{"id":40426,"date":"2017-08-16T05:00:15","date_gmt":"2017-08-16T12:00:15","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=40426"},"modified":"2017-08-15T14:48:04","modified_gmt":"2017-08-15T21:48:04","slug":"top-10-considerations-securing-public-cloud-workloads","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2017\/08\/top-10-considerations-securing-public-cloud-workloads\/","title":{"rendered":"Top 10 Considerations for Securing Public Cloud Workloads"},"content":{"rendered":"<p>The shift to the public cloud has offered organizations increased agility, flexibility and scalability. However, as more and more organizations move critical workloads to the public cloud, the potential for attackers to steal data, intellectual property or computing resources also rises.<\/p>\n<p>Below is a brief breakdown of three considerations for securing public cloud workloads. <a href=\"http:\/\/go.paloaltonetworks.com\/top10publiccloud\">Download the white paper<\/a> to view the detailed list of all 10 top considerations.<\/p>\n<ol>\n<li><strong>Embrace the shared security model<\/strong>: The infrastructure is secured by the cloud service provider, but users are responsible for securing their own applications and <img loading=\"lazy\" decoding=\"async\"  class=\"size-full wp-image-40429 alignright lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/08\/Cloudworkflows.png\" alt=\"Cloudworkflows\" width=\"800\" height=\"291\" \/>data as it resides in the cloud. With this in mind, security practices must be implemented to secure workloads in the cloud as well as prevent loss of data and IP, just as if the workloads were on-premise.<\/li>\n<li><strong>Engage with business groups and DevOps early<\/strong>: Security teams and respective business groups, such as DevOps, should work collectively \u2013 particularly during initial stages of public cloud projects \u2013 to ensure all development needs are met while still maintaining a healthy security posture.<\/li>\n<li><strong>Know your potential exposure<\/strong>: Monitor public cloud usage, ensure proper configuration of the environment, enforce two-factor authentication, and properly lock down Secure Shell (SSH) access to gain visibility and minimize potential exposure through \u201cshadow IT.\u201d<\/li>\n<\/ol>\n<p>Read the full list of our <a href=\"http:\/\/go.paloaltonetworks.com\/top10publiccloud\">Top 10 Considerations for Securing Public Cloud Workloads<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eila Shargh shares the top 10 considerations for securing public cloud workloads.<\/p>\n","protected":false},"author":226,"featured_media":20592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113],"tags":[120,876],"coauthors":[2416],"class_list":["post-40426","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing-2","tag-cybersecurity","tag-public-cloud"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/40426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=40426"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/40426\/revisions"}],"predecessor-version":[{"id":40459,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/40426\/revisions\/40459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=40426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=40426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=40426"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=40426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}