{"id":88060,"date":"2022-03-02T17:25:52","date_gmt":"2022-03-02T06:25:52","guid":{"rendered":"https:\/\/itt.com.au\/?p=88060"},"modified":"2022-03-02T17:25:52","modified_gmt":"2022-03-02T06:25:52","slug":"a-security-first-approach-to-cloud-management","status":"publish","type":"post","link":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/","title":{"rendered":"A Security-First Approach to Cloud Management"},"content":{"rendered":"\n

Embracing hybrid allows businesses to stay flexible while having an extensive selection of data and app deployment options. Hybrid cloud deployments can maximise organisational productivity by combining on-premise resources with public cloud services.<\/p>\n\n\n\n

Last month, we saw how HPE Greenlake enables on-premise data centres to maximise cloud benefits through pre-configured infrastructure options. As part of the Greenlake<\/a> offering, HPE provides, installs, manages and maintains the infrastructure. GreenLake eliminates hybrid cloud management complexities by allowing users to provision virtual machines and containers directly from the single user interface, HPE GreenLake Central.<\/p>\n\n\n\n

GreenLake Central – a point-and-click cloud experience<\/strong><\/h3>\n\n\n\n

HPE GreenLake Central is a cloud platform that provides secure and role-based access to trial, subscription, and consumption of HPE GreenLake service offerings. HPE GreenLake Central provides service orchestration, a unified cloud experience to applications and data across the customer\u2019s HPE GreenLake estate, including private and public clouds, edge to core.<\/p>\n\n\n\n

HPE GreenLake Central and associated services are developed with security as a cornerstone. Providing a robust, secure solution requires the foundation of a mature, secure software development lifecycle (SDLC) methodology. This is a critical aspect of the platform\u2019s security, which is usually not noticed directly by users. Strict adherence to the secure SDLC is required to manage risk and achieve a demonstrably secure system.<\/p>\n\n\n\n

With HPE GreenLake Central, customers can achieve a unified cloud experience across apps and data everywhere\u2014private and public clouds, edges, and data centres\u2014all through a single intuitive portal and management console. It brings together apps and tools that support and enrich our HPE GreenLake offerings, such as HPE Consumption Analytics and continuous compliance controls (some are included, and others are available at additional cost). More than a portal, HPE GreenLake Central delivers the services that customers need to run their business, tailored and delivered to them through one unified view.<\/p>\n\n\n\n

Businesses can use HPE GreenLake Central to:<\/p>\n\n\n\n

  • Move faster with a self-service, point-and-click cloud experience<\/li>
  • Deliver a tailored cloud experience with role-based access for IT, CIOs, DevOps, and finance<\/li>
  • Gain quick insights across all functions with high-level KPIs, such as monthly costs, capacity, and compliance conditions<\/li>
  • Try new services, such as continuous compliance controls and private cloud<\/li><\/ul>\n\n\n\n

    HPE GreenLake Central security<\/strong><\/h3>\n\n\n\n

    HPE GreenLake’s infrastructure is designed with security in mind. When developing, deploying, hosting, and managing cloud services, HPE GreenLake prevents unauthorised access to user profile data. GreenLake Central simplifies and secures the management of HPE GreenLake services and resources. Administrators can manage IAM roles, access, and permissions to govern user behaviour in decentralised domains.<\/p>\n\n\n\n

    HPE GreenLake Central acts as the management plane and only handles customer contact information and credentials, such as user ID, password, access tokens and roles. This data is always encrypted, whether in transmission or at rest and is also securely backed up and protected by isolation within Kubernetes (K8s) containers. All data transmission within HPE GreenLake Central and between external networks to and from HPE GreenLake Central is protected by encryption using TLS 1.2. Customer data is not transmitted through nor stored in HPE GreenLake Central<\/p>\n\n\n\n

    HPE GreenLake Central monitoring services cover everything from source code to running components, allowing HPE GreenLake to rapidly detect, investigate, and resolve critical issues.<\/p>\n\n\n\n

