{"id":11209,"date":"2022-02-10T19:00:57","date_gmt":"2022-02-10T18:00:57","guid":{"rendered":"http:\/\/www.orbit.cz\/?post_type=encyklopedie-cloudu&#038;p=11209"},"modified":"2025-08-27T11:15:16","modified_gmt":"2025-08-27T09:15:16","slug":"continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci","status":"publish","type":"encyklopedie-cloudu","link":"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/","title":{"rendered":"Continuous cloud compliance: keeping your cloud safe"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-01-300x200.jpg\" alt=\"Continuous cloud compliance: keeping your cloud safe | ORBIT Cloud Encyclopedia\" class=\"wp-image-11210\" style=\"width:442px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-01-300x200.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-01-1024x684.jpg 1024w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-01-768x513.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-01.jpg 1078w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n<style>.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box11209_700add-bd .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box11209_700add-bd .kt-blocks-info-box-link-wrap{background:#ffffff;padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:0px;}.kt-info-box11209_700add-bd.wp-block-kadence-infobox{max-width:100%;}.kt-info-box11209_700add-bd .kadence-info-box-image-inner-intrisic-container .kadence-info-box-image-intrisic{padding-bottom:100%;max-width:100%;}.kt-info-box11209_700add-bd .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box11209_700add-bd .kt-info-svg-icon-flip, .kt-info-box11209_700add-bd .kt-blocks-info-box-number{font-size:50px;}.kt-info-box11209_700add-bd .kt-blocks-info-box-media{border-radius:200px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-info-box11209_700add-bd .kt-infobox-textcontent p.kt-blocks-info-box-title{font-size:var(--global-kb-font-size-md, 1.25rem);padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box11209_700add-bd .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box11209_700add-bd orbit-testimonial-second\"><span class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-left kt-info-halign-left\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><\/div><\/div><div class=\"kt-infobox-textcontent\"><p class=\"kt-blocks-info-box-title\">With the increasing number of cloud environments and individual components in operation, customers are beginning to address pressing questions such as: is my environment still set up correctly? Did I make a mistake in the configuration somewhere? Are my applications vulnerable? All these questions can be answered by the area of continuous cloud compliance, and by products from the cloud security posture management family. So in today's Cloud Encyclopedia article, we'll focus on how to sleep well at night.\u00a0<\/p><p class=\"kt-blocks-info-box-text\">Martin Gavanda<\/p><\/div><\/span><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What does it mean <em>continuous cloud compliance<\/em>&nbsp;and&nbsp;<em>cloud security posture management<\/em><\/strong><\/h2>\n\n\n\n<p>First, let's define the two key terms above. If you're interested in cloud security, you've probably come across them in the past. Different cloud providers or security tool vendors use one term or the other, but they are essentially the same thing - they refer to the tools and processes that allow you to have&nbsp;<strong>Continuous visibility into the health of your cloud environment<\/strong>.<\/p>\n\n\n\n<p>I personally prefer the term&nbsp;<em>continuous cloud compliance<\/em>because it includes not only specific tools to continuously check compliance with various security policies, but also the approach to security in the cloud itself.<\/p>\n\n\n\n<p>In the classical&nbsp;<strong>on-premise environment<\/strong> we most often encounter a reactive approach. Security checks or various scans are performed (usually automated) at defined time periods (typically on a weekly or monthly basis) and based on the results, a security incident is then created and then forwarded for resolution.<\/p>\n\n\n\n<p>As you may have guessed, a major drawback of this approach is the length of time my environment is in a \"sub-optimal\" state. Some security aspects I am not even able to detect.<\/p>\n\n\n\n<p>The whole point of a cloud environment is to have any resource immediately available - whether it's a database, a Kubernetes cluster or a set of virtual servers. Similarly, I should respond immediately to any security flaws or misconfigurations.<\/p>\n\n\n\n<p>If I accidentally expose the contents of my S3 bucket publicly to the internet, I cannot afford to wait a few days for another security scan to run, I must have this information immediately. I want to be constantly aware of the current security of my cloud environment, hence the term&nbsp;<em>continuous cloud compliance<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Shared Responsibility Model<\/strong><\/h2>\n\n\n\n<p>Whenever we talk about security in the cloud, we must not forget the shared responsibility model between us and the cloud provider.