{"id":2474,"date":"2012-07-03T16:27:00","date_gmt":"2012-07-03T16:27:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2307346"},"modified":"2012-07-03T16:27:00","modified_gmt":"2012-07-03T16:27:00","slug":"the-four-way-stop-at-the-cloud-security-crossroads","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/the-four-way-stop-at-the-cloud-security-crossroads\/","title":{"rendered":"The Four-Way Stop at the Cloud Security Crossroads"},"content":{"rendered":"<p>Cloud security is in a state of flux. Actually it\u2019s not really, but discussion is rife across the industry regarding the general state of cloud data and application welfare. Questions flutter around whether particular services are secure, whether multi-tenant clouds can be locked down and whether \u201cspun down\u201d instances of cloud servers will remain secure so that old customer data is deleted and non-accessible.<br \/>\nWhere are we headed with the general consensus on cloud security just now?<br \/>\nOf course we should start out from first principles and look to comments made the big name cloud providers who have pointed out that the cloud is only as secure as the controls you place upon it, i.e., virtualized hosting services do not come with \u201csecurity included\u201d as some sort of free gift&#8230; and so a cloud server is really just a server but delivered as a service.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2307346\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud security is in a state of flux. Actually it\u2019s not really, but discussion is rife across the industry regarding the general state of cloud data and application welfare. Questions flutter around whether particular services are secure, whether mul&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2474","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/2474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=2474"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/2474\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=2474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=2474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=2474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}