{"id":86545,"date":"2022-05-11T15:21:02","date_gmt":"2022-05-11T13:21:02","guid":{"rendered":"https:\/\/mwtsolutions.eu\/?p=86545"},"modified":"2022-05-12T08:46:01","modified_gmt":"2022-05-12T06:46:01","slug":"7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu","status":"publish","type":"post","link":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/","title":{"rendered":"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"86545\" class=\"elementor elementor-86545\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2958c7c elementor-section-boxed elementor-section-height-default elementor-section-height-default force-full-width-no\" data-id=\"2958c7c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c99565\" data-id=\"2c99565\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-93a0132 elementor-widget elementor-widget-text-editor\" data-id=\"93a0132\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Organizace maj\u00ed v cloudu ulo\u017eeny spousty citliv\u00fdch informac\u00ed. Neo\u010dek\u00e1van\u00fd n\u00e1r\u016fst pr\u00e1ce na d\u00e1lku vedl k n\u00e1r\u016fstu mno\u017estv\u00ed informac\u00ed ulo\u017een\u00fdch v cloudu.\u00a0<\/strong><span style=\"font-weight: 600; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1.6rem;\">Jak ale na zabezpe\u010den\u00ed podnikov\u00e9ho cloudu?<\/span><\/p><p><strong>\u00a0<\/strong><\/p><p><strong>Podle spole\u010dnosti <a href=\"https:\/\/techjury.net\/blog\/cloud-computing-statistics\/\">TechJury<\/a> je 67 % podnikov\u00e9 infrastruktury zalo\u017eeno na cloudu.\u00a0 <\/strong><strong>Proto\u017ee v\u0161ak organizace umo\u017e\u0148uj\u00ed zam\u011bstnanc\u016fm pou\u017e\u00edvat v pr\u00e1ci jak slu\u017eebn\u00ed, tak osobn\u00ed za\u0159\u00edzen\u00ed, roz\u0161\u00ed\u0159ila se plocha pro \u00fatoky, \u010d\u00edm\u017e se zv\u00fd\u0161ily mo\u017enosti \u00fatok\u016f na zraniteln\u00e1 za\u0159\u00edzen\u00ed ze strany akt\u00e9r\u016f hrozeb.\u00a0<\/strong><\/p><p>\u00a0<\/p><p><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/analysis-reports\/ar21-013a\">Agentura pro kybernetickou bezpe\u010dnost a bezpe\u010dnost infrastruktury<\/a> ve sv\u00e9 ned\u00e1vn\u00e9 zpr\u00e1v\u011b zjistila, \u017ee se zv\u00fd\u0161il po\u010det phishingov\u00fdch e-mail\u016f, kter\u00e9 vyu\u017e\u00edvaj\u00ed slabin v postupech zabezpe\u010den\u00ed cloudu. Nedostate\u010dn\u00e1 kyberhygiena a pov\u011bdom\u00ed o kybernetick\u00e9 bezpe\u010dnosti v organizac\u00edch \u010dasto vede k tomu, \u017ee se zam\u011bstnanci nechaj\u00ed oklamat a sd\u00edlej\u00ed sv\u00e9 p\u0159ihla\u0161ovac\u00ed \u00fadaje s \u00fato\u010dn\u00edky, kte\u0159\u00ed pos\u00edlaj\u00ed phishingov\u00e9 e-maily vypadaj\u00edc\u00ed jako legitimn\u00ed.<\/p><p>Spr\u00e1vce zabezpe\u010den\u00ed mus\u00ed m\u00edt p\u0159ehled, aby byla s\u00ed\u0165 p\u0159ed \u00fatoky bezpe\u010dn\u00e1. Zejm\u00e9na pokud jde o zaji\u0161t\u011bn\u00ed bezpe\u010dnosti cloudu, mus\u00ed b\u00fdt ostra\u017eit\u00fd, sledovat ka\u017edou jednotlivou aktivitu, kter\u00e1 se odehr\u00e1v\u00e1, a pravideln\u011b vyhled\u00e1vat hrozby.