<\/p>\n\n\n\n<p>This model defines and allocates responsibility for certain components between us and the provider. It is divided into two parts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>responsibility \"of\" the cloud<\/strong>&nbsp;- what the cloud service provider is responsible for,<\/li>\n\n\n\n<li><strong>responsibility \"in\" the cloud<\/strong>&nbsp;- what the cloud service user is responsible for<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11212\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"164\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-02-300x164.jpg\" alt=\"Shared Responsibility Model | ORBIT Cloud Encyclopedia\" class=\"wp-image-11212\" style=\"width:464px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-02-300x164.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-02-768x420.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-02.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Source:Amazon Web Service<\/figcaption><\/figure>\n<\/div>\n\n\n<p>A key lesson from the shared responsibility model is that&nbsp;<strong>the user is always solely responsible for all configuration and security of the services operated<\/strong>.<\/p>\n\n\n\n<p>The service provider gives us the tools and services to comprehensively secure our cloud environment. However, we are solely responsible for their implementation or use.<\/p>\n\n\n\n<p>The \"affair\" of 2018 is a beautiful case in point. According to the very first articles, it looked like a major problem with AWS itself. What happened then?&nbsp;<a href=\"https:\/\/duo.com\/decipher\/exposed-aws-resources-leaked-sensitive-data\" target=\"_blank\" rel=\"noopener\">Group of security experts<\/a>&nbsp;discovered a large amount of sensitive data in AWS, specifically:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>116,386 publicly available EBS snapshots exposed to the internet, from 3,213 different accounts,<\/li>\n\n\n\n<li>373 public Relational Database Service (RDS) snapshots from 227 accounts,<\/li>\n\n\n\n<li>711,598 public Amazon Machine Images (AMIs) from 20,952 accounts,<\/li>\n\n\n\n<li>16,000 public IPs of exposed AWS-managed ElasticSearch clusters that could have their contents stolen or data possibly deleted.<\/li>\n<\/ul>\n\n\n\n<p>What did the data contain? For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>over 300,000 customer emails and encrypted passwords that belong to a Fortune 50 enterprise,<\/li>\n\n\n\n<li>500,000 customer and employee records belonging to a healthcare supply chain management vendor whose clients include most major healthcare providers.<\/li>\n<\/ul>\n\n\n\n<p>Was it some kind of AWS bug? No, in the end it turned out to be human error or ignorance. If I mark my EBS snapshot as public, it is indeed public. And the most spicy thing is that users saw an explicit warning that public really, really means public, available to everyone.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"213\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-03-300x213.jpg\" alt=\"Modify permissions AWS | ORBIT Cloud Encyclopedia\" class=\"wp-image-11214\" style=\"width:504px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-03-300x213.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-03-768x545.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-03.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<p>What is the lesson here?&nbsp;<strong>People make mistakes.&nbsp;<\/strong>Either intentionally or out of ignorance. And the purpose&nbsp;<em>continuous cloud compliance<\/em>&nbsp;is to prevent these problems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How it works&nbsp;<\/strong><strong><em>continuous cloud compliance<\/em><\/strong><\/h2>\n\n\n\n<p><em>Continuous cloud compliance<\/em> provides us with <strong>instant overview<\/strong>&nbsp;about all components in each environment and&nbsp;<strong>constantly evaluates<\/strong>&nbsp;compliance or non-compliance of these components with the defined rules.<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11218\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"163\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-04-300x163.jpg\" alt=\"How continuous cloud compliance works | ORBIT Cloud Encyclopedia\" class=\"wp-image-11218\" style=\"width:510px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-04-300x163.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-04-768x417.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-04.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">How continuous cloud compliance works<\/figcaption><\/figure>\n<\/div>\n\n\n<p><em>&nbsp;<\/em><\/p>\n\n\n\n<p>Examples of selected policies:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Do all running components have mandator tags assigned to them, which I defined in my&nbsp;<a href=\"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/tagovani-v-cloudu-jak-z-nej-vytezit-maximum\/\">tagging policy<\/a>?