{"id":2207,"date":"2017-09-26T11:05:13","date_gmt":"2017-09-26T15:05:13","guid":{"rendered":"https:\/\/zzzptm.com\/wordpress\/?p=2207"},"modified":"2017-09-26T11:05:39","modified_gmt":"2017-09-26T15:05:39","slug":"2207","status":"publish","type":"post","link":"https:\/\/zzzptm.com\/wordpress\/?p=2207","title":{"rendered":"A Realistic Process for Dealing with Cloud Breaches"},"content":{"rendered":"<p>Given how cloud breaches are becoming more and more common, I would like to present a realistic process for dealing with them. I say realistic because this is probably already what is going on, but is not documented. So, here goes:<\/p>\n<p>It starts with a proper management reaction when the vendor informs the firm regarding the breach:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/561.gif\" alt=\"\" \/><\/p>\n<p>Then your management will then need to do this privately:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/134.gif\" alt=\"\" \/><\/p>\n<p>But this should be their public reaction to the vendor&#8217;s notification:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/disappoint.jpg\" alt=\"\" \/><\/p>\n<p>Your developers will do this as they inspect the code:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/168.gif\" alt=\"\" \/><\/p>\n<p>Your security team will do this as they look at how the breach was done:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/1111.gif\" alt=\"\" \/><\/p>\n<p>And then do this after they&#8217;re told they have to help clean up the mess:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/114.gif\" alt=\"\" \/><\/p>\n<p>Next, your developers will work hard on a new solution:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/mssql.gif\" alt=\"\" \/><\/p>\n<p>The security team will look over the developers&#8217; solution and offer constructive feedback:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/no.gif\" alt=\"\" \/><\/p>\n<p>So the developers will take that feedback and refine their solution:<\/p>\n<p> <img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/1309.gif\" alt=\"\" \/><\/p>\n<p>The network team may have some concerns on what the developers are hoping they can do in the datacenter:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/89.gif\" alt=\"\" \/><\/p>\n<p>Management may also have to deal with increased budget requests to implement the more secure solution:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/513.gif\" alt=\"\" \/><\/p>\n<p>And all the former employees are doing this as they hear the rumors and read the headlines:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.networking-forums.com\/Smileys\/aaron\/655.gif\" alt=\"\" \/><\/p>\n<p>And that, my friends, is how we can realistically deal with a cloud breach! I thank you for your time in reading this and hope it helps. \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Given how cloud breaches are becoming more and more common, I would like to present a realistic process for dealing with them. I say realistic because this is probably already what is going on, but is not documented. So, here goes: It starts with a proper management reaction when the vendor informs the firm regarding [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,12],"tags":[],"class_list":["post-2207","post","type-post","status-publish","format-standard","hentry","category-complete-fiction","category-security"],"_links":{"self":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2207"}],"version-history":[{"count":2,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2207\/revisions"}],"predecessor-version":[{"id":2209,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2207\/revisions\/2209"}],"wp:attachment":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}