<\/p><p>Zde je sedm z\u00e1sadn\u00edch bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00fdch cloud\u016f, kter\u00e9 jim pomohou ochr\u00e1nit jejich cloudovou infrastrukturu p\u0159ed \u00fato\u010dn\u00edky.<\/p><h3>1. Zave\u010fte syst\u00e9m MFA<\/h3><p>\u00a0<\/p><p>B\u011b\u017en\u00e1 kombinace u\u017eivatelsk\u00e9ho jm\u00e9na a hesla ji\u017e nesta\u010d\u00ed k zaji\u0161t\u011bn\u00ed bezpe\u010dnosti u\u017eivatelsk\u00fdch \u00fa\u010dt\u016f. Akt\u00e9\u0159i hrozeb neust\u00e1le vyv\u00edjej\u00ed nov\u00e9 techniky a metody, jak kompromitovat \u00fa\u010dty a z\u00edskat p\u0159\u00edstup do s\u00edt\u00ed. Jakmile \u00fato\u010dn\u00edk z\u00edsk\u00e1 pot\u0159ebn\u00e9 p\u0159ihla\u0161ovac\u00ed \u00fadaje, m\u016f\u017ee snadno z\u00edskat p\u0159\u00edstup ke cloudov\u00fdm aplikac\u00edm a slu\u017eb\u00e1m, kter\u00e9 se pou\u017e\u00edvaj\u00ed k prov\u00e1d\u011bn\u00ed ka\u017edodenn\u00edch obchodn\u00edch \u010dinnost\u00ed. Nakonec mohou ohrozit i s\u00ed\u0165.<\/p><p>Nasazen\u00ed MFA m\u00e1 z\u00e1sadn\u00ed v\u00fdznam pro zabezpe\u010den\u00ed cloudov\u00fdch aplikac\u00ed a zaji\u0161t\u011bn\u00ed toho, aby se k nim mohli p\u0159ihla\u0161ovat a p\u0159istupovat k d\u016fle\u017eit\u00fdm zdroj\u016fm v nich ulo\u017een\u00fdm pouze opr\u00e1vn\u011bn\u00ed pracovn\u00edci.<\/p><h3>2. Kontrola opr\u00e1vn\u011bn\u00ed a p\u0159\u00edstupu<\/h3><p>\u00a0<\/p><p>\u0158\u00edzen\u00ed toho, jak\u00e1 opr\u00e1vn\u011bn\u00ed maj\u00ed u\u017eivatel\u00e9 a k jak\u00fdm dat\u016fm maj\u00ed p\u0159\u00edstup, je jedn\u00edm z nejlep\u0161\u00edch zp\u016fsob\u016f, jak zlep\u0161it zabezpe\u010den\u00ed cloudov\u00fdch aplikac\u00ed. Mo\u017enost kompromitace se drasticky sni\u017euje, kdy\u017e maj\u00ed u\u017eivatel\u00e9 p\u0159\u00edstup pouze k informac\u00edm, kter\u00e9 pot\u0159ebuj\u00ed, a mohou je pou\u017e\u00edvat pouze s opr\u00e1vn\u011bn\u00edm, kter\u00e9 jim poskytne spr\u00e1vce.<\/p><p>Spr\u00e1vci v\u0161ak mus\u00ed db\u00e1t na to, aby byla po\u017eadovan\u00e1 opr\u00e1vn\u011bn\u00ed a privilegia rozd\u011blena zam\u011bstnanc\u016fm na z\u00e1klad\u011b jejich rol\u00ed tak, aby mohli bez p\u0159ek\u00e1\u017eek vykon\u00e1vat svou pr\u00e1ci.<\/p><h3>3. P\u0159ijet\u00ed z\u00e1sady nulov\u00e9 d\u016fv\u011bry<\/h3><p>\u00a0<\/p><p>Tradi\u010dn\u011b se p\u0159edpokl\u00e1d\u00e1, \u017ee akt\u00e9\u0159i hrozeb se v\u017edy objev\u00ed na ned\u016fv\u011bryhodn\u00e9 stran\u011b s\u00edt\u011b, zat\u00edmco u\u017eivatel\u00e9 na d\u016fv\u011bryhodn\u00e9 stran\u011b jsou naprosto d\u016fv\u011bryhodn\u00ed. Model nulov\u00e9 d\u016fv\u011bry v\u0161ak zd\u016fraz\u0148uje pot\u0159ebu zajistit, aby byl povolen pouze zn\u00e1m\u00fd provoz nebo legitimn\u00ed komunikace aplikac\u00ed, kontrolovat a zaznamen\u00e1vat ve\u0161ker\u00e9 s\u00ed\u0165ov\u00e9 aktivity a prosazovat p\u0159\u00edsn\u00e9 \u0159\u00edzen\u00ed p\u0159\u00edstupu.