<\/li>\n\n\n\n<li>Don't I have a Firewall rule that allows access \"from anywhere\"?<\/li>\n\n\n\n<li>Are all my servers encrypted?<\/li>\n\n\n\n<li>Am I running an application server somewhere that has known vulnerabilities (CVEs)?<\/li>\n<\/ul>\n\n\n\n<p>At the same time, I want to have a clear and comprehensive overview of all environments \"in one place\". And last but not least, I need to be in a position to be in a position to be in a new non-compliant state&nbsp;<strong>immediately informed by notification<\/strong>&nbsp;(or even automatically create&nbsp;<em>security incident<\/em>).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"125\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-05-300x125.jpg\" alt=\"Security incident | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11222\" style=\"width:500px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-05-300x125.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-05-768x319.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-05.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Typical functionality<\/strong><\/h2>\n\n\n\n<p>Individual tools vary in their functionality, but in general, tools for&nbsp;<em>continuous cloud compliance<\/em>&nbsp;should cover the following areas:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Assets management<\/strong><\/h3>\n\n\n\n<p>I need to have a clear view of all running components across all environments and know all available metadata for those components (for example, their configuration).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"47\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-06-300x47.jpg\" alt=\"Assets management | ORBIT Cloud Encyclopedia\" class=\"wp-image-11226\" style=\"width:480px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-06-300x47.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-06-768x120.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-06.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Event management<\/strong><\/h3>\n\n\n\n<p>I need a comprehensive view of the individual components in operation and the time sequence of individual events (rule violations). Typically, we can automate the creation of security incidents on an event-by-event basis.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"75\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-07-300x75.jpg\" alt=\"Event management | ORBIT Cloud Encyclopedia\" class=\"wp-image-11230\" style=\"width:490px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-07-300x75.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-07-768x193.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-07.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Rules and compliance engine<\/strong><\/h3>\n\n\n\n<p>I want to be able to define individual security policies. In general, various \"industry-standard\" predefined policies can be used, for example&nbsp;<em>CIS Benchmark<\/em>&nbsp;atp. The use of these pre-prepared rules facilitates the initial deployment&nbsp;<em>continuous cloud compliance<\/em>&nbsp;tools, but let's not forget that&nbsp;<strong>it is crucial to be able to create your own rules<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"129\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-08-300x129.jpg\" alt=\"Rules and compliance engine | ORBIT Cloud Encyclopedia\" class=\"wp-image-11234\" style=\"width:488px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-08-300x129.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-08-768x330.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-08.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Vulnerability management<\/strong><\/h3>\n\n\n\n<p>This functionality allows you to scan individual operating components for known security threats (CVEs). At a minimum, the tool should support scanning of standard virtual servers, containers, and container images.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"137\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-09-300x137.jpg\" alt=\"Vulnerability management | ORBIT Cloud Encyclopedia\" class=\"wp-image-11238\" style=\"width:504px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-09-300x137.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-09-768x351.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-09.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Visualizing the network topology<\/strong><\/h3>\n\n\n\n<p>Especially with more complex applications, it is often difficult to understand at first glance&nbsp;<a href=\"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/sitova-architektura-aneb-rozpletame-cloudove-site\/\">network infrastructure<\/a>&nbsp;applications and connections between components. Some tools help us to visualize these dependencies automatically. For example, they show us which application elements have an assigned public IP address or how they are further connected to each other.