{"id":46419,"date":"2017-10-23T13:00:31","date_gmt":"2017-10-23T20:00:31","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=46419"},"modified":"2022-04-06T03:02:25","modified_gmt":"2022-04-06T10:02:25","slug":"can-secure-data-public-cloud-best-smokey-bear-voice","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/10\/can-secure-data-public-cloud-best-smokey-bear-voice\/","title":{"rendered":"Only YOU Can Secure Your Data in the Public Cloud (In My Best Smokey the Bear Voice)"},"content":{"rendered":"<p>Public cloud security is a shared responsibility but exactly who is accountable for what when it comes to the public cloud? Let\u2019s begin with the facts:<\/p>\n<ol>\n<li>Public cloud refers to a set of virtualized resources (compute, networking, applications) operating on someone else\u2019s computer, but that you control.<\/li>\n<li>Public cloud provides tremendous benefits, including agility, scalability, and faster access to innovative technologies.<\/li>\n<li>Security challenges in the public cloud mirror those faced within an on-premises data center (e.g. how to protect your applications and data from successful cyberattacks).<\/li>\n<li>Attackers are location agnostic. Their intent is to gain access to your network, navigate to a target, be it data, intellectual property, excess compute resources, then execute their end goal \u2013 regardless of whether it is on the network or in the cloud.<\/li>\n<\/ol>\n<p>I think we can all agree on these points. But let\u2019s take a closer look at security and determine who is accountable when it comes to the public cloud.<\/p>\n<p>Public cloud vendors such as Amazon Web Services (AWS) and Microsoft Azure, profess that \u201cpublic cloud data center <em>infrastructures<\/em> are more secure,\u201d but what they are talking about is their data center infrastructure, on which you are deploying your applications and data. <strong>YOU are responsible for protecting the applications, access to those applications, and the associated data. <\/strong><\/p>\n<p><div style=\"max-width:100%\" data-width=\"800\"><span class=\"ar-custom\" style=\"padding-bottom:36.38%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-40429 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/08\/Cloudworkflows.png\" alt=\"Cloudworkflows\" width=\"800\" height=\"291\" \/><\/span><\/div><\/p>\n<p><em>Breakdown of shared security responsibility in the public cloud <\/em><\/p>\n<p>Let that sink in. YOU are in complete control of what security to implement and you must take steps to safeguard your content.<\/p>\n<p><strong>How Can You Secure Your Workloads in the Public Cloud?<\/strong><\/p>\n<p>Following are some of the key security capabilities required to ensure your applications and data in the public cloud are protected:<\/p>\n<ul>\n<li><strong>Visibility and control over all traffic and applications<\/strong> <strong>in the public cloud, irrespective of port. <\/strong>Comprehensive traffic insight and control enables more informed policy decisions and better security.<\/li>\n<li><strong>Safely enable applications, users and content.<\/strong> Allow the traffic and applications you want, deny all others, and grant access based on user need and credentials.<\/li>\n<li><strong>Block lateral movement of cyberthreats (e.g., malware).<\/strong> Exerting application-level controls in between VMs reduces the threat footprint; policies can be applied to block known and unknown threats.<\/li>\n<li><strong>Deploy new applications and next-generation security in an automated manner. <\/strong>Native management features (e.g. bootstrapping, dynamic address groups, fully documented XML API) enable automated policy updates and deployments.<\/li>\n<li><strong>Policy consistency and cohesiveness across virtual and physical firewall form factors.<\/strong> A simplified, centrally managed network security management offering is a must.<\/li>\n<\/ul>\n<p>The\u00a0 <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/vm-series-virtual-next-generation-firewall\">Palo Alto Networks VM-Series<\/a> can help you accomplish all these things and more in the public cloud. But don\u2019t take our word for it.\u00a0 Take a FREE <a href=\"https:\/\/www.paloaltonetworks.com\/events\/test-drive.html\">Virtual Ultimate Test Drive<\/a> and witness the virtual firewalls live and in action.<\/p>\n<p>To learn more, get your guide to the <a href=\"http:\/\/go.paloaltonetworks.com\/top10publiccloud\">Top 10 Public Cloud Security Recommendations<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Only YOU can secure your data in the public cloud. Learn how to secure your workloads in the public cloud.<\/p>\n","protected":false},"author":249,"featured_media":46704,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113],"tags":[876,215],"coauthors":[2745],"class_list":["post-46419","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing-2","tag-public-cloud","tag-security"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/10\/tech-tips-web-banner-1-011.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/46419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/249"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=46419"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/46419\/revisions"}],"predecessor-version":[{"id":46434,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/46419\/revisions\/46434"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/46704"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=46419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=46419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=46419"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=46419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}