{"id":818,"date":"2024-02-15T06:54:36","date_gmt":"2024-02-15T06:54:36","guid":{"rendered":"https:\/\/sygitechblog.bhaskaryadav.me\/?p=818"},"modified":"2024-07-19T12:21:54","modified_gmt":"2024-07-19T12:21:54","slug":"identity-governance-privacy-and-compliance-features-in-azure-services","status":"publish","type":"post","link":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/","title":{"rendered":"Identity, Governance, Privacy, and Compliance features in Azure Services"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Apr 2022<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"401\" src=\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png\" alt=\"\" class=\"wp-image-4968\" srcset=\"https:\/\/www.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png 640w, https:\/\/www.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91-300x188.png 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>We\u2019ve talked alot about security, but when it comes to moving to the cloud, security isn\u2019t the only major concern companies have. They also want to have control over how resources are used and they want to ensure that data is kept private after it\u2019s in the cloud provider\u2019s ecosystem. Also, many businesses are required to comply with regulations and standards, and by moving to the cloud, they\u2019re offloading some of that responsibility to the cloud provider. Therefore, they want to ensure a high level of confidence that the cloud provider is keeping them compliant. The <strong>Cloud service providers in India<\/strong> are working to understand the different aspects and verticals of cloud computing and to help their clients in making their system compliant.&nbsp;<\/p>\n\n\n\n<p>Security isn\u2019t only about controlling the network traffic. In order to provide a secure environment, you must have some means of identifying who\u2019s accessing your application. Once you know the identity of a user, you need to ensure that they aren\u2019t allowed access to data or other resources they shouldn\u2019t access.<\/p>\n\n\n\n<p>Azure, is a Cloud computing service operated by Microsoft for application management via managed data centers. A cloud computing platform which can be used by <strong>Managed IT service<\/strong> providers help to provide great cost-effective solutions to their clients. Most of the companies seek help from cloud service providers for data migration to cloud, as running virtual machines in the cloud with a cost effective solution is a very complex process.<\/p>\n\n\n\n<p>Azure services provides:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Authentication and authorization<\/li>\n\n\n\n<li>Azure active directory<\/li>\n\n\n\n<li>Conditional access and multi factor authentication (MFA)<\/li>\n\n\n\n<li>Role-based access control (RBAC)<\/li>\n<\/ol>\n\n\n\n<p><strong>Authentication and authorization:<\/strong><\/p>\n\n\n\n<p>To determine who is using the application, you would require that users\u2019 log in, often with a username and password. Assuming the user provides the right credentials, that user is authenticated to use an application. Once a user is authenticated and begins interacting with an application, additional checks might take place to confirm which actions the user is and isn\u2019t allowed to perform. That process is called authorization and authorization checks are performed against a user who is already authenticated.<\/p>\n\n\n\n<p>Similarly, Azure active directory is a cloud-based identity service in Azure that can help you authenticate and authorize users.<\/p>\n\n\n\n<p><strong>Conditional access and Multi Factor Authentication:<\/strong><\/p>\n\n\n\n<p>Azure conditional access allows you to create policies that are applied against users. These policies use assignments and access controls to configure access to the resources. If a hacker obtains the password by using software that guesses passwords or by stealing it through phishing or some other means, your resources are no longer secure.<\/p>\n\n\n\n<p>Multi Factor Authentication solves the problem. The concept behind multifactor authentication is that you must authenticate using a combination of:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Something you know, such as username and password<\/li>\n\n\n\n<li>Something you have, such as a phone or mobile device&nbsp;<\/li>\n\n\n\n<li>Something you are, such as facial recognition or fingerprint.<\/li>\n<\/ol>\n\n\n\n<p>If multifactor authentication requires all three types of authentication. It\u2019s referred to as three-factor authentication.<\/p>\n\n\n\n<p><strong>Role-based access control (RBAC):<\/strong><\/p>\n\n\n\n<p>It is a generic term that refers to the concept of authorizing users to a system that is based on defined roles to which the user belongs.<\/p>\n\n\n\n<p>As your cloud presence grows, you\u2019ll likely end up with a large number of Azure resources that span many different azure services . Unless you\u2019ve some control over how those resources are created and managed, costs can spiral out of control. In addition to cost control, you might have other restrictions you\u2019d like in place as well, such as which regions certain resources should be created in, how certain resources are tagged and so on.<\/p>\n\n\n\n<p>The traditional way of handling such governance issues would be to send out a memo to everyone explaining what requirements are and then crossing your fingers that people adhere to them. Azure policy meets your requirements and helps you in governance of your resources. You\u2019ll find moving to the cloud isn\u2019t as simple as clicking a few buttons in the Azure portal. There\u2019s considerable planning that must take place, but before any of that planning even starts, it\u2019s important to become educated on how to move to the cloud successfully. You need to learn about best practices, how your cloud apps should be architected, the proper way to migrate resources, setting up governance and policies, so on and so forth.