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"158\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-10-300x158.jpg\" alt=\"Network Topology Visualization | ORBIT Cloud Encyclopedia\" class=\"wp-image-11242\" style=\"width:510px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-10-300x158.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-10-768x404.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-10.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Example of tool specific functionality<\/strong><\/h3>\n\n\n\n<p>Tool&nbsp;<em>Orca Security<\/em>&nbsp;can identify and classify the data content of individual servers in operation, for example the presence of a private key or password in a readable form.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"366\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2024\/02\/continuous-cloud-compliance-09.jpg\" alt=\"\" class=\"wp-image-17439\" style=\"width:543px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2024\/02\/continuous-cloud-compliance-09.jpg 800w, http:\/\/4.184.192.234\/wp-content\/uploads\/2024\/02\/continuous-cloud-compliance-09-300x137.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2024\/02\/continuous-cloud-compliance-09-768x351.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>What tools for&nbsp;<\/strong><strong><em>continuous cloud compliance<\/em><\/strong><strong>&nbsp;I can use<\/strong><\/h2>\n\n\n\n<p>Individual cloud environments offer a set of tools to help you&nbsp;<em>continuous cloud compliance&nbsp;<\/em>largely covered. Unlike off-the-shelf solutions, you may have to connect the individual tools to each other yourself, work out the integration to your existing SIEM tool or similar. But in the context of the cost of off-the-shelf solutions, these will be marginal amounts.<\/p>\n\n\n\n<p>On the other hand, you need to have some know-how and an idea of what you want to achieve. Now let's take a look at the tools you can use in each cloud environment&nbsp;<strong>deploy and use immediately<\/strong>. The following list is certainly not intended to cover all the tools offered, but to present those that I personally consider the most important.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Amazon Web Services &amp; Continuous cloud compliance<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/aws.amazon.com\/security-hub\/\" target=\"_blank\" rel=\"noopener\"><strong>AWS Security Hub<\/strong><\/a>&nbsp;provides a central view of all security-related areas in AWS and brings together other tools (for example, the results of automated infrastructure scans by&nbsp;<em>Amazon Inspector<\/em>&nbsp;or sensitive data identified by&nbsp;<em>Amazon Macie<\/em>).<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11250\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"129\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-12-300x129.jpg\" alt=\"AWS Security Hub | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11250\" style=\"width:400px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-12-300x129.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-12-768x330.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-12.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Source:Amazon Web Services<\/figcaption><\/figure>\n<\/div>\n\n\n<p><a href=\"https:\/\/aws.amazon.com\/config\/\" target=\"_blank\" rel=\"noopener\"><strong>AWS Config<\/strong><\/a><a href=\"https:\/\/aws.amazon.com\/config\/\">&nbsp;<\/a>is a service providing&nbsp;<em>asset management<\/em>. It allows you to evaluate the status of individual resources against defined security policies.<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11254\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"144\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-13-300x144.jpg\" alt=\"AWS Config | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11254\" style=\"width:398px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-13-300x144.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-13-768x368.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-13.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Source:Amazon Web Services<\/figcaption><\/figure>\n<\/div>\n\n\n<p><a href=\"https:\/\/aws.amazon.com\/inspector\/\" target=\"_blank\" rel=\"noopener\"><strong>AWS Inspector<\/strong><\/a>&nbsp;enables automated scanning of different running components (virtual servers, containers, container images) against known vulnerabilities (CVEs).<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11258\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"134\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-14-300x134.jpg\" alt=\"AWS Inspector | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11258\" style=\"width:398px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-14-300x134.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-14-768x342.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-14.