{"id":4224,"date":"2022-11-02T11:25:06","date_gmt":"2022-11-02T11:25:06","guid":{"rendered":"https:\/\/locaterisk.com\/?p=4224"},"modified":"2025-08-08T07:28:09","modified_gmt":"2025-08-08T07:28:09","slug":"wie-sicher-ist-ihre-cloud-umgebung","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/wie-sicher-ist-ihre-cloud-umgebung\/","title":{"rendered":"How Secure Is Your Cloud Environment?"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Cloud - so Far so Secure? It Depends!<\/h1>\r\n            <p class=\"paragraph\">Cloud-based networks are considered to be particularly secure, resource-saving and, in times of remote work, the means of choice. However, anyone who believes that this completely removes them from security responsibility is mistaken. Cloud services are not a standard model for IT security. As is often the case in life, the same applies here: It all depends ...<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"495\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer-1024x495.png\" alt=\"\" class=\"wp-image-4226\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer-1024x495.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer-300x145.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer-768x371.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer-18x9.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Cyber attacks on cloud services<\/h3>\n\n\n\n<p>In recent years, more and more companies have opted for a cloud-based network. This offers more flexibility in computing power and storage capacity, is efficient and reduces the workload on the IT department. However, between 2019 and 2020, the number of cyberattacks on cloud services has doubled, making enterprises with cloud environments among the most frequently attacked.<\/p>\n\n\n\n<p>Nevertheless, the cloud is considered one of the most secure environments - but only if the particular security requirements are also met by the respective responsible parties. This is precisely what many companies are not aware of.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The cloud and<strong style=\"font-weight: bold;\"> the principle of shared responsibility<\/strong><\/h3>\n\n\n\n<p>Cloud security is not sufficiently understood by many cloud computing vendor customers. In a recent survey by KPMG, only 10 % of customer CISOs reported full penetration of the model, and 82 % had security issues related to understanding the model.<br>The \"shared responsibility\" model essentially states that the cloud provider is responsible for security <strong>the<\/strong> Cloud (the protection of the infrastructure) is responsible, while the customer is responsible for his security <strong>in the<\/strong> Cloud (the protection of the self-used application software) bears the responsibility.<br>The individual security tasks depend on the cloud provider and the provisioning service booked. As a rule, the services include the protection<\/p>\n\n\n\n<p><strong>a) the physical infrastructure <\/strong><br>This means that the physical data centers are located on the premises of the cloud company and fall entirely under its responsibility.<\/p>\n\n\n\n<p><strong>b) basic software components<\/strong><br>These are required for the cloud functions and usually include the categories: Data Processing, Storage, Database and Networks.<\/p>\n\n\n\n<p><b><strong><strong><strong><strong>The customer's responsibility for their security in the cloud means that their network, application and data security, operating system and firewall etc. are NOT protected by the cloud. are NOT protected by the cloud!<\/strong><\/strong><\/strong><\/strong><\/b><\/p>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center\"><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Accountability - The cloud model chosen is critical<\/strong><\/h3>\n\n\n\n<p>Most security vulnerabilities arise from incorrect configurations. This is no different in the cloud. In cloud models, providers and users are both challenged. Cloud providers do support IT security. However, customers cannot avoid a security concept and the necessary configurations. Depending on the cloud model, the responsibilities are divided differently. The distribution can vary from provider to provider.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>IaaS (Infrastructure-as-a-Service)<\/strong><\/h3>\n\n\n\n<p><strong>Provider:<\/strong><br>- Availability &amp; security of the cloud infrastructure (virtual machines, hard disks, networks)<br>- Computing power, storage space, connectivity<br>- Provision of services and tools<br><strong>Customer:&nbsp;<\/strong><br>- Installation, configuration, security of operating systems, and software stack (for application execution and data processing) for example: <br>Platform, application, identity and access management<br>Client-side data encryption<br>File system encryption<br>Network traffic protection<br>Protection of services and communication<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>PaaS (Platform as a Service)<\/strong><\/h3>\n\n\n\n<p><strong>Provider:<\/strong><br>- Availability and security of the platform (security updates, backups, databases)<br><strong>Customer:<\/strong><br>- Management of the implemented software<br>- Identity management (assignment and maintenance of roles and rights)<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>SaaS (Software as a Service)<\/strong><\/strong><\/h3>\n\n\n\n<p><strong>Provider:<\/strong><br>- Cloud infrastructure and software stack<br><strong>Customer:<\/strong><br>- Secure configuration of the services<br>- Identity management (assignment and maintenance of roles and rights)<br><strong>Shared responsibility:<\/strong><br>- Firewall maintenance<br>- Patch management<br>- Configuration management<br>- Trainings ...