forked from docs/architecture-center
20 lines
789 B
ReStructuredText
20 lines
789 B
ReStructuredText
Security
|
|
========
|
|
|
|
The security best practices offer comprehensive guidance on fortifying cloud environments. Explore recommendations for
|
|
implementing robust identity and access management, encryption protocols, and network security measures. Learn how to
|
|
secure data at rest and in transit, as well as strategies for monitoring and responding to
|
|
security incidents. This section is a crucial resource for architects and cybersecurity professionals, providing
|
|
insights into designing and maintaining resilient security postures within the Open Telekom Cloud, ensuring the
|
|
confidentiality, integrity, high availability, scalability, robustness and resilience of sensitive information and
|
|
critical infrastructure.
|
|
|
|
.. toctree::
|
|
:maxdepth: 1
|
|
|
|
cce_vault.rst
|
|
deploy_keycloak.rst
|
|
|
|
|
|
|