{"id":8148,"date":"2023-04-11T12:40:11","date_gmt":"2023-04-11T10:40:11","guid":{"rendered":"https:\/\/anexia.com\/blog\/?p=8148"},"modified":"2023-04-12T14:16:45","modified_gmt":"2023-04-12T12:16:45","slug":"9-questions-about-cloud-security","status":"publish","type":"post","link":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/","title":{"rendered":"9 questions about cloud security"},"content":{"rendered":"<h2>How secure is cloud computing? What are the potential risks?<\/h2>\n<p>Cloud computing can be very secure if both the cloud provider and the cloud user take appropriate security measures. As with any technology, there are potential security risks to using cloud computing services that you should be aware of. These include data breaches, security breaches, and service outages.<\/p>\n<ul>\n<li>Data breaches can result from inadequate security measures or malicious attacks and can expose sensitive information to unauthorized parties.<\/li>\n<li>Security breaches can also result from improper configuration or lack of patches, leaving systems vulnerable to malicious actors.<\/li>\n<li>Service outages can occur due to maintenance or unexpected demand, limiting or preventing access to data and applications.<\/li>\n<\/ul>\n<p>To mitigate these risks, organizations must ensure that they select a cloud provider with strong security measures in place. It is also important that the provider regularly monitors usage and activity patterns for suspicious activity and ensures that all patches and updates are applied to the system as soon as they are released. In addition, contingency plans are required in the event of a system failure to always ensure business continuity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8128\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-300x75.png\" alt=\"Darstellung der Risiken von Cloud Computing\" width=\"600\" height=\"150\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-300x75.png 300w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-1024x256.png 1024w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-768x192.png 768w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-1536x384.png 1536w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken.png 1800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2>Which cloud is the most secure?<\/h2>\n<p>The security of a cloud environment depends on many factors, including the technology used and the provider&#8217;s policies and procedures. The most secure cloud will have comprehensive data encryption and authentication protocols, as well as regular security audits to ensure that all potential threats are addressed.<\/p>\n<p>Organizations should also consider their internal security policies when selecting a cloud provider to ensure that all data is adequately protected. Ultimately, the most secure cloud solution is one that is customized to the specific needs of an organization and its industry.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8131\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-SicherheitAnbieter-300x75.png\" alt=\"Darstellung der Frage welche Cloud am Sichersten ist\" width=\"600\" height=\"150\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-SicherheitAnbieter-300x75.png 300w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-SicherheitAnbieter-1024x257.png 1024w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-SicherheitAnbieter-768x192.png 768w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-SicherheitAnbieter-1536x385.png 1536w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-SicherheitAnbieter.png 1800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2>What are the best practices for backups in the cloud?<\/h2>\n<p>When securing data to the cloud, it&#8217;s important to follow an up-to-date and comprehensive plan. This should include regular backups and a disaster recovery strategy. Organizations must also ensure that their backup systems are secure by encrypting all data and limiting access to authorized personnel. It&#8217;s also essential to test backups regularly to make sure they&#8217;re working properly. This can help identify potential problems before they cause additional difficulties in the event of an emergency. Following these best practices can help ensure that data remains safe and accessible in the event of a disaster.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8133\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-bestpracticesBackup-300x75.png\" alt=\"Darstellung der besten Backup Praktiken\" width=\"600\" height=\"150\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-bestpracticesBackup-300x75.png 300w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-bestpracticesBackup-1024x257.png 1024w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-bestpracticesBackup-768x192.png 768w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-bestpracticesBackup-1536x385.png 1536w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-bestpracticesBackup.png 1800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2>Are there any cloud-specific risks to consider?<\/h2>\n<p>Yes, there are some cloud-specific risks. These include data breaches due to hacking or unauthorized access, and compliance violations if companies fail to follow regulations. Companies should also consider the risk of being temporarily disconnected by a provider. This can happen if a provider blocks access to the cloud for technical or security reasons. Enterprises should also be aware of potential system outages that can cause downtime and impact business operations. By taking proactive steps to identify and mitigate these risks, organizations can ensure that their data remains secure and compliant in the cloud.