{"id":3469,"date":"2016-07-27T16:52:56","date_gmt":"2016-07-27T16:52:56","guid":{"rendered":"https:\/\/209.235.70.100\/?p=3469"},"modified":"2019-12-24T16:53:44","modified_gmt":"2019-12-24T16:53:44","slug":"7-steps-to-developing-a-cloud-security-plan","status":"publish","type":"post","link":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/","title":{"rendered":"7 Steps to Developing a Cloud Security Plan"},"content":{"rendered":"\n

Securing the cloud remains a top priority for IT executives; however many organizations are managing complex IT infrastructures and struggle to determine where to begin with developing cloud security<\/a> measures. IT executives often cite worries over security as a reason why they are not taking greater advantage of cloud services. <\/p>\n\n\n\n

In actuality, security is both a management and technology undertaking. For enterprises that rely on cloud services, it also requires a close working relationship with the cloud provider and a clear understanding of the shared responsibilities.<\/p>\n\n\n\n

No matter a company\u2019s size, it\u2019s important to keep these three considerations in mind: <\/p>\n\n\n\n

  1. No company is immune from attack:<\/strong> Past data breaches serve as a reminder that no company is immune from attack. A careless employee, a misplaced USB drive, credentials stolen via phishing\u2014these and other incidents happen daily. While the right security can block attacks and limit their damage, no security plan can deliver 100 percent protection all the time. <\/li>
  2. Focus on fundamentals:<\/strong> When evaluating some of the headline making data breaches, it becomes clear that fundamental security measures were often missing. In some cases, firewalls were not implemented and password security standards were lax. More attention to basics might not have prevented the attacks, but it could have mitigated the damage. <\/li>
  3. Segmentation and isolation:<\/strong> The ability of hackers to gain access once, and then roam entire networks seemingly at will, has highlighted the value of network segmentation strategies that make it possible to isolate locations where malware is at work and lessen the potential damage. My team strongly advocates for a layered security approach<\/a> to combat breaches at every digital touchpoint. <\/li><\/ol>\n\n\n\n

    Cloud-based IT systems may be complicated, but there are simple steps that any company can take to help them through the security development process. Navisite has developed a checklist<\/a> that can be used by enterprise security, compliance and IT professionals as a manageable framework for crafting a successful cloud computing security plan. <\/p>\n\n\n\n

    Pictured below, the process defines seven sequential steps that have been tested and refined through our own experiences helping hundreds of companies secure enterprise resources.<\/p>\n\n\n\n

    \"\"<\/figure>\n\n\n\n

    By following these steps, the enterprise can rely on a proven methodology for cost-effectively and securely leveraging cloud services<\/a>.<\/p>\n\n\n\n

    Whether your IT is hosted on-premise or in the cloud, it\u2019s imperative that your team carefully designs and implements an enterprise security plan. Security in the cloud is inevitably a close partnership between client and provider<\/a>. The above checklist can serve as a manageable process framework for enterprise security, compliance and IT professionals to craft a successful cloud computing security plan.<\/p>\n\n\n\n