<\/p><h3>4. Nasazen\u00ed CASB a SASE<\/h3><p>\u00a0<\/p><p>Organizace rychle p\u0159ech\u00e1zej\u00ed z lok\u00e1ln\u00edho prost\u0159ed\u00ed do cloudu v nad\u011bji, \u017ee vyu\u017eij\u00ed v\u00fdhod \u0161k\u00e1lovatelnosti a v\u00fdkonu. M\u00e1lokter\u00e1 organizace v\u0161ak v\u011bnuje pozornost bezpe\u010dnostn\u00edm hrozb\u00e1m, kter\u00e9 s sebou takov\u00fd p\u0159esun p\u0159in\u00e1\u0161\u00ed, a neinvestuje do zabezpe\u010den\u00ed sv\u00fdch cloudov\u00fdch instalac\u00ed. Vzhledem k tomu, \u017ee akt\u00e9\u0159i hrozeb vyu\u017e\u00edvaj\u00ed ka\u017edou p\u0159\u00edle\u017eitost ke zneu\u017eit\u00ed zraniteln\u00fdch s\u00edt\u00ed, mus\u00ed organizace neust\u00e1le aktualizovat sv\u00e9 zabezpe\u010den\u00ed, aby z\u016fstaly chr\u00e1n\u011bny.<\/p><p>Technologie, jako je zprost\u0159edkovatel zabezpe\u010den\u00ed p\u0159\u00edstupu ke cloudu (CASB) a Secure Access Service Edge (SASE), jsou pro monitorov\u00e1n\u00ed a zabezpe\u010den\u00ed cloudov\u00fdch instalac\u00ed nezbytn\u00e9. Zat\u00edmco CASB slou\u017e\u00ed jako vynucovac\u00ed centrum, kter\u00e9 aplikuje bezpe\u010dnostn\u00ed z\u00e1sady na v\u0161e, co firma v cloudu pou\u017e\u00edv\u00e1, SASE kombinuje technologie zabezpe\u010den\u00ed a s\u00ed\u0165ov\u00e9ho p\u0159ipojen\u00ed do jedin\u00e9 platformy dod\u00e1van\u00e9 do cloudu, kter\u00e1 umo\u017e\u0148uje rychlou a bezpe\u010dnou transformaci cloudu.<\/p><h3><span lang=\"CS\">5. Automatizovan\u00e1 \u0159e\u0161en\u00ed pro sledov\u00e1n\u00ed \u010dinnost\u00ed u\u017eivatel\u016f<\/span><\/h3><p>\u00a0<\/p><p>\u0160k\u00e1lovatelnost je jednou z nejv\u011bt\u0161\u00edch p\u0159ednost\u00ed cloudu. Zvy\u0161uje v\u0161ak objem aktivit v s\u00edti. Pro zaji\u0161t\u011bn\u00ed bezpe\u010dnosti a ochrany dat je nezbytn\u00e9 monitorovat v\u0161echny \u010dinnosti prov\u00e1d\u011bn\u00e9 u\u017eivateli.<\/p><p>Ru\u010dn\u00ed proch\u00e1zen\u00ed log\u016f v nad\u011bji na odhalen\u00ed \u0161kodliv\u00fdch aktivit je herkulovsk\u00fd \u00fakol. Proto by organizace m\u011bly nasadit automatizovan\u00e1 \u0159e\u0161en\u00ed, kter\u00e1 dok\u00e1\u017e\u00ed monitorovat aktivity v cloudu a poskytovat okam\u017eit\u00e1 upozorn\u011bn\u00ed. \u0158e\u0161en\u00ed by tak\u00e9 m\u011blo b\u00fdt schopno poskytovat zpr\u00e1vy, kter\u00e9 organizac\u00edm pomohou p\u0159ij\u00edmat informovan\u00e1 rozhodnut\u00ed.<\/p><h3>6. Vytv\u00e1\u0159en\u00ed pl\u00e1n\u016f z\u00e1lohov\u00e1n\u00ed a obnovy<\/h3><p>\u00a0<\/p><p>Pl\u00e1ny z\u00e1lohov\u00e1n\u00ed a obnovy jsou z\u00e1sadn\u00ed pro zaji\u0161t\u011bn\u00ed toho, aby v p\u0159\u00edpad\u011b bezpe\u010dnostn\u00edho incidentu nedo\u0161lo ke ztr\u00e1t\u011b dat. Spr\u00e1vci zabezpe\u010den\u00ed mus\u00ed pravideln\u011b vytv\u00e1\u0159et kopie citliv\u00fdch dat a ukl\u00e1dat je na bezpe\u010dn\u00e9m m\u00edst\u011b, kde je lze obnovit.<\/p><h3>7. Stanovte pro zam\u011bstnance povinn\u00e9 programy zvy\u0161ov\u00e1n\u00ed pov\u011bdom\u00ed<\/h3><p>\u00a0<\/p><p>Podle studie spole\u010dnosti <a href=\"https:\/\/resources.foundryco.com\/download\/cloud-computing-executive-summary\">Foundry<\/a> o cloud computingu je nedostatek odborn\u00fdch znalost\u00ed o cloudu jedn\u00edm z nejv\u011bt\u0161\u00edch probl\u00e9m\u016f, kter\u00fdm organizace \u010del\u00ed. Organizace mus\u00ed poskytnout zam\u011bstnanc\u016fm pot\u0159ebn\u00e9 \u0161kolen\u00ed o tom, jak nejl\u00e9pe pou\u017e\u00edvat cloud a co ned\u011blat, aby se p\u0159ede\u0161lo naru\u0161en\u00ed bezpe\u010dnosti dat a bezpe\u010dnostn\u00edm incident\u016fm.