{"id":8829,"date":"2013-09-12T14:45:00","date_gmt":"2013-09-12T14:45:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2788993"},"modified":"2013-09-12T14:45:00","modified_gmt":"2013-09-12T14:45:00","slug":"data-everywhere-distributed-data-security-in-the-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/data-everywhere-distributed-data-security-in-the-cloud\/","title":{"rendered":"Data Everywhere \u2013 Distributed Data Security in the Cloud"},"content":{"rendered":"<p>Securing your data used to be simpler (if not necessarily easy). You had IT infrastructure in your data center. You adopted security controls at all levels \u2013 from physical security, controlling who could enter the facility, up through the network and system, and application layers. IT security looked a lot like perimeter security in a building \u2013 the valuables are inside, the attackers are outside, so you have good walls and strong locks and monitor what passes through.<br \/>\nThe cloud explodes this model. Today, your data is in your own facility, at a managed hosting provider\u2019s data center, and at your cloud provider. And while you\u2019ve got a specific set of servers and network connections at the hosting provider \u2013 you can even go see your servers if you want to! \u2013 in the cloud you\u2019ve got virtual machines that vary in number and location within the cloud environment. In a dynamic, autoscaling cloud the number of VMs you\u2019re using may change hour to hour. And wait, there\u2019s more \u2013 your employees, customers, and partners are accessing that data not just on IT-approved workstations but on iPads, Android phones, and probably Google Glass before long with the rise of BYOD.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2788993\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing your data used to be simpler (if not necessarily easy). You had IT infrastructure in your data center. You adopted security controls at all levels &ndash; from physical security, controlling who could enter the facility, up through the network and system, and application layers. IT security looked a lot like perimeter security in a building &ndash; the valuables are inside, the attackers are outside, so you have good walls and strong locks and monitor what passes through.<br \/>\nThe cloud explodes this model. Today, your data is in your own facility, at a managed hosting provider&rsquo;s data center, and at your cloud provider. And while you&rsquo;ve got a specific set of servers and network connections at the hosting provider &ndash; you can even go see your servers if you want to! &ndash; in the cloud you&rsquo;ve got virtual machines that vary in number and location within the cloud environment. In a dynamic, autoscaling cloud the number of VMs you&rsquo;re using may change hour to hour. And wait, there&rsquo;s more &ndash; your employees, customers, and partners are accessing that data not just on IT-approved workstations but on iPads, Android phones, and probably Google Glass before long with the rise of BYOD.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2788993\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8829","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=8829"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8829\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=8829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=8829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=8829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}