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">AWS Inspector (Source: Amazon Web Services)<\/figcaption><\/figure>\n<\/div>\n\n\n<p><a href=\"https:\/\/aws.amazon.com\/guardduty\/\" target=\"_blank\" rel=\"noopener\"><strong>Amazon GuardDuty<\/strong><\/a><strong>&nbsp;<\/strong>allows you to automatically analyze individual logs or audit records. Based on anomaly detection and machine learning, it alerts you to potential security incidents.<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11262\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"116\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-15-300x116.jpg\" alt=\"Amazon GuardDuty | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11262\" style=\"width:408px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-15-300x116.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-15-768x296.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-15.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Amazon GuardDuty (Source: Amazon Web Services)<\/figcaption><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Microsoft Azure<\/strong><strong> &amp; Continuous cloud compliance<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/policy\/overview\" target=\"_blank\" rel=\"noopener\"><strong>Azure Policy<\/strong><\/a>&nbsp;allows you to define (and possibly enforce) individual security policies over running components.<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11266\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"110\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-16-300x110.jpg\" alt=\"Azure Policy | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11266\" style=\"width:422px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-16-300x110.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-16-768x281.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-16.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Azure Policy (Source: Microsoft)<\/figcaption><\/figure>\n<\/div>\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/defender-for-cloud\/defender-for-cloud-introduction\" target=\"_blank\" rel=\"noopener\"><strong>Microsoft Defender for Cloud<\/strong><\/a><strong>&nbsp;<\/strong>is de facto complex&nbsp;<em>cloud security posture management<\/em>&nbsp;a tool (similar to third party products) covering different areas of&nbsp;<em>continuous cloud compliance<\/em>.<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11270\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"96\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-17-300x96.jpg\" alt=\"Microsoft Defender for Cloud | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11270\" style=\"width:430px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-17-300x96.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-17-768x245.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-17.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Defender for Cloud (Source: Microsoft)<\/figcaption><\/figure>\n<\/div>\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/defender-for-identity\/what-is\" target=\"_blank\" rel=\"noopener\"><strong>Microsoft Defender for Identity<\/strong><\/a>&nbsp;provides a wide range of identity protection services. For example, it can detect compromised identities (e.g. a misused service account, etc.).<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11274\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"165\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-18-300x165.jpg\" alt=\"Microsoft Defender for Identity | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11274\" style=\"width:434px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-18-300x165.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-18-768x421.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-18.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Defender for Identity (Source: Microsoft)<\/figcaption><\/figure>\n<\/div>\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-monitor\/app\/change-analysis-visualizations\" target=\"_blank\" rel=\"noopener\"><strong>Application Change Analysis<\/strong><\/a><strong>&nbsp;<\/strong>allows you to inventory all running resources and track any configuration changes made.<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11278\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"161\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-19-300x161.jpg\" alt=\"Application Change Analysis | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11278\" style=\"width:438px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-19-300x161.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-19-768x411.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-19.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Application Change Analysis (Source: Microsoft)<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Third Party Products<\/strong><\/h2>\n\n\n\n<p>Personally, I prefer to use the tools provided by the cloud providers themselves, which I can tailor to my exact needs. However, this requires some effort and, as we know, time is money. That's why in some cases it's preferable to reach for ready-made third-party solutions.