<\/p><p>Vzhledem k tomu, \u017ee podniky p\u0159ij\u00edmaj\u00ed r\u016fzn\u00e9 postupy, od pr\u00e1ce pln\u011b na pracovi\u0161ti a\u017e po pr\u00e1ci pln\u011b na d\u00e1lku, \u010del\u00ed spr\u00e1vci zabezpe\u010den\u00ed v\u00fdzv\u011b obnovit norm\u00e1ln\u00ed stav zabezpe\u010den\u00ed s\u00edt\u011b v p\u0159\u00edslu\u0161n\u00fdch organizac\u00edch. I kdy\u017e to m\u016f\u017ee zn\u00edt jednodu\u0161e, vzhledem k drastick\u00fdm zm\u011bn\u00e1m, kter\u00e9 v posledn\u00edch dvou letech prob\u011bhly v IT infrastruktu\u0159e organizac\u00ed, bude rozhodn\u011b n\u00e1ro\u010dn\u00e9 p\u0159epracovat a opravit mezery ve st\u00e1vaj\u00edc\u00edch bezpe\u010dnostn\u00edch z\u00e1sad\u00e1ch. Organizace mus\u00ed sv\u00fdm technick\u00fdm t\u00fdm\u016fm poskytnout maxim\u00e1ln\u00ed podporu, aby b\u011bhem t\u00e9to zm\u011bny zabezpe\u010dily sv\u00e9 s\u00edt\u011b p\u0159ed bezprecedentn\u00edmi \u00fatoky.<\/p><p>\u00a0<\/p><p>Na\u0161\u00ed odpov\u011bd\u00ed na tuto problematiku je integrovan\u00e9 \u0159e\u0161en\u00ed IAM \u2013 ManageEngine <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/active-directory\/ad360\/\">AD360<\/a>, postaven\u00e9 tak, aby spl\u0148ovalo po\u017eadavky IAM a kybernetick\u00e9 bezpe\u010dnosti dne\u0161n\u00edho IT sv\u011bta. Vylep\u0161ete sv\u00e9 IAM, ne\u017e bude p\u0159\u00edli\u0161 pozd\u011b!<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Organizace maj\u00ed v cloudu ulo\u017eeny spousty citliv\u00fdch informac\u00ed. Neo\u010dek\u00e1van\u00fd n\u00e1r\u016fst pr\u00e1ce na d\u00e1lku vedl k n\u00e1r\u016fstu mno\u017estv\u00ed informac\u00ed ulo\u017een\u00fdch v cloudu.\u00a0Jak ale na zabezpe\u010den\u00ed podnikov\u00e9ho cloudu? \u00a0 Podle spole\u010dnosti TechJury je 67 % podnikov\u00e9 infrastruktury zalo\u017eeno na cloudu.\u00a0 Proto\u017ee v\u0161ak organizace umo\u017e\u0148uj\u00ed zam\u011bstnanc\u016fm pou\u017e\u00edvat v pr\u00e1ci jak slu\u017eebn\u00ed, tak osobn\u00ed za\u0159\u00edzen\u00ed, roz\u0161\u00ed\u0159ila se plocha pro [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":73667,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_links_to":"","_links_to_target":""},"categories":[274],"tags":[335,366,496],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu - MWT Solutions<\/title>\n<meta name=\"description\" content=\"Podle spole\u010dnosti TechJury je 67 % podnikov\u00e9 infrastruktury zalo\u017eeno na cloudu. Jak na zabezpe\u010den\u00ed podnikov\u00e9ho cloudu?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu - MWT Solutions\" \/>\n<meta property=\"og:description\" content=\"Podle spole\u010dnosti TechJury je 67 % podnikov\u00e9 infrastruktury zalo\u017eeno na cloudu. Jak na zabezpe\u010den\u00ed podnikov\u00e9ho cloudu?