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8134\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-1-300x75.png\" alt=\"Darstellung von Cloud spezifischen Risiken\" width=\"600\" height=\"150\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-1-300x75.png 300w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-1-1024x256.png 1024w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-1-768x192.png 768w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-1-1536x384.png 1536w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Risiken-1.png 1800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2>Can a cloud go down?<\/h2>\n<p>Yes, cloud infrastructure can fail due to an outage or other technical issue, but this is very rare. This can be caused by a variety of factors such as power outages, hardware or software failures. It&#8217;s important for organizations to have a plan in place to respond to a cloud incident to preserve and protect their data. With these measures in place, organizations can minimize downtime and ensure that their systems remain operational.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8136\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-CloudAusfall-300x75.png\" alt=\"Darstellung eines Ausfall der Cloud\" width=\"600\" height=\"150\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-CloudAusfall-300x75.png 300w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-CloudAusfall-1024x256.png 1024w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-CloudAusfall-768x192.png 768w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-CloudAusfall-1536x384.png 1536w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-CloudAusfall.png 1800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2>Can a cloud be hacked?<\/h2>\n<p>Like all Internet-connected systems, cloud systems are targets for hackers and other security threats. When choosing a cloud provider, it is important to consider the potential risks and ensure that the provider has appropriate security measures in place. These include encryption, access control, and two-factor authentication. In addition, data should be backuped egularly so that it can be quickly restored in the event of a security incident.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8137\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Cloudgehackt-300x75.png\" alt=\"Kann eine Cloud auch gehacked werden\" width=\"600\" height=\"150\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Cloudgehackt-300x75.png 300w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Cloudgehackt-1024x256.png 1024w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Cloudgehackt-768x192.png 768w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Cloudgehackt-1536x384.png 1536w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-Cloudgehackt.png 1800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2>How can companies keep their data safe in the cloud?<\/h2>\n<p>Enterprises can take several steps to ensure the security of their data in the cloud. These include implementing access controls, two-factor authentication, encryption, and regular backups. For particularly sensitive data, companies should also consider using a private cloud or other secure storage solutions. With these measures in place, companies can protect their data and meet security regulations.<\/p>\n<p>There are several ways companies can ensure the security of their data in the cloud:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Encryption: Encrypting sensitive data before uploading it to the cloud can increase its protection.<\/li>\n<li>Access control: Using access controls can ensure that only authorized individuals can access data.<\/li>\n<li>Monitoring and logging: Monitoring and logging access attempts and activity can help identify and remediate potential security breaches.<\/li>\n<li>Multifactor authentication: Multi-factor authentication can help ensure that only authorized individuals can access data.<\/li>\n<li>Secure configuration: Secure configuration of cloud infrastructure and applications can help prevent potential attacks.<\/li>\n<li>Regular security audits: Regular security audits of the cloud by internal or external experts can help identify and address potential vulnerabilities.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-8139\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-UnternehmenCloudSicherheit-300x75.png\" alt=\"\" width=\"600\" height=\"150\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-UnternehmenCloudSicherheit-300x75.png 300w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-UnternehmenCloudSicherheit-1024x256.png 1024w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-UnternehmenCloudSicherheit-768x192.png 768w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-UnternehmenCloudSicherheit-1536x384.png 1536w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-UnternehmenCloudSicherheit.png 1800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2>What measures are taken to keep data in the cloud secure?<\/h2>\n<p>&nbsp;<\/p>\n<p>Cloud-Anbieter ergreifen verschiedene Ma\u00dfnahmen, um die Sicherheit der Daten in der Cloud zu gew\u00e4hrleisten.