{"id":8952,"date":"2013-09-20T14:45:00","date_gmt":"2013-09-20T14:45:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2800446"},"modified":"2013-09-20T14:45:00","modified_gmt":"2013-09-20T14:45:00","slug":"understanding-the-fundamentals-of-cloud-security-for-healthcare-2","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/understanding-the-fundamentals-of-cloud-security-for-healthcare-2\/","title":{"rendered":"Understanding the Fundamentals of Cloud Security for Healthcare"},"content":{"rendered":"<p>Continuing our discussion from my last blog in July, perhaps it\u2019s helpful to drive deeper into security approaches and technology for use within clouds that serve the healthcare vertical.  We\u2019ll start by focusing on the fundamentals of cloud security for healthcare.  However, some of this is transferable to other verticals as well.<br \/>\nFirst fundamental: Understand the data that will reside in the cloud.<br \/>\nHealthcare data has something in common.  It\u2019s dangerous to manage, unless you know exactly what you\u2019re dealing with.<br \/>\nAs we migrate health data to the cloud, it\u2019s important to understand the data that will reside in the cloud-based systems, in terms of compliance and security requirements.  This means understanding what is PII data, and what is not, as well as dealing with specific security requirements around encryption.  This includes data in flight, and at rest.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2800446\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Continuing our discussion from my last blog in July, perhaps it&rsquo;s helpful to drive deeper into security approaches and technology for use within clouds that serve the healthcare vertical.  We&rsquo;ll start by focusing on the fundamentals of cloud security for healthcare.  However, some of this is transferable to other verticals as well.<br \/>\nFirst fundamental: Understand the data that will reside in the cloud.<br \/>\nHealthcare data has something in common.  It&rsquo;s dangerous to manage, unless you know exactly what you&rsquo;re dealing with.<br \/>\nAs we migrate health data to the cloud, it&rsquo;s important to understand the data that will reside in the cloud-based systems, in terms of compliance and security requirements.  This means understanding what is PII data, and what is not, as well as dealing with specific security requirements around encryption.  This includes data in flight, and at rest.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2800446\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8952","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=8952"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8952\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=8952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=8952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=8952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}