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/\" \/>\n<meta property=\"og:site_name\" content=\"MWT Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-11T13:21:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-12T06:46:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/06\/How-a-weak-IAM-strategy-led-to-hacking-security-cameras_-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1153\" \/>\n\t<meta property=\"og:image:height\" content=\"604\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"marketing@mwtsolutions.eu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"marketing@mwtsolutions.eu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/\"},\"author\":{\"name\":\"marketing@mwtsolutions.eu\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\"},\"headline\":\"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu\",\"datePublished\":\"2022-05-11T13:21:02+00:00\",\"dateModified\":\"2022-05-12T06:46:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/\"},\"wordCount\":1196,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"keywords\":[\"active directory\",\"AD360\",\"Kybernetick\u00e1 bezpe\u010dnost\"],\"articleSection\":[\"\u010cl\u00e1nky\"],\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/\",\"name\":\"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu - MWT Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\"},\"datePublished\":\"2022-05-11T13:21:02+00:00\",\"dateModified\":\"2022-05-12T06:46:01+00:00\",\"description\":\"Podle spole\u010dnosti TechJury je 67 % podnikov\u00e9 infrastruktury zalo\u017eeno na cloudu. Jak na zabezpe\u010den\u00ed podnikov\u00e9ho cloudu?\",\"breadcrumb\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/i.mwtsolutions.eu\/cs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"name\":\"MWT Solutions\",\"description\":\"Kolejna witryna oparta na WordPressie\",\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"cs\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\",\"name\":\"MWT Solutions\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"contentUrl\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"width\":2825,\"height\":850,\"caption\":\"MWT Solutions\"},\"image\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pl.linkedin.com\/company\/mwt-solutions\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\",\"name\":\"marketing@mwtsolutions.eu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"caption\":\"marketing@mwtsolutions.eu\"},\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu - MWT Solutions","description":"Podle spole\u010dnosti TechJury je 67 % podnikov\u00e9 infrastruktury zalo\u017eeno na cloudu. Jak na zabezpe\u010den\u00ed podnikov\u00e9ho cloudu?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/","og_locale":"cs_CZ","og_type":"article","og_title":"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu - MWT Solutions","og_description":"Podle spole\u010dnosti TechJury je 67 % podnikov\u00e9 infrastruktury zalo\u017eeno na cloudu. Jak na zabezpe\u010den\u00ed podnikov\u00e9ho cloudu?","og_url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/","og_site_name":"MWT Solutions","article_published_time":"2022-05-11T13:21:02+00:00","article_modified_time":"2022-05-12T06:46:01+00:00","og_image":[{"width":1153,"height":604,"url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/06\/How-a-weak-IAM-strategy-led-to-hacking-security-cameras_-1.png","type":"image\/png"}],"author":"marketing@mwtsolutions.eu","twitter_card":"summary_large_image","twitter_misc":{"Napsal(a)":"marketing@mwtsolutions.eu","Odhadovan\u00e1 doba \u010dten\u00ed":"5 