<\/p>\n\n\n\n<p>Some compliance requirements can\u2019t be met by simply applying policies in Azure. For example, some government compliance scenarios require that data stays within the country and that only citizens of that country have the access to systems used to store that data. You can\u2019t meet this requirement with policies. In fact, you can\u2019t meet that requirement at all in the public cloud. To address this type of issue, Microsoft developed completely isolated Azure data centers that make up the Azure Government cloud. Azure Government data centers are separate from the public data centers.<\/p>\n\n\n\n<p>Azure Cloud computing has one of the most interesting sections which is service level agreement(SLA\u2019s), and the life cycle of Azure services. Pricing doesn\u2019t just involve knowing the price of Azure resources. Companies often want to know how much entire Cloud solutions are going to cost before applications are deployed to the cloud. And when the application is deployed , they want to minimize costs as much as possible to have visibility into the ongoing costs of Azure services.<\/p>\n\n\n\n<p>We\u2019ve already talked about the high availability in the cloud, and how Cloud service providers can help you with ensuring your application experiences are highly available by following their guidelines related to SLAs. When something goes wrong, the Cloud service provider will make sure that the services aren\u2019t affected and help the company by ensuring that the resources and underlying applications work as expected in the target environment.&nbsp;<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apr 2022 We\u2019ve talked alot about security, but when it comes to moving to the cloud, security isn\u2019t the only major concern companies have. They also want to have control over how resources are used and they want to ensure that data is kept private after it\u2019s in the cloud provider\u2019s ecosystem. Also, many businesses [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-818","post","type-post","status-publish","format-standard","hentry","category-cloud-technology"],"featured_image_src":"","author_info":{"display_name":"sygitechadmin","author_link":"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity, Governance, Privacy, and Compliance features in Azure Services - Sygitech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity, Governance, Privacy, and Compliance features in Azure Services - Sygitech Blog\" \/>\n<meta property=\"og:description\" content=\"Apr 2022 We\u2019ve talked alot about security, but when it comes to moving to the cloud, security isn\u2019t the only major concern companies have. They also want to have control over how resources are used and they want to ensure that data is kept private after it\u2019s in the cloud provider\u2019s ecosystem. Also, many businesses [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Sygitech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-15T06:54:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-19T12:21:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png\" \/>\n<meta name=\"author\" content=\"sygitechadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sygitechadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/\"},\"author\":{\"name\":\"sygitechadmin\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/2ca1ad44020a9cc824227b7b8556a22d\"},\"headline\":\"Identity, Governance, Privacy, and Compliance features in Azure Services\",\"datePublished\":\"2024-02-15T06:54:36+00:00\",\"dateModified\":\"2024-07-19T12:21:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/\"},\"wordCount\":991,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png\",\"articleSection\":[\"Cloud Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/\",\"url\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/\",\"name\":\"Identity, Governance, Privacy, and Compliance features in Azure Services - Sygitech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png\",\"datePublished\":\"2024-02-15T06:54:36+00:00\",\"dateModified\":\"2024-07-19T12:21:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#primaryimage\",\"url\":\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png\",\"contentUrl\":\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sygitech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identity, Governance, Privacy, and Compliance features in Azure Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#website\",\"url\":\"https:\/\/www.sygitech.com\/blog\/\",\"name\":\"Sygitech Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sygitech.