<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>Many companies have made the switch to cloud computing in the course of remote work and believe that the security responsibility lies with the provider. But in many cases, this is a fallacy. A review of the chosen model is worthwhile here. In addition, an IT security analysis is the tool of choice to identify potential vulnerabilities, for example, due to misconfigurations, outdated applications, expired certificates, etc. The result provides the necessary transparency and ensures the security of the remote work. The result provides the necessary transparency and regularly ensures aha experiences.<\/p>\n\n\n\n<p>Start an assessment right away? Click here for a free IT security assessment of your external IT landscape. <a href=\"https:\/\/locaterisk.com\/en\/landing\/kostenloses-rating\/\" target=\"_blank\" rel=\"noreferrer noopener\">Free Security-Rating<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"wie-sicher-ist-ihre-cloud-umgebung\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Good to know: Cloud services are not a standard model for IT security. Because, as is so often the case in life, the same applies here: It all depends ...<\/p>","protected":false},"author":8,"featured_media":4226,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[29,31,30],"class_list":["post-4224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-cloud","tag-cloud-dienste","tag-cloud-modell"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wie sicher ist Ihre Cloud-Umgebung? - LocateRisk<\/title>\n<meta name=\"description\" content=\"Gut zu wissen! Cloud Services sind kein Standard-Modell f\u00fcr IT-Sicherheit. Denn wie so oft im Leben gilt auch hier: Es kommt ganz darauf an \u2026\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/wie-sicher-ist-ihre-cloud-umgebung\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wie sicher ist Ihre Cloud-Umgebung? - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Gut zu wissen! Cloud Services sind kein Standard-Modell f\u00fcr IT-Sicherheit. Denn wie so oft im Leben gilt auch hier: Es kommt ganz darauf an \u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/wie-sicher-ist-ihre-cloud-umgebung\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-02T11:25:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:28:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"522\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"Wie sicher ist Ihre Cloud-Umgebung?\",\"datePublished\":\"2022-11-02T11:25:06+00:00\",\"dateModified\":\"2025-08-08T07:28:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/\"},\"wordCount\":732,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Cloud_Visual_quer.png\",\"keywords\":[\"Cloud\",\"Cloud-Dienste\",\"Cloud-Modell\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/\",\"name\":\"Wie sicher ist Ihre Cloud-Umgebung? - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Cloud_Visual_quer.png\",\"datePublished\":\"2022-11-02T11:25:06+00:00\",\"dateModified\":\"2025-08-08T07:28:09+00:00\",\"description\":\"Gut zu wissen! Cloud Services sind kein Standard-Modell f\u00fcr IT-Sicherheit. Denn wie so oft im Leben gilt auch hier: Es kommt ganz darauf an \u2026\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Cloud_Visual_quer.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Cloud_Visual_quer.png\",\"width\":1080,\"height\":522,\"caption\":\"Abstrakte grafische Darstellung zum Thema Sicherheit in der Cloud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/wie-sicher-ist-ihre-cloud-umgebung\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wie sicher ist Ihre Cloud-Umgebung?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How secure is your cloud environment? - LocateRisk","description":"Good to know! Cloud services are not a standard model for IT security. Because, as is so often the case in life: It all depends ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/wie-sicher-ist-ihre-cloud-umgebung\/","og_locale":"en_US","og_type":"article","og_title":"Wie sicher ist Ihre Cloud-Umgebung? - LocateRisk","og_description":"Gut zu wissen! Cloud Services sind kein Standard-Modell f\u00fcr IT-Sicherheit. Denn wie so oft im Leben gilt auch hier: Es kommt ganz darauf an \u2026","og_url":"https:\/\/locaterisk.com\/en\/wie-sicher-ist-ihre-cloud-umgebung\/","og_site_name":"LocateRisk","article_published_time":"2022-11-02T11:25:06+00:00","article_modified_time":"2025-08-08T07:28:09+00:00","og_image":[{"width":1080,"height":522,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"Wie sicher ist Ihre Cloud-Umgebung?","datePublished":"2022-11-02T11:25:06+00:00","dateModified":"2025-08-08T07:28:09+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/"},"wordCount":732,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer.png","keywords":["Cloud","Cloud-Dienste","Cloud-Modell"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/","url":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/","name":"How secure is your cloud environment? - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer.png","datePublished":"2022-11-02T11:25:06+00:00","dateModified":"2025-08-08T07:28:09+00:00","description":"Good to know! Cloud services are not a standard model for IT security. Because, as is so often the case in life: It all depends ...","breadcrumb":{"@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/10\/Cloud_Visual_quer.png","width":1080,"height":522,"caption":"Abstrakte grafische Darstellung zum Thema Sicherheit in der Cloud"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/wie-sicher-ist-ihre-cloud-umgebung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Wie sicher ist Ihre Cloud-Umgebung?"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=4224"}],"version-history":[{"count":56,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4224\/revisions"}],"predecessor-version":[{"id":6311,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4224\/revisions\/6311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/4226"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=4224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=4224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=4224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}