<\/p>\n<p>Cloud providers take several steps to ensure the security of data in the cloud.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>Use encrypted transfer protocols to ensure that data cannot be read in transit between the user and the cloud.<\/li>\n<li>Use of encrypted storage media to ensure that data is unreadable, even if the media is physically accessed.<\/li>\n<li>Continuously update all software components to ensure that all systems are patchable.<\/li>\n<li>The installation of firewalls and two-factor authentication to secure user accounts, and the use of intrusion detection systems (IDS) to limit access to authorized individuals and detect unwanted activity early.<\/li>\n<li>Periodic reviews by internal or external experts to identify and remediate potential vulnerabilities.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8138\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-massnahmenCloudSicherheit-300x75.png\" alt=\"Grafik mit verschiedenen Ma\u00dfnahmen zur Cloud Sicherheit\" width=\"600\" height=\"150\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-massnahmenCloudSicherheit-300x75.png 300w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-massnahmenCloudSicherheit-1024x256.png 1024w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-massnahmenCloudSicherheit-768x192.png 768w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-massnahmenCloudSicherheit-1536x384.png 1536w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-massnahmenCloudSicherheit.png 1800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2>What is an intrusion detection system and what is it used for?<\/h2>\n<p>An intrusion detection system (IDS) is security software that detects malicious or unwanted activity on a computer or network system. There are two main types of IDS: network IDS and host IDS. A network IDS looks for unwanted activity at the network level, while a host IDS looks for unwanted activity at the system level.<\/p>\n<p>An IDS can operate in a variety of ways, including monitoring network traffic, comparing behavior patterns to known attack methods, or analyzing system events. When an IDS detects suspicious activity, it can send a notification or take action, such as blocking network traffic or terminating processes. IDSs are widely used in enterprises to ensure the security of networks and systems and to detect irregularities early.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8140\" src=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-IDS-300x75.png\" alt=\"Darstellung Intrusion Didection System\" width=\"600\" height=\"150\" srcset=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-IDS-300x75.png 300w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-IDS-1024x256.png 1024w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-IDS-768x192.png 768w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-IDS-1536x384.png 1536w, https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/03\/CloudSecurity-IDS.png 1800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2>Related Links<\/h2>\n<p><a href=\"https:\/\/anexia.com\/blog\/en\/cloud-security\/\" target=\"_blank\" rel=\"noopener\">Cloud security in relation with cloud computing \u2192<\/a><\/p>\n<p><a href=\"https:\/\/anexia.com\/blog\/en\/anexia-is-cloud-security-alliance-member\/\" target=\"_blank\" rel=\"noopener\">Anexia is Cloud Security Alliance member \u2192<\/a><\/p>\n<p><a href=\"https:\/\/anexia.com\/blog\/en\/the-3-best-backup-strategies-for-your-data-backup\/\">The 3 best backup strategies for your data backup \u2192<\/a><\/p>\n<p><a href=\"https:\/\/anexia.com\/en\/hosting-it-solutions\/it-solutions\/anexia-onlinebackup\" target=\"_blank\" rel=\"noopener\">Anexia Online Backup \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What details to consider and how to ensure cloud security.<\/p>\n","protected":false},"author":45,"featured_media":8168,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1129],"tags":[1520,2229,2380,1379],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>9 questions about cloud security - ANEXIA Blog<\/title>\n<meta name=\"description\" content=\"We answer questions about cloud security. What risks should be considered, how can cloud security be ensured? More \u2192\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"9 questions about cloud security - ANEXIA Blog\" \/>\n<meta property=\"og:description\" content=\"We answer questions about cloud security. What risks should be considered, how can cloud security be ensured? More \u2192\" \/>\n<meta property=\"og:url\" content=\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ANEXIA Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/anexiagmbh\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-11T10:40:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-12T12:16:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/04\/CloudSecurity_Teaser.png\" \/>\n\t<meta property=\"og:image:width\" content=\"672\" \/>\n\t<meta property=\"og:image:height\" content=\"372\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michael Hiess\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@_ANEXIA\" \/>\n<meta name=\"twitter:site\" content=\"@_ANEXIA\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Hiess\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/\",\"url\":\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/\",\"name\":\"9 questions about cloud security - ANEXIA Blog\",\"isPartOf\":{\"@id\":\"https:\/\/anexia.