    The following are a few of the principles used to provide embedded security guardrails and enforce security best practices in the HPE GreenLake Central software development process:<\/p>\n\n\n\n

    • Minimise attack surface: Enforce all service API exposure to be explicit and closed by default<\/li>
    • Establish secure default: Secure defaults are provided throughout the workflow to ensure developers start secure<\/li>
    • Provide least privilege: Services are isolated, resource sharing is structurally prohibited, and all privilege escalation must be explicit and approved<\/li>
    • Offer continuous verification: Validate security parameters upon deployment, continuously validating that all security parameters are appropriate and performing continuous threat detection for bad actors in the system<\/li>
    • Don\u2019t trust services: All services are only accessed via public APIs and access is explicitly authenticated and authorised, rather than by network proximity or segmentation<\/li>
    • Ensure separation of duties: Independent service delivery and isolation ensure a strict separation of duties for all services<\/li>
    • Avoid security by obscurity: Use tools to ensure secrets management, secrets rotation, and handling of confidential information are all at the highest security standards<\/li>
    • Keep security simple: Intrusion detection, security benchmark verifications, and dependency vulnerability scanning are built into the platform, requiring no conscious effort to implement<\/li>
    • Fix issues correctly: Actively scan software artefacts for known vulnerabilities and automatically stop the integration process, enabling teams to remediate identified issues<\/li><\/ul>\n\n\n\n

      GreenLake Central use cases<\/strong><\/h3>\n\n\n\n

      Being built with security at the core, GreenLake Central has the capability to serve the diverse needs of business professionals. Some notable use cases focus on cost management, provisioning and hybrid estate management.<\/p>\n\n\n\n

      Cost management<\/strong><\/h3>\n\n\n\n

      One of the key pain points for IT executives and LOBs is managing costs across hybrid cloud environments. Costs can quickly escalate without the right visibility and control. With HPE GreenLake Central, cost KPIs are integrated into the dashboard so businesses can easily see the current monthly costs and how spending is increasing or decreasing over time. If more detailed information is needed by location, resource, or month, it’s available through the Monthly Charges report.<\/p>\n\n\n\n

      GreenLake offers a secure and compliant environment for these investigations to occur. With Continuous Compliance capabilities, HPE experts work with the business to tailor frameworks according to their specific needs and requirements, selecting from over 1500 controls to ensure compliance across a wide range of areas such as HIPAA, GDPR, and more<\/p>\n\n\n\n

      Provisioning<\/strong><\/h3>\n\n\n\n

      Businesses benefit from the simplicity and speed with which they can deploy resources in the public cloud. It lets them react to changes in the business, or competitive pressure, faster and easier. It encourages innovation and experimentation without the risk of high up-front costs.<\/p>\n\n\n\n

      That\u2019s the experience HPE GreenLake provides with managed private cloud. The ability to quickly spin up resources on-premises with just a few clicks and with the pay-per-use economics of the public cloud. This is truly differentiating in the market.<\/p>\n\n\n\n

      HPE GreenLake Central enables a consistent experience to provision, monitor, and manage workloads across the private cloud. In a single dashboard, businesses can see their instances, open tickets, and activity logs, as well as stats on availability, response time, and open incidents.<\/p>\n\n\n\n

      Management of the hybrid estate<\/strong><\/h3>\n\n\n\n

      One of the major struggles that businesses have is managing their entire hybrid estate holistically. Typically, it requires different tools to get the insights you need across on-premises and multi-cloud, which can be cumbersome and time-intensive.<\/p>\n\n\n\n

      HPE GreenLake breaks down the silos to deliver the insights and control needed to optimise business operations. The HPE Consumption Analytics Portal brings together usage and spending from HPE GreenLake and public cloud environments, so organisations gain greater visibility, manage capacity, and optimise costs.<\/p>\n\n\n\n

