{"id":4758,"date":"2019-01-18T09:11:37","date_gmt":"2019-01-18T08:11:37","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=4758"},"modified":"2019-01-18T09:11:37","modified_gmt":"2019-01-18T08:11:37","slug":"mehr-datensicherheit-in-der-cloud-fuenf-schritte","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/en\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/","title":{"rendered":"More data security in the cloud: Five steps"},"content":{"rendered":"<figure id=\"attachment_4759\" aria-describedby=\"caption-attachment-4759\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4759\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg\" alt=\"\" width=\"680\" height=\"383\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg 680w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator-16x9.jpg 16w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator-311x175.jpg 311w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator-621x350.jpg 621w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator-300x169.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-4759\" class=\"wp-caption-text\">When companies move entire business processes to the cloud, a comprehensive IT security strategy must be considered from the outset. (Source: Fotolia)<\/figcaption><\/figure>\n<p>When companies move entire business processes to the cloud, the expected business objectives can only be achieved if the migration is secured from the outset by a comprehensive IT security strategy - in which the security of the data plays a decisive role. NTT Security outlines the most important activities in five steps.<\/p>\n<h2>1. identify and classify data<\/h2>\n<p>To begin with, companies must determine which applications and data are to be transferred from their own data center to a cloud provider during the migration. For example, it must be clarified what type of data is involved and whether personal data is involved, because then the strict regulations of the GDPR apply. In which applications will the data be used, by whom and how? Is it only read or is it also processed? The security model is built on the basis of this information.<\/p>\n<h2>2. define the level of protection for each step in the workflow<\/h2>\n<p>Based on the classification and risk assessment of the data, the level and class of protection must be determined for each step in the workload. Is encryption needed, and if so, when: during transmission, during storage, at field level? Will pseudonymization or tokens be required? Where should the encryption keys be stored: on-premise, directly with the cloud provider, or with a separate cloud provider?<\/p>\n<h2>3. define rules for access control<\/h2>\n<p>In order to achieve a high level of protection, data must not be accessible without protection at any time during a business process. It must also be ensured that copies of stored or archived data are protected during processing in the same way as the originals and that these copies are deleted when they are no longer required. Depending on roles in the company, access authorizations are assigned and compliance with them is monitored so that no unauthorized person can read, copy, modify or delete data.<\/p>\n<h2>4. record all data accesses in log files<\/h2>\n<p>Companies need to link rules for granting access authorizations with comprehensive log management. Access logs record and store all data activities. These records and the evaluation of all data accesses and other security-relevant events are a prerequisite for seamless IT security monitoring. On the one hand, analysis of the log files enables unusual events to be identified and their causes determined, and on the other hand, it supports companies in tracing all activities during security audits.<\/p>\n<h2>5. observe the life cycle of the data<\/h2>\n<p>Data retention requirements are regulated in detail in the financial services, medical technology, chemical-pharmaceutical and other industries. The protection of personal data over its entire lifecycle is regulated in the GDPR (in Switzerland by the Data Protection Act, but the GDPR also applies to Swiss companies with business relationships in the EU) - regardless of whether the data is located in the company's own data center or in the cloud. For companies, this means that they must permanently retain complete control over personal data, from collection to processing to archiving. This applies to individual and standard applications, regardless of whether they are on-premise or in the cloud.<\/p>\n<p><em>Source and further information: <a href=\"http:\/\/www.nttsecurity.com\/ch\">NTT Security<\/a><\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Wenn Unternehmen komplette Gesch\u00e4ftsprozesse in die Cloud verlagern, lassen sich die erwarteten betriebswirtschaftlichen Ziele nur dann erreichen, wenn die Migration von Anfang an durch eine umfassende IT-Security-Strategie abgesichert ist \u2013 bei der die Sicherheit der Daten eine entscheidende Rolle spielt. NTT Security konkretisiert die wichtigsten Aktivit\u00e4ten in f\u00fcnf Schritten. 