{"id":27043,"date":"2015-04-23T13:34:43","date_gmt":"2015-04-23T13:34:43","guid":{"rendered":"https:\/\/udsenterprise.com\/minimize-risks-public-cloud\/"},"modified":"2023-09-25T09:03:30","modified_gmt":"2023-09-25T09:03:30","slug":"minimize-risks-public-cloud","status":"publish","type":"post","link":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/","title":{"rendered":"Minimize risks in public cloud"},"content":{"rendered":"<p>One of the actions that you can carry out is try to penetrate the part of the system that we are testing with any exposed access mechanism as, for example, a user interface, a set of APIs, or primitive access points that lead straight to the infrastructure.<\/p>\n<p>To <strong>simulate attacks<\/strong>, we recommend using various automatic security testing tools, since most incorporate tools that collect information about response times and defense methods.<\/p>\n<p>If you want to know the most common attacks that private clouds receive  and learn more about safety tests, read the full article in SearchCloudComputing<\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Data security<\/strong> is one of the issues that most concern companies when deciding about  <strong>public or private cloud<\/strong>. <\/p>\n<p>Usually, organizations tend to be more skeptical with public cloud, but there are a number of tests that can be run to identify and fix possible security holes in this type of clouds.<\/p>\n<p>In order to perform these tests, first you will have select a fragment of the cloud environment that you want to test and then, you will be ready to define the <strong>strategy<\/strong> to be followed.<\/p>\n","protected":false},"author":2,"featured_media":13949,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[923,926,971],"tags":[927,928,972],"class_list":["post-27043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-en","category-security","category-tips","tag-cloud-en","tag-security","tag-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Minimize risks in public cloud<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Minimize risks in public cloud\" \/>\n<meta property=\"og:description\" content=\"Data security is one of the issues that most concern companies when deciding about public or private cloud. Usually, organizations tend to be more skeptical with public cloud, but there are a number of tests that can be run to identify and fix possible security holes in this type of clouds. In order to perform these tests, first you will have select a fragment of the cloud environment that you want to test and then, you will be ready to define the strategy to be followed.\" \/>\n<meta property=\"og:site_name\" content=\"UDS Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-23T13:34:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-25T09:03:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"67\" \/>\n\t<meta property=\"og:image:height\" content=\"4\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"UDS Enterprise Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:site\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UDS Enterprise Team\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/\"},\"author\":{\"name\":\"UDS Enterprise Team\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920\"},\"headline\":\"Minimize risks in public cloud\",\"datePublished\":\"2015-04-23T13:34:43+00:00\",\"dateModified\":\"2023-09-25T09:03:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/\"},\"wordCount\":101,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/cloud-securiy.jpg\",\"keywords\":[\"Cloud-en\",\"Security\",\"Tips\"],\"articleSection\":[\"Cloud-en\",\"Security\",\"Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/\",\"url\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/\",\"name\":\"Minimize risks in public cloud\",\"isPartOf\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/cloud-securiy.jpg\",\"datePublished\":\"2015-04-23T13:34:43+00:00\",\"dateModified\":\"2023-09-25T09:03:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#primaryimage\",\"url\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/cloud-securiy.jpg\",\"contentUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/cloud-securiy.jpg\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/udsenterprise.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud-en\",\"item\":\"https:\/\/udsenterprise.com\/en\/category\/cloud-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Minimize risks in public cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#website\",\"url\":\"https:\/\/udsenterprise.com\/en\/\",\"name\":\"UDS Enterprise\",\"description\":\"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.\",\"publisher\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\"},\"alternateName\":\"UDS Enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/udsenterprise.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\",\"name\":\"UDS Enterprise\",\"alternateName\":\"UDS Enterprise\",\"url\":\"https:\/\/udsenterprise.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg\",\"contentUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg\",\"width\":300,\"height\":202,\"caption\":\"UDS Enterprise\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VirtualCable_\",\"https:\/\/es.linkedin.com\/company\/virtualcable\",\"https:\/\/www.youtube.com\/@UDSEnterprise\"],\"description\":\"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920\",\"name\":\"UDS Enterprise Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"caption\":\"UDS Enterprise Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Minimize risks in public cloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Minimize risks in public cloud","og_description":"Data security is one of the issues that most concern companies when deciding about public or private cloud. Usually, organizations tend to be more skeptical with public cloud, but there are a number of tests that can be run to identify and fix possible security holes in this type of clouds. In order to perform these tests, first you will have select a fragment of the cloud environment that you want to test and then, you will be ready to define the strategy to be followed.","og_site_name":"UDS Enterprise","article_published_time":"2015-04-23T13:34:43+00:00","article_modified_time":"2023-09-25T09:03:30+00:00","og_image":[{"width":67,"height":4,"url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","type":"image\/gif"}],"author":"UDS Enterprise Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","twitter_creator":"@VirtualCable_","twitter_site":"@VirtualCable_","twitter_misc":{"Written by":"UDS Enterprise Team"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#article","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/"},"author":{"name":"UDS Enterprise Team","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920"},"headline":"Minimize risks in public cloud","datePublished":"2015-04-23T13:34:43+00:00","dateModified":"2023-09-25T09:03:30+00:00","mainEntityOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/"},"wordCount":101,"commentCount":0,"publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/cloud-securiy.jpg","keywords":["Cloud-en","Security","Tips"],"articleSection":["Cloud-en","Security","Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/","url":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/","name":"Minimize risks in public cloud","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#primaryimage"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/cloud-securiy.jpg","datePublished":"2015-04-23T13:34:43+00:00","dateModified":"2023-09-25T09:03:30+00:00","breadcrumb":{"@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#primaryimage","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/cloud-securiy.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/cloud-securiy.jpg","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/udsenterprise.com\/en\/minimize-risks-public-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/udsenterprise.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cloud-en","item":"https:\/\/udsenterprise.com\/en\/category\/cloud-en\/"},{"@type":"ListItem","position":3,"name":"Minimize risks in public cloud"}]},{"@type":"WebSite","@id":"https:\/\/udsenterprise.com\/en\/#website","url":"https:\/\/udsenterprise.com\/en\/","name":"UDS Enterprise","description":"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.","publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"alternateName":"UDS Enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/udsenterprise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/udsenterprise.com\/en\/#organization","name":"UDS Enterprise","alternateName":"UDS Enterprise","url":"https:\/\/udsenterprise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","width":300,"height":202,"caption":"UDS Enterprise"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VirtualCable_","https:\/\/es.linkedin.com\/company\/virtualcable","https:\/\/www.youtube.com\/@UDSEnterprise"],"description":"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS"},{"@type":"Person","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920","name":"UDS Enterprise Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","caption":"UDS Enterprise Team"}}]}},"_links":{"self":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/27043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/comments?post=27043"}],"version-history":[{"count":2,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/27043\/revisions"}],"predecessor-version":[{"id":30251,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/27043\/revisions\/30251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media\/13949"}],"wp:attachment":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media?parent=27043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/categories?post=27043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/tags?post=27043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}