. Vault enables fine grained
authorization of which users and applications are permitted access to
secrets and keys.
7