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#organization\",\"name\":\"Sygitech Blog\",\"url\":\"https:\/\/www.sygitech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"width\":181,\"height\":24,\"caption\":\"Sygitech Blog\"},\"image\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/2ca1ad44020a9cc824227b7b8556a22d\",\"name\":\"sygitechadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9fdd499d3d969f7856da967b9c1103b4a59c61a2bea820c91cd847be24c0b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9fdd499d3d969f7856da967b9c1103b4a59c61a2bea820c91cd847be24c0b89?s=96&d=mm&r=g\",\"caption\":\"sygitechadmin\"},\"sameAs\":[\"https:\/\/new.sygitech.com\/blog\"],\"url\":\"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity, Governance, Privacy, and Compliance features in Azure Services - Sygitech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/","og_locale":"en_US","og_type":"article","og_title":"Identity, Governance, Privacy, and Compliance features in Azure Services - Sygitech Blog","og_description":"Apr 2022 We\u2019ve talked alot about security, but when it comes to moving to the cloud, security isn\u2019t the only major concern companies have. They also want to have control over how resources are used and they want to ensure that data is kept private after it\u2019s in the cloud provider\u2019s ecosystem. Also, many businesses [&hellip;]","og_url":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/","og_site_name":"Sygitech Blog","article_published_time":"2024-02-15T06:54:36+00:00","article_modified_time":"2024-07-19T12:21:54+00:00","og_image":[{"url":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png","type":"","width":"","height":""}],"author":"sygitechadmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sygitechadmin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#article","isPartOf":{"@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/"},"author":{"name":"sygitechadmin","@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/2ca1ad44020a9cc824227b7b8556a22d"},"headline":"Identity, Governance, Privacy, and Compliance features in Azure Services","datePublished":"2024-02-15T06:54:36+00:00","dateModified":"2024-07-19T12:21:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/"},"wordCount":991,"commentCount":0,"publisher":{"@id":"https:\/\/www.sygitech.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#primaryimage"},"thumbnailUrl":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png","articleSection":["Cloud Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/","url":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/","name":"Identity, Governance, Privacy, and Compliance features in Azure Services - Sygitech Blog","isPartOf":{"@id":"https:\/\/www.sygitech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#primaryimage"},"image":{"@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#primaryimage"},"thumbnailUrl":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png","datePublished":"2024-02-15T06:54:36+00:00","dateModified":"2024-07-19T12:21:54+00:00","breadcrumb":{"@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#primaryimage","url":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png","contentUrl":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-91.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sygitech.com\/blog\/identity-governance-privacy-and-compliance-features-in-azure-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sygitech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Identity, Governance, Privacy, and Compliance features in Azure Services"}]},{"@type":"WebSite","@id":"https:\/\/www.sygitech.com\/blog\/#website","url":"https:\/\/www.sygitech.com\/blog\/","name":"Sygitech Blog","description":"","publisher":{"@id":"https:\/\/www.sygitech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sygitech.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sygitech.com\/blog\/#organization","name":"Sygitech Blog","url":"https:\/\/www.sygitech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","width":181,"height":24,"caption":"Sygitech Blog"},"image":{"@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/2ca1ad44020a9cc824227b7b8556a22d","name":"sygitechadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9fdd499d3d969f7856da967b9c1103b4a59c61a2bea820c91cd847be24c0b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9fdd499d3d969f7856da967b9c1103b4a59c61a2bea820c91cd847be24c0b89?s=96&d=mm&r=g","caption":"sygitechadmin"},"sameAs":["https:\/\/new.sygitech.com\/blog"],"url":"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/"}]}},"featured_image_src_square":false,"rbea_author_info":{"display_name":"sygitechadmin","author_link":"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/"},"rbea_excerpt_info":"Apr 2022 We\u2019ve talked alot about security, but when it comes to moving to the cloud, security isn\u2019t the only major concern companies have. They also want to have control over how resources are used and they want to ensure that data is kept private after it\u2019s in the cloud provider\u2019s ecosystem. Also, many businesses [&hellip;]","category_list":"<a href=\"https:\/\/www.sygitech.com\/blog\/category\/cloud-technology\/\" rel=\"category tag\">Cloud Technology<\/a>","comments_num":"0 comments","rttpg_featured_image_url":null,"rttpg_author":{"display_name":"sygitechadmin","author_link":"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.sygitech.com\/blog\/category\/cloud-technology\/\" rel=\"category tag\">Cloud Technology<\/a>","rttpg_excerpt":"Apr 2022 We\u2019ve talked alot about security, but when it comes to moving to the cloud, security isn\u2019t the only major concern companies have. They also want to have control over how resources are used and they want to ensure that data is kept private after it\u2019s in the cloud provider\u2019s ecosystem. Also, many businesses&hellip;","_links":{"self":[{"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/posts\/818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/comments?post=818"}],"version-history":[{"count":2,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/posts\/818\/revisions"}],"predecessor-version":[{"id":4969,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/posts\/818\/revisions\/4969"}],"wp:attachment":[{"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/media?parent=818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/categories?post=818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/tags?post=818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}