<\/p>\n\n\n\n<p>With ready-made solutions I perceive a certain discrepancy between the required and provided functionality and several other pros and cons.<\/p>\n\n\n\n<p><strong>Benefits of ready-made solutions:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Usually provided as SaaS without having to \"worry\" about the tool itself<\/li>\n\n\n\n<li>Seamless integration of different cloud providers, at least in the case of AWS and Azure<\/li>\n\n\n\n<li>Simple and fast deployment; basic onboarding environment is a matter of minutes<\/li>\n\n\n\n<li>A unified view of different cloud environments<\/li>\n\n\n\n<li>Extensive functionality provided<\/li>\n<\/ul>\n\n\n\n<p><strong>Negatives of ready-made solutions:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>They provide funckionality&nbsp;<em>as-is<\/em>. If something does not suit you, it is difficult or impossible to change it.<\/li>\n\n\n\n<li>The pricing model is in some cases complicated (payment for different modules, functional units, etc.).<\/li>\n\n\n\n<li>The price is usually based on the number of \"managed\" resources.<\/li>\n<\/ul>\n\n\n\n<p>If, after this quick assessment, you are leaning more towards using third-party tools, I would definitely recommend at least looking at these products:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em><a href=\"https:\/\/www.checkpoint.com\/cloudguard\/cloud-security-solutions\/\" target=\"_blank\" rel=\"noopener\">Check Point CloudGuard<\/a><\/em><\/li>\n\n\n\n<li><em><a href=\"https:\/\/www.datadoghq.com\/blog\/cloud-security-posture-management\/\" target=\"_blank\" rel=\"noopener\">Datadog<\/a><\/em><\/li>\n\n\n\n<li><em><a href=\"https:\/\/orca.security\/\" target=\"_blank\" rel=\"noopener\">Orca Security<\/a><\/em><\/li>\n<\/ul>\n\n\n\n<p>I wouldn't want to go into comprehensive reviews of individual products, after all your requirements may differ greatly from the expectations I have of similar products. In general terms, I personally tend to be primarily inclined towards the&nbsp;<em>CloudGuard<\/em>which I know from the time when it was not a product of Check Point, but of Dome9.<\/p>\n\n\n<div class=\"wp-block-image plnobarevny wp-image-11282\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"193\" src=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-20-300x193.jpg\" alt=\"Datadog | Continuous cloud compliance | ORBIT Cloud Encyclopedia\" class=\"wp-image-11282\" style=\"width:432px;height:auto\" srcset=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-20-300x193.jpg 300w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-20-768x493.jpg 768w, http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-20.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\">Datadog (Source: Datadog)<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>In conclusion to <em>continuous cloud compliance<\/em><\/strong><\/h2>\n\n\n\n<p>What should you take away from this article? First and foremost, that&nbsp;<strong>security in the cloud is entirely your responsibility<\/strong>. Consequently, you should always know the state of the individual components in operation and be able to define your individual security policies and requirements.<\/p>\n\n\n\n<p>From my point of view, it doesn't matter which tools for&nbsp;<em>continuous cloud compliance<\/em> you will use. But if you're migrating production applications to the cloud, you should be able to cover this area.<\/p>\n\n\n\n<p>If you are considering deploying&nbsp;<em>continuous cloud compliance<\/em>&nbsp;and you would like to discuss the topic in more detail (technical possibilities of individual products, necessary process changes that will certainly have to be made, etc.),&nbsp;<a href=\"http:\/\/4.184.192.234\/en\/cloud-journey-sluzby\/\">feel free to contact us<\/a>&nbsp;and we'll work together to come up with the best solution for your individual needs.<\/p>\n\n\n\n<p>And that's all for today. Thanks for reading this far. In the next article&nbsp;<a href=\"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/\">Cloud Encyclopedia<\/a>&nbsp;Luk\u00e1\u0161 Kl\u00e1\u0161tersk\u00fd will share with you his experience on how to assess the maturity of your organization in the context of possible use of the cloud environment.<\/p>","protected":false},"excerpt":{"rendered":"<p>It's simple: security in the cloud is entirely your responsibility. How do you ensure it? It's not easy. Continuous Cloud Compliance can answer that for you.<\/p>","protected":false},"author":10,"featured_media":11210,"template":"","meta":{"_acf_changed":true,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":""},"categories":[129,127,128],"class_list":["post-11209","encyklopedie-cloudu","type-encyklopedie-cloudu","status-publish","has-post-thumbnail","hentry","category-cloud-compliance","category-cloud-governance","category-cloud-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Continuous cloud compliance = cloud v bezpe\u010d\u00ed | Encyklopedie cloudu ORBIT<\/title>\n<meta name=\"description\" content=\"Je to jednoduch\u00e9: bezpe\u010dnost v cloudu je \u010dist\u011b va\u0161e odpov\u011bdnost. Jak ji zajistit? To nen\u00ed jednoduch\u00e9. Odpov\u00ed v\u00e1m continuous cloud compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Continuous cloud compliance: Aby byl v\u00e1\u0161 cloud st\u00e1le v bezpe\u010d\u00ed | Encyklopedie cloudu ORBIT\" \/>\n<meta property=\"og:description\" content=\"Je to jednoduch\u00e9: bezpe\u010dnost v cloudu je \u010dist\u011b va\u0161e odpov\u011bdnost. Jak ji zajistit? To nen\u00ed jednoduch\u00e9. Odpov\u00ed v\u00e1m continuous cloud compliance.