{"id":9670,"date":"2015-07-13T14:15:59","date_gmt":"2015-07-13T21:15:59","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9670"},"modified":"2015-07-13T14:02:04","modified_gmt":"2015-07-13T21:02:04","slug":"important-considerations-for-cloud-security-whether-public-or-private","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/07\/important-considerations-for-cloud-security-whether-public-or-private\/","title":{"rendered":"Important Considerations for Cloud Security, Whether Public or Private"},"content":{"rendered":"<p>Security is one of the most critical considerations for cloud\u00a0computing, regardless of whether the deployment is public or private. We recently teamed up with the <a href=\"https:\/\/cloudsecurityalliance.org\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Cloud Security Alliance (CSA)<\/a>\u00a0to offer \u201c<a href=\"https:\/\/cloudsecurityalliance.org\/download\/security-considerations-for-private-vs-public-clouds\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Security Considerations for Private vs. Public Clouds<\/a>,\u201d a whitepaper covering important topics for securing cloud infrastructure, including:<!--more--><\/p>\n<ul>\n<li>Contracts and service level agreements<\/li>\n<li>Roles and responsibilities<\/li>\n<li>Compliance and auditing<\/li>\n<li>Physical and virtual attack surface considerations<\/li>\n<li>Operational challenges, including data migration, logging, monitoring, incident management and recovery<\/li>\n<li>Change management<\/li>\n<\/ul>\n<p>Download the whitepaper <a href=\"https:\/\/cloudsecurityalliance.org\/download\/security-considerations-for-private-vs-public-clouds\/\" rel=\"nofollow,noopener\"  target=\"_blank\">here<\/a>.\u00a0Learn more about the Palo Alto Networks Security Platform, including solutions for VMware, Amazon Web Services, Citrix and KVM environments, on our <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiative\/public-cloud.html\" target=\"_blank\">public cloud<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiative\/private-cloud.html\" target=\"_blank\">private cloud<\/a> resources pages.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is one of the most critical considerations for cloud\u00a0computing, regardless of whether the deployment is public or private. We recently teamed up with the Cloud Security Alliance (CSA)\u00a0to offer \u201cSecurity Considerations &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113,1229],"tags":[814,118,1245,1249,956,875,876,175,585],"coauthors":[716],"class_list":["post-9670","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-2","category-security-platform","tag-amazon-web-services","tag-citrix","tag-cloud-security-alliance","tag-csa","tag-kvm","tag-private-cloud","tag-public-cloud","tag-vmware","tag-whitepaper"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9670"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9670\/revisions"}],"predecessor-version":[{"id":9672,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9670\/revisions\/9672"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9670"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}