{"id":7554,"date":"2013-05-28T19:09:00","date_gmt":"2013-05-28T19:09:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2676350"},"modified":"2013-05-28T19:09:00","modified_gmt":"2013-05-28T19:09:00","slug":"governance-strategies-for-successful-cloud-initiatives","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/governance-strategies-for-successful-cloud-initiatives\/","title":{"rendered":"Governance Strategies for Successful Cloud Initiatives"},"content":{"rendered":"<p>At the top of many IT group\u2019s list of concerns lie security, compliance and internal process governance \u2013 both in static data centers and in dynamic clouds. Indeed, governance should not be overlooked. And, as they say in many security circles, the best measure of successful security is silence. Although the discussion around governance in the cloud has evolved, many organizations still struggle with questions such as:<br \/>\nWhich apps should we deploy to public clouds?<br \/>\nWhen and where should cloud environments be encrypted?<br \/>\nWho has access to cloud-based applications and infrastructure?<br \/>\nWhich firewall rules should apply?<br \/>\nHow do security rules differ from app to app based on the application\u2019s lifecycle phase? <\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2676350\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At the top of many IT group&rsquo;s list of concerns lie security, compliance and internal process governance &ndash; both in static data centers and in dynamic clouds. Indeed, governance should not be overlooked. And, as they say in many security circles, the best measure of successful security is silence. Although the discussion around governance in the cloud has evolved, many organizations still struggle with questions such as:<br \/>\nWhich apps should we deploy to public clouds?<br \/>\nWhen and where should cloud environments be encrypted?<br \/>\nWho has access to cloud-based applications and infrastructure?<br \/>\nWhich firewall rules should apply?<br \/>\nHow do security rules differ from app to app based on the application&rsquo;s lifecycle phase? <\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2676350\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-7554","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/7554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=7554"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/7554\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=7554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=7554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=7554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}