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/#article","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/"},"author":{"name":"marketing@mwtsolutions.eu","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe"},"headline":"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu","datePublished":"2022-05-11T13:21:02+00:00","dateModified":"2022-05-12T06:46:01+00:00","mainEntityOfPage":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/"},"wordCount":1196,"commentCount":0,"publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"keywords":["active directory","AD360","Kybernetick\u00e1 bezpe\u010dnost"],"articleSection":["\u010cl\u00e1nky"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/","url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/","name":"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu - MWT Solutions","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/#website"},"datePublished":"2022-05-11T13:21:02+00:00","dateModified":"2022-05-12T06:46:01+00:00","description":"Podle spole\u010dnosti TechJury je 67 % podnikov\u00e9 infrastruktury zalo\u017eeno na cloudu. Jak na zabezpe\u010den\u00ed podnikov\u00e9ho cloudu?","breadcrumb":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/7-bezpecnostnich-tipu-pro-spravce-zabezpeceni-podnikoveho-cloudu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/i.mwtsolutions.eu\/cs\/"},{"@type":"ListItem","position":2,"name":"7 bezpe\u010dnostn\u00edch tip\u016f pro spr\u00e1vce zabezpe\u010den\u00ed podnikov\u00e9ho cloudu"}]},{"@type":"WebSite","@id":"https:\/\/i.mwtsolutions.eu\/#website","url":"https:\/\/i.mwtsolutions.eu\/","name":"MWT Solutions","description":"Kolejna witryna oparta na WordPressie","publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"cs"},{"@type":"Organization","@id":"https:\/\/i.mwtsolutions.eu\/#organization","name":"MWT Solutions","url":"https:\/\/i.mwtsolutions.eu\/","logo":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/","url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","contentUrl":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","width":2825,"height":850,"caption":"MWT Solutions"},"image":{"@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/mwt-solutions"]},{"@type":"Person","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe","name":"marketing@mwtsolutions.eu","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","caption":"marketing@mwtsolutions.eu"},"url":"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/"}]}},"_links":{"self":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/86545"}],"collection":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/comments?post=86545"}],"version-history":[{"count":22,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/86545\/revisions"}],"predecessor-version":[{"id":86572,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/86545\/revisions\/86572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media\/73667"}],"wp:attachment":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media?parent=86545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/categories?post=86545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/tags?post=86545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}