{"id":6070,"date":"2022-05-15T23:55:15","date_gmt":"2022-05-15T15:55:15","guid":{"rendered":"https:\/\/www.cloudfall.cn\/?page_id=6070"},"modified":"2022-12-28T14:33:49","modified_gmt":"2022-12-28T06:33:49","slug":"%e4%ba%91%e4%b8%ad%e5%ae%89%e5%85%a8%e8%a7%a3%e5%86%b3%e6%96%b9%e6%a1%88","status":"publish","type":"page","link":"https:\/\/www.cloudfall.cn\/en\/?page_id=6070","title":{"rendered":"Security Solutions in the Cloud"},"content":{"rendered":"\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Security in Cloud<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">Is the public cloud itself secure enough? The answer is also yes.<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">By design, hyperscale cloud providers invest billions of dollars to protect their data centers, build security services, invest in staff training, locate security incidents and fix them quickly. This all comes with a higher level of investment, attention and expertise than most organizations dedicate to protecting their local data centers.<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">As we gradually accept and understand the security of the public cloud itself, as an enterprise user, the focus comes to the topic of security &#8220;in&#8221; the public cloud. According to the common responsibility sharing model, we can see that cloud operators are mainly responsible for the security of the cloud itself, while customers will be responsible for the security of the cloud.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1442\" height=\"792\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/image-3.jpeg\" alt=\"\" class=\"wp-image-6082\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-3.jpeg 1442w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-3-768x422.jpeg 768w\" sizes=\"(max-width: 1442px) 100vw, 1442px\" \/><figcaption>AWS Responsibility Sharing Model<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1544\" height=\"846\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/image-5.png\" alt=\"\" class=\"wp-image-6083\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-5.png 1544w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-5-1500x822.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-5-768x421.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-5-1536x842.png 1536w\" sizes=\"(max-width: 1544px) 100vw, 1544px\" \/><figcaption>Azure Responsibility Sharing Model<\/figcaption><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Cloud-based Value Returns<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">When users have a clear understanding of what their organization is doing in terms of business and processes, they can better understand what benefits the organization might gain from a cloud strategy and the costs associated with the migration.<\/p>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>The biggest driver driving organizations to move to the cloud today is cost savings, which is an important and valid consideration<\/li><li>The arrival of the cloud and its associated technologies offers many advantages: elasticity, simplicity and scalability, and for information security scenarios, cloud security and cloud-enabled services have all of these same cost-benefit advantages and technical features<\/li><\/ul>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\"><strong>For information security scenarios, cloud security and cloud-based services also have all of the above cost-benefit advantages and technical features!<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/image-6.png\" alt=\"\" class=\"wp-image-6113\" width=\"707\" height=\"266\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-6.png 2548w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-6-1500x565.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-6-768x289.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-6-1536x579.png 1536w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-6-2048x772.png 2048w\" sizes=\"(max-width: 707px) 100vw, 707px\" \/><\/figure><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Security Solutions in the Cloud<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">We focus on common security scenarios in the cloud, helping enterprise users design, build and operate security systems on the cloud, including cloud-native security tools and cloud-enabled BYOL tools, and maximize the value of security investments while reducing total cost of ownership (TCO) through a combination of cloud-styled native services and native tools.<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">We understand and use cloud-native tools, third-party security tools combined with Cloudfall native tools and services to help users improve and operate scenarios related to architecture security, application security, data security, operational security and cloud-native security.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"2092\" height=\"958\" src=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/12\/image-4.png\" alt=\"\" class=\"wp-image-6632\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/12\/image-4.png 2092w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/12\/image-4-1500x687.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/12\/image-4-768x352.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/12\/image-4-1536x703.png 1536w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/12\/image-4-2048x938.png 2048w\" sizes=\"(max-width: 2092px) 100vw, 2092px\" \/><\/figure>\n\n\n\n<ul style=\"font-style:normal;font-weight:300\"><li><strong>CLoud\uff1a<\/strong>As a user of cloud-native capabilities, we continuously research, apply and optimize cloud and cloud security capabilities<\/li><li><strong>Security\uff1a<\/strong>Focused on professional security operations and management<\/li><li><strong>Complete Lifecycle<\/strong>\uff1aLeveraging our experience and practice in all aspects of the cloud and security lifecycle to help users succeed in their businesses<\/li><\/ul>\n\n\n\n<p style=\"font-size:15px\"><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"2560\" height=\"1159\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/image-8-2560x1159.png\" alt=\"\" class=\"wp-image-6116\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-8-2560x1159.png 2560w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-8-1500x679.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-8-768x348.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-8-1536x696.png 1536w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-8-2048x928.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Mainstream carrier counterpart<\/p>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Maximize the value of cloud-native security according to the characteristics and capabilities of different cloud operators<\/li><li>With reference to the international mainstream security framework (such as CSF\/ATT&amp;CK, etc.) to help customers plan the security construction &#8220;blueprint&#8221;, and through an effective security operation system to help the enterprise security architecture continue to effectively and continuously improve the continuous progression\u2026<\/li><\/ul>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-9 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/image-9-2560x1257.png\" alt=\"\" class=\"wp-image-6123\" width=\"466\" height=\"228\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-9-2560x1257.png 2560w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-9-1500x736.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-9-768x377.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-9-1536x754.png 1536w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-9-2048x1005.png 2048w\" sizes=\"(max-width: 466px) 100vw, 466px\" \/><figcaption>AWS CSF Mapping<\/figcaption><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/Azure-Cloud-Security-Solution-mapped-to-NIST-v-1.1-1.png\" alt=\"\" class=\"wp-image-6125\" width=\"297\" height=\"271\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/Azure-Cloud-Security-Solution-mapped-to-NIST-v-1.1-1.png 1187w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/Azure-Cloud-Security-Solution-mapped-to-NIST-v-1.1-1-768x703.png 768w\" sizes=\"(max-width: 297px) 100vw, 297px\" \/><figcaption>Azure CSF Mapping<\/figcaption><\/figure><\/div><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security in Cloud Is the public cloud itself secure eno [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/6070"}],"collection":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6070"}],"version-history":[{"count":27,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/6070\/revisions"}],"predecessor-version":[{"id":6633,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/6070\/revisions\/6633"}],"wp:attachment":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}