This 2-part article gives a thorough explanation of the necessary security practices with a hybrid cloud.