{"id":106,"date":"2020-09-09T06:40:59","date_gmt":"2020-09-09T06:40:59","guid":{"rendered":"https:\/\/vticloud-test.tk\/?p=106"},"modified":"2021-03-10T11:06:28","modified_gmt":"2021-03-10T04:06:28","slug":"eng-performance-efficiency","status":"publish","type":"post","link":"https:\/\/vticloud.io\/en\/eng-performance-efficiency\/","title":{"rendered":"Security"},"content":{"rendered":"<p><\/p>\n<p><span style=\"font-family: SupermolotRegular, sans-serif; font-size: 12pt;\">The Security pillar includes the ability to protect data, systems, and assets to take advantage of cloud technologies to improve your security. Key topics include confidentiality and integrity of data, identifying and managing who can do what with privilege management, protecting systems, and establishing controls to detect security events.<\/span><\/p>\n<p><span style=\"font-family: SupermolotRegular, sans-serif; font-size: 12pt;\">There are seven design principles for security in the cloud:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"font-family: SupermolotRegular, sans-serif; font-size: 12pt;\">Implement a strong identity foundation<\/span><\/li>\n<li><span style=\"font-family: SupermolotRegular, sans-serif; font-size: 12pt;\">Enable traceability<\/span><\/li>\n<li><span style=\"font-family: SupermolotRegular, sans-serif; font-size: 12pt;\">Apply security at all layers<\/span><\/li>\n<li><span style=\"font-family: SupermolotRegular, sans-serif; font-size: 12pt;\">Automate security best practices<\/span><\/li>\n<li><span style=\"font-family: SupermolotRegular, sans-serif; font-size: 12pt;\">Protect data in transit and at rest<\/span><\/li>\n<li><span style=\"font-family: SupermolotRegular, sans-serif; font-size: 12pt;\">Keep people away from data<\/span><\/li>\n<li><span style=\"font-family: SupermolotRegular, sans-serif; font-size: 12pt;\">Prepare for security events<\/span><\/li>\n<\/ul>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>The security pillar describes how to take advantage of cloud technologies to protect data, systems, and assets in a way that can improve your security posture.<\/p>\n","protected":false},"author":1,"featured_media":404,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[],"_links":{"self":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts\/106"}],"collection":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/comments?post=106"}],"version-history":[{"count":0,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts\/106\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/media\/404"}],"wp:attachment":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/media?parent=106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/categories?post=106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/tags?post=106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}