{"id":22237,"date":"2016-12-06T13:00:11","date_gmt":"2016-12-06T21:00:11","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=22237"},"modified":"2017-06-26T14:36:52","modified_gmt":"2017-06-26T21:36:52","slug":"3-fundamentals-cloud-security","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/12\/3-fundamentals-cloud-security\/","title":{"rendered":"3 Fundamentals for Cloud Security"},"content":{"rendered":"<h5><strong>The Advantages of the Cloud Come with Certain Risk.<\/strong><\/h5>\n<p>Organizations must concentrate on a prevention-focused cloud security architecture for deployment \u2014 designed to stop threats across all potential attack vectors.<\/p>\n<p>For secure cloud adoption, there are three\u00a0key questions to consider:<\/p>\n<h5><strong>1.\u00a0Who\u2019s really responsible for our data?<\/strong><\/h5>\n<p>You. In public cloud environments, as the data owner, you\u2019re responsible for your data \u2014 not the cloud service provider (CSP). And although the CSP will secure the underlying infrastructure, the safety of your applications and data is your responsibility. So you need a consistent security posture.<\/p>\n<h5><strong>2. Who has access to our applications and data?<\/strong><\/h5>\n<p>A role-based access policy can help mitigate the risk of data loss. Although the CSP will have authorisation messages in place, it\u2019s important you decide who should have access and whether additional assurance is required.<\/p>\n<h5><strong>3. What happens if there\u2019s a security breach?<\/strong><\/h5>\n<p>What kind of support will the CSP give if there\u2019s a breach? It\u2019s important to know this before launching a cloud strategy.<\/p>\n<p>Understanding the risks, and the challenges is a vital first-step as your organization moves to make the most of the cloud. Get your copy of our new whitepaper with BT Security, \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/secure-cloud-adoption\">Securely Enabling Cloud Adoption<\/a>\u201d and start your next conversation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Advantages of the Cloud Come with Certain Risk. Organizations must concentrate on a prevention-focused cloud security architecture for deployment \u2014 designed to stop threats across all potential attack vectors. For secure &hellip;<\/p>\n","protected":false},"author":165,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113],"tags":[2569,1166],"coauthors":[1649],"class_list":["post-22237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing-2","tag-bt","tag-cloud-security"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=22237"}],"version-history":[{"count":11,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22237\/revisions"}],"predecessor-version":[{"id":35452,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/22237\/revisions\/35452"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=22237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=22237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=22237"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=22237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}