{"id":8928,"date":"2013-09-14T14:00:00","date_gmt":"2013-09-14T14:00:00","guid":{"rendered":"https:\/\/cloudcomputing.sys-con.com\/node\/2784544"},"modified":"2013-09-14T14:00:00","modified_gmt":"2013-09-14T14:00:00","slug":"brass-tacks-answering-the-cloud-security-questions-that-matter-2","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/brass-tacks-answering-the-cloud-security-questions-that-matter-2\/","title":{"rendered":"Brass Tacks: Answering the Cloud Security Questions That Matter"},"content":{"rendered":"<p>Strong InfoSec strategies must answer the key questions of who is logging in, what is accessed, when was it changed and how is the IT landscape affected.<br \/>\nEnterprise security can be a labyrinthine, complex beast with many moving parts, dozen upon dozen of requirements, needs, implications, options and alternatives.<br \/>\nBut when we get down to the nitty gritty (the brass tacks if you will), cloud security can be simplified by six simple questions.<\/p>\n<p><a href=\"https:\/\/cloudcomputing.sys-con.com\/node\/2784544\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Strong InfoSec strategies must answer the key questions of who is logging in, what is accessed, when was it changed and how is the IT landscape affected.<br \/>\nEnterprise security can be a labyrinthine, complex beast with many moving parts, dozen upon dozen &#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8928","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=8928"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8928\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=8928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=8928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=8928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}