1. Daten identifizieren und klassifizieren Zu [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4759,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Cloud","_yoast_wpseo_metadesc":"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.","articlekey":"","footnotes":""},"categories":[27],"tags":[115,123,260],"class_list":["post-4758","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-checklisten","tag-cloud-computing","tag-ict-sicherheit"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mehr Datensicherheit in der Cloud: F\u00fcnf Schritte - Organisator<\/title>\n<meta name=\"description\" content=\"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/en\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mehr Datensicherheit in der Cloud: F\u00fcnf Schritte\" \/>\n<meta property=\"og:description\" content=\"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/en\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-18T08:11:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"383\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thomas.berner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Mehr Datensicherheit in der #Cloud: F\u00fcnf Schritte\" \/>\n<meta name=\"twitter:description\" content=\"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die #Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-F\u00fcnf-Schritte_Organisator.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/\"},\"author\":{\"name\":\"thomas.berner\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\"},\"headline\":\"Mehr Datensicherheit in der Cloud: F\u00fcnf Schritte\",\"datePublished\":\"2019-01-18T08:11:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/\"},\"wordCount\":522,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg\",\"keywords\":[\"Checklisten\",\"Cloud Computing\",\"ICT-Sicherheit\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/\",\"name\":\"Mehr Datensicherheit in der Cloud: F\u00fcnf Schritte - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg\",\"datePublished\":\"2019-01-18T08:11:37+00:00\",\"description\":\"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg\",\"width\":680,\"height\":383,\"caption\":\"Wenn Unternehmen komplette Gesch\u00e4ftsprozesse in die Cloud verlagern, muss von Anfang an eine umfassende IT-Security-Strategie mitgedacht werden. (Quelle: Fotolia)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-01-18\\\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mehr Datensicherheit in der Cloud: F\u00fcnf Schritte\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\",\"name\":\"thomas.berner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"caption\":\"thomas.berner\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/en\\\/author\\\/thomas-berner\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"More data security in the cloud: Five steps - Organizer","description":"Moving business processes and applications to the cloud requires precise planning to ensure data security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/en\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/","og_locale":"en_US","og_type":"article","og_title":"Mehr Datensicherheit in der Cloud: F\u00fcnf Schritte","og_description":"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.","og_url":"https:\/\/www.organisator.ch\/en\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2019-01-18T08:11:37+00:00","og_image":[{"width":680,"height":383,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg","type":"image\/jpeg"}],"author":"thomas.berner","twitter_card":"summary_large_image","twitter_title":"Mehr Datensicherheit in der #Cloud: F\u00fcnf Schritte","twitter_description":"Die Verlagerung von Gesch\u00e4ftsprozessen und Applikationen in die #Cloud erfordert eine genaue Planung, damit die Datensicherheit gew\u00e4hrleistet ist.","twitter_image":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-F\u00fcnf-Schritte_Organisator.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/"},"author":{"name":"thomas.berner","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e"},"headline":"Mehr Datensicherheit in der Cloud: F\u00fcnf Schritte","datePublished":"2019-01-18T08:11:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/"},"wordCount":522,"commentCount":0,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg","keywords":["Checklisten","Cloud Computing","ICT-Sicherheit"],"articleSection":["IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/","url":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/","name":"More data security in the cloud: Five steps - Organizer","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg","datePublished":"2019-01-18T08:11:37+00:00","description":"Moving business processes and applications to the cloud requires precise planning to ensure data security.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/01\/Mehr-Datensicherheit-in-der-Cloud-Fuenf-Schritte_Organisator.jpg","width":680,"height":383,"caption":"Wenn Unternehmen komplette Gesch\u00e4ftsprozesse in die Cloud verlagern, muss von Anfang an eine umfassende IT-Security-Strategie mitgedacht werden. (Quelle: Fotolia)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/management\/it\/2019-01-18\/mehr-datensicherheit-in-der-cloud-fuenf-schritte\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Mehr Datensicherheit in der Cloud: F\u00fcnf Schritte"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organizer","description":"Competent. Practical. In 10 issues per year, ORGANISATOR presents the essential topics for managers of SMEs.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organizer","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e","name":"thomas.berner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","caption":"thomas.berner"},"url":"https:\/\/www.organisator.ch\/en\/author\/thomas-berner\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/4758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/comments?post=4758"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/4758\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media\/4759"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media?parent=4758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/categories?post=4758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/tags?post=4758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}