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/04\/CloudSecurity_Teaser.png\",\"datePublished\":\"2023-04-11T10:40:11+00:00\",\"dateModified\":\"2023-04-12T12:16:45+00:00\",\"author\":{\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/e7946a6bab568c25f2c18bf24f34443e\"},\"description\":\"We answer questions about cloud security. What risks should be considered, how can cloud security be ensured? More \u2192\",\"breadcrumb\":{\"@id\":\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#primaryimage\",\"url\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/04\/CloudSecurity_Teaser.png\",\"contentUrl\":\"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/04\/CloudSecurity_Teaser.png\",\"width\":672,\"height\":372,\"caption\":\"Cloud Securitys\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/anexia.com\/blog\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"9 questions about cloud security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/anexia.com\/blog\/#website\",\"url\":\"https:\/\/anexia.com\/blog\/\",\"name\":\"ANEXIA Blog\",\"description\":\"[:de] ANEXIA Blog - Technischen Themen, Anexia News und Insights [:]\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/anexia.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/e7946a6bab568c25f2c18bf24f34443e\",\"name\":\"Michael Hiess\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/anexia.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d32af87c2164766d42f6c2fdfee9926d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d32af87c2164766d42f6c2fdfee9926d?s=96&d=mm&r=g\",\"caption\":\"Michael Hiess\"},\"url\":\"https:\/\/anexia.com\/blog\/author\/mhiess\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"9 questions about cloud security - ANEXIA Blog","description":"We answer questions about cloud security. What risks should be considered, how can cloud security be ensured? More \u2192","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/","og_locale":"de_DE","og_type":"article","og_title":"9 questions about cloud security - ANEXIA Blog","og_description":"We answer questions about cloud security. What risks should be considered, how can cloud security be ensured? More \u2192","og_url":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/","og_site_name":"ANEXIA Blog","article_publisher":"https:\/\/www.facebook.com\/anexiagmbh\/","article_published_time":"2023-04-11T10:40:11+00:00","article_modified_time":"2023-04-12T12:16:45+00:00","og_image":[{"width":672,"height":372,"url":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/04\/CloudSecurity_Teaser.png","type":"image\/png"}],"author":"Michael Hiess","twitter_card":"summary_large_image","twitter_creator":"@_ANEXIA","twitter_site":"@_ANEXIA","twitter_misc":{"Verfasst von":"Michael Hiess","Gesch\u00e4tzte Lesezeit":"8\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/","url":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/","name":"9 questions about cloud security - ANEXIA Blog","isPartOf":{"@id":"https:\/\/anexia.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/04\/CloudSecurity_Teaser.png","datePublished":"2023-04-11T10:40:11+00:00","dateModified":"2023-04-12T12:16:45+00:00","author":{"@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/e7946a6bab568c25f2c18bf24f34443e"},"description":"We answer questions about cloud security. What risks should be considered, how can cloud security be ensured? More \u2192","breadcrumb":{"@id":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#primaryimage","url":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/04\/CloudSecurity_Teaser.png","contentUrl":"https:\/\/anexia.com\/blog\/wp-content\/uploads\/2023\/04\/CloudSecurity_Teaser.png","width":672,"height":372,"caption":"Cloud Securitys"},{"@type":"BreadcrumbList","@id":"https:\/\/anexia.com\/blog\/en\/9-questions-about-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/anexia.com\/blog\/de\/"},{"@type":"ListItem","position":2,"name":"9 questions about cloud security"}]},{"@type":"WebSite","@id":"https:\/\/anexia.com\/blog\/#website","url":"https:\/\/anexia.com\/blog\/","name":"ANEXIA Blog","description":"[:de] ANEXIA Blog - Technischen Themen, Anexia News und Insights [:]","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/anexia.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/e7946a6bab568c25f2c18bf24f34443e","name":"Michael Hiess","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/anexia.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d32af87c2164766d42f6c2fdfee9926d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d32af87c2164766d42f6c2fdfee9926d?s=96&d=mm&r=g","caption":"Michael Hiess"},"url":"https:\/\/anexia.com\/blog\/author\/mhiess\/"}]}},"lang":"en","translations":{"en":8148,"de":8122},"amp_enabled":true,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/8148"}],"collection":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/comments?post=8148"}],"version-history":[{"count":13,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/8148\/revisions"}],"predecessor-version":[{"id":8176,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/posts\/8148\/revisions\/8176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/media\/8168"}],"wp:attachment":[{"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/media?parent=8148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/categories?post=8148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anexia.com\/blog\/wp-json\/wp\/v2\/tags?post=8148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}