    To learn more about each of the seven steps, download the white paper 7 Steps to Developing a Cloud Security Plan<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":114,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"acf":[],"yoast_head":"\n7 Steps to Developing a Cloud Security Plan - Navisite<\/title>\n<meta name=\"description\" content=\"Securing the cloud remains a top priority for IT executives; however many organizations are managing complex IT infrastructures and struggle to determine\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Steps to Developing a Cloud Security Plan\" \/>\n<meta property=\"og:description\" content=\"Securing the cloud remains a top priority for IT executives; however many organizations are managing complex IT infrastructures and struggle to determine\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"Navisite\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-27T16:52:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-24T16:53:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/209.235.70.100\/wp-content\/uploads\/2019\/12\/7-Steps-to-Developing-a-Cloud-Security-Plan-Navisite-Infographic_0.png\" \/>\n<meta name=\"author\" content=\"Megan Ferringer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@navisite\" \/>\n<meta name=\"twitter:site\" content=\"@navisite\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Megan Ferringer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/\"},\"author\":{\"name\":\"Megan Ferringer\",\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/person\/99bad6e33cc6d3ac27337400026e4a9f\"},\"headline\":\"7 Steps to Developing a Cloud Security Plan\",\"datePublished\":\"2016-07-27T16:52:56+00:00\",\"dateModified\":\"2019-12-24T16:53:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/\"},\"wordCount\":476,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.navisite.com\/#organization\"},\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/\",\"url\":\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/\",\"name\":\"7 Steps to Developing a Cloud Security Plan - Navisite\",\"isPartOf\":{\"@id\":\"https:\/\/www.navisite.com\/#website\"},\"datePublished\":\"2016-07-27T16:52:56+00:00\",\"dateModified\":\"2019-12-24T16:53:44+00:00\",\"description\":\"Securing the cloud remains a top priority for IT executives; however many organizations are managing complex IT infrastructures and struggle to determine\",\"breadcrumb\":{\"@id\":\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.navisite.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Steps to Developing a Cloud Security Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.navisite.com\/#website\",\"url\":\"https:\/\/www.navisite.com\/\",\"name\":\"Navisite\",\"description\":\"Elevate Your Cloud Journey\",\"publisher\":{\"@id\":\"https:\/\/www.navisite.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.navisite.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.navisite.com\/#organization\",\"name\":\"Navisite\",\"url\":\"https:\/\/www.navisite.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.navisite.com\/wp-content\/uploads\/2020\/02\/logo.svg\",\"contentUrl\":\"https:\/\/www.navisite.com\/wp-content\/uploads\/2020\/02\/logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Navisite\"},\"image\":{\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/navisite\",\"https:\/\/www.instagram.com\/navisite\/\",\"https:\/\/www.linkedin.com\/company\/navisite\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/person\/99bad6e33cc6d3ac27337400026e4a9f\",\"name\":\"Megan Ferringer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.navisite.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.navisite.com\/wp-content\/uploads\/2021\/02\/IMG-0529-150x150.jpg\",\"contentUrl\":\"https:\/\/www.navisite.com\/wp-content\/uploads\/2021\/02\/IMG-0529-150x150.jpg\",\"caption\":\"Megan Ferringer\"},\"description\":\"Megan is the Content Marketing Manager at Navisite with more than 10 years of experience helping brands discover and tell their stories. From working at a global non-profit organization to boutique marketing agencies in Chicago, she champions the power of storytelling across all industries.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"7 Steps to Developing a Cloud Security Plan - Navisite","description":"Securing the cloud remains a top priority for IT executives; however many organizations are managing complex IT infrastructures and struggle to determine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/","og_locale":"en_US","og_type":"article","og_title":"7 Steps to Developing a Cloud Security Plan","og_description":"Securing the cloud remains a top priority for IT executives; however many organizations are managing complex IT infrastructures and struggle to determine","og_url":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/","og_site_name":"Navisite","article_published_time":"2016-07-27T16:52:56+00:00","article_modified_time":"2019-12-24T16:53:44+00:00","og_image":[{"url":"https:\/\/209.235.70.100\/wp-content\/uploads\/2019\/12\/7-Steps-to-Developing-a-Cloud-Security-Plan-Navisite-Infographic_0.png"}],"author":"Megan Ferringer","twitter_card":"summary_large_image","twitter_creator":"@navisite","twitter_site":"@navisite","twitter_misc":{"Written by":"Megan Ferringer","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/#article","isPartOf":{"@id":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/"},"author":{"name":"Megan Ferringer","@id":"https:\/\/www.navisite.com\/#\/schema\/person\/99bad6e33cc6d3ac27337400026e4a9f"},"headline":"7 Steps to Developing a Cloud Security Plan","datePublished":"2016-07-27T16:52:56+00:00","dateModified":"2019-12-24T16:53:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/"},"wordCount":476,"commentCount":0,"publisher":{"@id":"https:\/\/www.navisite.com\/#organization"},"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/","url":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/","name":"7 Steps to Developing a Cloud Security Plan - Navisite","isPartOf":{"@id":"https:\/\/www.navisite.com\/#website"},"datePublished":"2016-07-27T16:52:56+00:00","dateModified":"2019-12-24T16:53:44+00:00","description":"Securing the cloud remains a top priority for IT executives; however many organizations are managing complex IT infrastructures and struggle to determine","breadcrumb":{"@id":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.navisite.com\/blog\/7-steps-to-developing-a-cloud-security-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.navisite.com\/"},{"@type":"ListItem","position":2,"name":"7 Steps to Developing a Cloud Security Plan"}]},{"@type":"WebSite","@id":"https:\/\/www.navisite.com\/#website","url":"https:\/\/www.navisite.com\/","name":"Navisite","description":"Elevate Your Cloud Journey","publisher":{"@id":"https:\/\/www.navisite.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.navisite.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.navisite.com\/#organization","name":"Navisite","url":"https:\/\/www.navisite.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.navisite.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.navisite.com\/wp-content\/uploads\/2020\/02\/logo.svg","contentUrl":"https:\/\/www.navisite.com\/wp-content\/uploads\/2020\/02\/logo.svg","width":1,"height":1,"caption":"Navisite"},"image":{"@id":"https:\/\/www.navisite.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/navisite","https:\/\/www.instagram.com\/navisite\/","https:\/\/www.linkedin.com\/company\/navisite"]},{"@type":"Person","@id":"https:\/\/www.navisite.com\/#\/schema\/person\/99bad6e33cc6d3ac27337400026e4a9f","name":"Megan Ferringer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.navisite.com\/#\/schema\/person\/image\/","url":"https:\/\/www.navisite.com\/wp-content\/uploads\/2021\/02\/IMG-0529-150x150.jpg","contentUrl":"https:\/\/www.navisite.com\/wp-content\/uploads\/2021\/02\/IMG-0529-150x150.jpg","caption":"Megan Ferringer"},"description":"Megan is the Content Marketing Manager at Navisite with more than 10 years of experience helping brands discover and tell their stories. From working at a global non-profit organization to boutique marketing agencies in Chicago, she champions the power of storytelling across all industries."}]}},"publishpress_future_action":{"enabled":false,"date":"1970-01-01 00:00:00","action":"","terms":[],"taxonomy":"","browser_timezone_offset":0},"_links":{"self":[{"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/posts\/3469"}],"collection":[{"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/users\/114"}],"replies":[{"embeddable":true,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/comments?post=3469"}],"version-history":[{"count":0,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/posts\/3469\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/media?parent=3469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/categories?post=3469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.navisite.com\/wp-json\/wp\/v2\/tags?post=3469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}