{"id":592,"date":"2022-04-08T22:27:31","date_gmt":"2022-04-08T18:27:31","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=592"},"modified":"2022-05-24T21:21:58","modified_gmt":"2022-05-24T17:21:58","slug":"cloud-security","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/cloud-security\/","title":{"rendered":"Cloud Security"},"content":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653412850082{padding-top: 20px !important;padding-bottom: 10px !important;}&#8221;][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h1>Cloud Security<\/h1>\n<p class=\"mt-4\">Cloud security is the whole bundle of technology, protocols, and best practices that protect cloud computing environments, applications running in the cloud, and data held in the cloud. Securing cloud services begins with understanding what exactly is being secured, as well as, the system aspects that must be managed.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;692&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653412865129{padding-top: 0px !important;padding-bottom: 20px !important;}&#8221;][vc_column][vc_column_text]As an overview, backend development against security vulnerabilities is largely within the hands of cloud service providers. Aside from choosing a security-conscious provider, clients must focus mostly on proper service configuration and safe use habits. Additionally, clients should be sure that any end-user hardware and networks are properly secured.<\/p>\n<p class=\"mt-3\">The full scope of cloud security is designed to protect the following, regardless of your responsibilities:<\/p>\n<p>[\/vc_column_text][vc_row_inner el_class=&#8221;cloudlist&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Physical Networks<\/h4>\n<p>Routers, Electrical Power, Cabling, Climate Controls, etc.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Data Storage<\/h4>\n<p>Hard Drives, etc.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Data Servers<\/h4>\n<p>Core network computing hardware and software[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1650996612003{padding-top: 35px !important;}&#8221; el_class=&#8221;cloudlist&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Computer Virtualization Frameworks<\/h4>\n<p>Virtual machine software, Host machines, and guest machines[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Operating Systems (Os)<\/h4>\n<p>Software that Houses[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Middleware<\/h4>\n<p>Application programming interface (API) management,[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1650996624372{padding-top: 35px !important;}&#8221; el_class=&#8221;cloudlist&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Runtime Environments<\/h4>\n<p>Execution and upkeep of a running program[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Data<\/h4>\n<p>All the information stored, modified, and accessed[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Applications<\/h4>\n<p>Traditional software services (email, tax software, productivity suites, etc.)[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1650996635824{padding-top: 35px !important;}&#8221; el_class=&#8221;cloudlist&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>End-User Hardware<\/h4>\n<p>Computers, mobile devices, Internet of Things (IoT) devices, etc.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1650996170949{padding-top: 35px !important;}&#8221;][vc_column_inner][vc_column_text]With cloud computing, ownership over these components can vary widely. This can make the scope of client security responsibilities unclear. Since securing the cloud can look different based on who has authority over each component, it\u2019s important to understand how these are commonly grouped.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653412913669{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_btn title=&#8221;View More&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fdemo.dedote.com%2Fcyberdisti%2Fspin%2F&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653412850082{padding-top: 20px !important;padding-bottom: 10px !important;}&#8221;][vc_column width=&#8221;3\/4&#8243;][vc_column_text] Cloud Security Cloud security is the whole bundle of technology, protocols, and best practices that protect cloud computing environments, applications running in&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-592","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=592"}],"version-history":[{"count":16,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/592\/revisions"}],"predecessor-version":[{"id":1249,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/592\/revisions\/1249"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}