      Often, resources are underutilised or no longer being used, resulting in unnecessary spending. The Insights feature offers a rules-based recommendation engine that surfaces areas where businesses can optimise costs and mitigate risk.<\/p>\n\n\n\n

      Conclusion<\/strong><\/h3>\n\n\n\n

      Hybrid cloud offers a wide range of services to accelerate the efficient development and delivery of applications and services to meet the ever-increasing demands from lines of business. One of the major concerns with cloud solutions, however, is ensuring the security of the environments and the consistency of security controls across cloud providers, which may have different implementations.<\/p>\n\n\n\n

      HPE GreenLake Central (GLC) provides a platform in which the customer has a single point of administration for all workloads managed by HPE GreenLake running on public and private clouds. All businesses using HPE GreenLake benefit from an infrastructure architecture that is built to meet the requirements of the most security-sensitive organisations. As your trusted IT partner, we can help you explore the ways Greenlake can take your business to the next level.<\/p>\n \t \t","protected":false},"excerpt":{"rendered":"

      <\/p>\n","protected":false},"author":1,"featured_media":88121,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[9,7],"tags":[4],"yoast_head":"\nA Security-First Approach to Cloud Management - IT&T<\/title>\n<meta name=\"description\" content=\"GreenLake eliminates hybrid cloud management complexities by allowing users to provision virtual machines and containers directly from the single user interface, HPE GreenLake Central.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Security-First Approach to Cloud Management\" \/>\n<meta property=\"og:description\" content=\"GreenLake eliminates hybrid cloud management complexities by allowing users to provision virtual machines and containers directly from the single user interface, HPE GreenLake Central.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/\" \/>\n<meta property=\"og:site_name\" content=\"IT&T | Business IT Services and Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-02T06:25:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"itt-admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITT2500\" \/>\n<meta name=\"twitter:site\" content=\"@ITT2500\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"itt-admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/\"},\"author\":{\"name\":\"itt-admin\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1\"},\"headline\":\"A Security-First Approach to Cloud Management\",\"datePublished\":\"2022-03-02T06:25:52+00:00\",\"dateModified\":\"2022-03-02T06:25:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/\"},\"wordCount\":1299,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itt.com.au\/#organization\"},\"image\":{\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg\",\"keywords\":[\"Blog\"],\"articleSection\":[\"Cloud\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/\",\"url\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/\",\"name\":\"A Security-First Approach to Cloud Management - IT&T\",\"isPartOf\":{\"@id\":\"https:\/\/itt.com.au\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg\",\"datePublished\":\"2022-03-02T06:25:52+00:00\",\"dateModified\":\"2022-03-02T06:25:52+00:00\",\"description\":\"GreenLake eliminates hybrid cloud management complexities by allowing users to provision virtual machines and containers directly from the single user interface, HPE GreenLake Central.\",\"breadcrumb\":{\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#primaryimage\",\"url\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg\",\"contentUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg\",\"width\":730,\"height\":365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itt.com.au\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Security-First Approach to Cloud Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itt.com.au\/#website\",\"url\":\"https:\/\/itt.com.au\/\",\"name\":\"IT&T | Business IT Services and Solutions\",\"description\":\"The better solution\",\"publisher\":{\"@id\":\"https:\/\/itt.com.au\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itt.com.au\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itt.com.au\/#organization\",\"name\":\"IT&T | Business IT Services and Solutions\",\"url\":\"https:\/\/itt.com.au\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg\",\"contentUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg\",\"width\":1,\"height\":1,\"caption\":\"IT&T | Business IT Services and Solutions\"},\"image\":{\"@id\":\"https:\/\/itt.com.au\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213\",\"https:\/\/x.com\/ITT2500\",\"https:\/\/www.youtube.com\/channel\/UCdEqeP6rJVRssjnv1HWig2Q\",\"https:\/\/www.instagram.com\/itt_wollongong\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1\",\"name\":\"itt-admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g\",\"caption\":\"itt-admin\"},\"sameAs\":[\"https:\/\/itt.com.au\"],\"url\":\"https:\/\/itt.com.au\/author\/itt-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Security-First Approach to Cloud Management - IT&T","description":"GreenLake eliminates hybrid cloud management complexities by allowing users to provision virtual machines and containers directly from the single user interface, HPE GreenLake Central.