forked from docs/architecture-center
Reviewed-by: Gode, Sebastian <sebastian.gode@t-systems.com> Co-authored-by: Akriotis, Kyriakos <kyriakos.akriotis@t-systems.com> Co-committed-by: Akriotis, Kyriakos <kyriakos.akriotis@t-systems.com>
18 lines
761 B
ReStructuredText
18 lines
761 B
ReStructuredText
Security
|
|
========
|
|
|
|
The security best practices offer comprehensive guidance on fortifying cloud environments. Explore recommendations for
|
|
implementing robust identity and access management, encryption protocols, and network security measures. Learn how to
|
|
secure data at rest and in transit, as well as strategies for monitoring and responding to
|
|
security incidents. This section is a crucial resource for architects and cybersecurity professionals, providing
|
|
insights into designing and maintaining resilient security postures within the Open Telekom Cloud, ensuring the
|
|
confidentiality, integrity, high availability, scalability, robustness and resilience of sensitive information and
|
|
critical infrastructure.
|
|
|
|
.. toctree::
|
|
:maxdepth: 1
|
|
|
|
cce_vault
|
|
|
|
|