{"id":93460,"date":"2018-10-15T12:00:40","date_gmt":"2018-10-15T19:00:40","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=93460"},"modified":"2019-09-12T03:45:30","modified_gmt":"2019-09-12T10:45:30","slug":"use-automation-maintain-compliance-cloud","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/10\/use-automation-maintain-compliance-cloud\/","title":{"rendered":"Use Automation to Maintain Compliance in the Cloud"},"content":{"rendered":"<p>Too often, organizations make the move to the cloud without considering the impact to compliance. Cloud compliance is an issue for any organization using cloud storage or backup services. You can ensure that your organization achieves compliance in the cloud for PCI DSS, HIPAA, SOC2 and other regulatory requirements, but it takes investigation and persistence to get the answers and documentation you need to prove it. Herein lies the challenge, especially as more data retention and protection rules are introduced around the globe.<\/p>\n<p>Much of the heavy-lifting in regulatory IT compliance comes from ensuring that proper controls are in place over system and data access. During\u00a0 <img loading=\"lazy\" decoding=\"async\"  class=\"size-full wp-image-93461 alignright lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/JH_Picture1.png\" alt=\"\" width=\"547\" height=\"245\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/JH_Picture1.png 547w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/JH_Picture1-230x103.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/JH_Picture1-500x224.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/JH_Picture1-510x228.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/JH_Picture1-89x40.png 89w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/> an audit, an organization must be able to prove the level of access that each user has and how those levels are maintained. This is no small feat. Preparing for an audit, without leveraging automation, may take an organization the better part of a year. The worst part is that compliance is not measured at a point-in-time but your audit is, so if your process is not continuous you can fall out of compliance as soon as auditor finishes their report. For example, today\u2019s deployment release has changed the configuration of a service within one of your cloud accounts and boom, you\u2019re right back at square one.<\/p>\n<p>A surprising trend is starting to emerge among organizations who are progressing through the cloud maturity lifecycle: major improvements in revenue growth, customer satisfaction, and mission success are being directly attributed to improvements in security and compliance. Companies are gaining and retaining loyal customers by providing verifiable proof that confidential data and personal information is continuously stored safely and securely. Once thought of as road blocks in the journey to the cloud, security and compliance are now considered critical ingredients that help organizations differentiate their offerings in the market, win more deals, and achieve mission-critical goals faster.<\/p>\n<p>It doesn\u2019t need to be hard to be compliant in the cloud \u2014 you should just take steps to prepare and share the work across the organization to ensure compliance is maintained. We can help you get started. Join our webinar on <strong>Thursday, Oct. 18 <\/strong>where cloud security and compliance experts will discuss common cloud compliance misconceptions and walk you through how to automate the time-intensive task to save your teams valuable time and allow them to focus on what matters to the business.\u00a0 We\u2019ll share practical advice to get your cloud compliance program in the best shape possible, including:<\/p>\n<ul>\n<li><em>Where to start, whether you\u2019re starting from scratch or modifying your existing program<\/em><\/li>\n<li><em>Who to involve and when<\/em><\/li>\n<li><em>How to manage reporting, audits, and communication<\/em><\/li>\n<\/ul>\n<p><strong>I invite you to register now while spaces are still available.\u00a0<a href=\"http:\/\/go.paloaltonetworks.com\/ComplianceTeamSport\">Click here to register<\/a>.<\/strong><\/p>\n<p>By the way, you can get started measuring your cloud compliance now. Evident offers a simple, one-click compliance report that will show you how your cloud infrastructure measures up. <a href=\"https:\/\/start.paloaltonetworks.com\/evident-multi-cloud-security-trial.html\">Sign up for a\u00a0trial<\/a> here.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how automation can help your team maintain compliance in the cloud.<\/p>\n","protected":false},"author":517,"featured_media":93461,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113,6717,6768],"tags":[1166,6617],"coauthors":[5539],"class_list":["post-93460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing-2","category-products-and-services","category-secure-the-cloud","tag-cloud-security","tag-cloud-security-for-compliance"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/10\/JH_Picture1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/93460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/517"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=93460"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/93460\/revisions"}],"predecessor-version":[{"id":101974,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/93460\/revisions\/101974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/93461"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=93460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=93460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=93460"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=93460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}