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/","og_locale":"en_US","og_type":"article","og_title":"A Security-First Approach to Cloud Management","og_description":"GreenLake eliminates hybrid cloud management complexities by allowing users to provision virtual machines and containers directly from the single user interface, HPE GreenLake Central.","og_url":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/","og_site_name":"IT&T | Business IT Services and Solutions","article_publisher":"https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213","article_published_time":"2022-03-02T06:25:52+00:00","og_image":[{"width":730,"height":365,"url":"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg","type":"image\/jpeg"}],"author":"itt-admin","twitter_card":"summary_large_image","twitter_creator":"@ITT2500","twitter_site":"@ITT2500","twitter_misc":{"Written by":"itt-admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#article","isPartOf":{"@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/"},"author":{"name":"itt-admin","@id":"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1"},"headline":"A Security-First Approach to Cloud Management","datePublished":"2022-03-02T06:25:52+00:00","dateModified":"2022-03-02T06:25:52+00:00","mainEntityOfPage":{"@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/"},"wordCount":1299,"commentCount":0,"publisher":{"@id":"https:\/\/itt.com.au\/#organization"},"image":{"@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#primaryimage"},"thumbnailUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg","keywords":["Blog"],"articleSection":["Cloud","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/","url":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/","name":"A Security-First Approach to Cloud Management - IT&T","isPartOf":{"@id":"https:\/\/itt.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#primaryimage"},"image":{"@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#primaryimage"},"thumbnailUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg","datePublished":"2022-03-02T06:25:52+00:00","dateModified":"2022-03-02T06:25:52+00:00","description":"GreenLake eliminates hybrid cloud management complexities by allowing users to provision virtual machines and containers directly from the single user interface, HPE GreenLake Central.","breadcrumb":{"@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#primaryimage","url":"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg","contentUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2022\/03\/A_security_first_approach_to_cloud_management-1.jpg","width":730,"height":365},{"@type":"BreadcrumbList","@id":"https:\/\/itt.com.au\/a-security-first-approach-to-cloud-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itt.com.au\/"},{"@type":"ListItem","position":2,"name":"A Security-First Approach to Cloud Management"}]},{"@type":"WebSite","@id":"https:\/\/itt.com.au\/#website","url":"https:\/\/itt.com.au\/","name":"IT&T | Business IT Services and Solutions","description":"The better solution","publisher":{"@id":"https:\/\/itt.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itt.com.au\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itt.com.au\/#organization","name":"IT&T | Business IT Services and Solutions","url":"https:\/\/itt.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itt.com.au\/#\/schema\/logo\/image\/","url":"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg","contentUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg","width":1,"height":1,"caption":"IT&T | Business IT Services and Solutions"},"image":{"@id":"https:\/\/itt.com.au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213","https:\/\/x.com\/ITT2500","https:\/\/www.youtube.com\/channel\/UCdEqeP6rJVRssjnv1HWig2Q","https:\/\/www.instagram.com\/itt_wollongong\/"]},{"@type":"Person","@id":"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1","name":"itt-admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itt.com.au\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g","caption":"itt-admin"},"sameAs":["https:\/\/itt.com.au"],"url":"https:\/\/itt.com.au\/author\/itt-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/posts\/88060"}],"collection":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/comments?post=88060"}],"version-history":[{"count":0,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/posts\/88060\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/media\/88121"}],"wp:attachment":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/media?parent=88060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/categories?post=88060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/tags?post=88060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}