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/\" \/>\n<meta property=\"og:site_name\" content=\"ORBIT | create IT your own way\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T09:15:16+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-21.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Continuous cloud compliance: Aby byl v\u00e1\u0161 cloud st\u00e1le v bezpe\u010d\u00ed | Encyklopedie cloudu ORBIT\" \/>\n<meta name=\"twitter:description\" content=\"Je to jednoduch\u00e9: bezpe\u010dnost v cloudu je \u010dist\u011b va\u0161e odpov\u011bdnost. Jak ji zajistit? To nen\u00ed jednoduch\u00e9. Odpov\u00ed v\u00e1m continuous cloud compliance.\" \/>\n<meta name=\"twitter:image\" content=\"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-21.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\\\/\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\\\/\",\"name\":\"Continuous cloud compliance = cloud v bezpe\u010d\u00ed | Encyklopedie cloudu ORBIT\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/continuous-cloud-compliance-01.jpg\",\"datePublished\":\"2022-02-10T18:00:57+00:00\",\"dateModified\":\"2025-08-27T09:15:16+00:00\",\"description\":\"Je to jednoduch\u00e9: bezpe\u010dnost v cloudu je \u010dist\u011b va\u0161e odpov\u011bdnost. Jak ji zajistit? To nen\u00ed jednoduch\u00e9. Odpov\u00ed v\u00e1m continuous cloud compliance.\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\\\/#primaryimage\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/continuous-cloud-compliance-01.jpg\",\"contentUrl\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/continuous-cloud-compliance-01.jpg\",\"width\":1078,\"height\":720,\"caption\":\"Continuous cloud compliance: Aby byl v\u00e1\u0161 cloud st\u00e1le v bezpe\u010d\u00ed | Encyklopedie cloudu ORBIT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/encyklopedie-cloudu\\\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/4.184.192.234\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Continuous cloud compliance: Aby byl v\u00e1\u0161 cloud st\u00e1le v&nbsp;bezpe\u010d\u00ed\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#website\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/\",\"name\":\"ORBIT | create IT your own way\",\"description\":\"ORBIT | create IT your own way\",\"publisher\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/4.184.192.234\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#organization\",\"name\":\"ORBIT s.r.o.\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logoslogan-01.png\",\"contentUrl\":\"http:\\\/\\\/4.184.192.234\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logoslogan-01.png\",\"width\":1417,\"height\":829,\"caption\":\"ORBIT s.r.o.\"},\"image\":{\"@id\":\"http:\\\/\\\/4.184.192.234\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/orbit\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Continuous cloud compliance = cloud safe | ORBIT Cloud Encyclopedia","description":"It's simple: security in the cloud is entirely your responsibility. How do you ensure it? It's not easy. Continuous Cloud Compliance can answer that for you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/","og_locale":"en_GB","og_type":"article","og_title":"Continuous cloud compliance: Aby byl v\u00e1\u0161 cloud st\u00e1le v bezpe\u010d\u00ed | Encyklopedie cloudu ORBIT","og_description":"Je to jednoduch\u00e9: bezpe\u010dnost v cloudu je \u010dist\u011b va\u0161e odpov\u011bdnost. Jak ji zajistit? To nen\u00ed jednoduch\u00e9. Odpov\u00ed v\u00e1m continuous cloud compliance.","og_url":"http:\/\/4.184.192.234\/en\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/","og_site_name":"ORBIT | create IT your own way","article_modified_time":"2025-08-27T09:15:16+00:00","og_image":[{"width":1200,"height":628,"url":"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-21.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Continuous cloud compliance: Aby byl v\u00e1\u0161 cloud st\u00e1le v bezpe\u010d\u00ed | Encyklopedie cloudu ORBIT","twitter_description":"Je to jednoduch\u00e9: bezpe\u010dnost v cloudu je \u010dist\u011b va\u0161e odpov\u011bdnost. Jak ji zajistit? To nen\u00ed jednoduch\u00e9. Odpov\u00ed v\u00e1m continuous cloud compliance.","twitter_image":"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-21.jpg","twitter_misc":{"Estimated reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/","url":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/","name":"Continuous cloud compliance = cloud safe | ORBIT Cloud Encyclopedia","isPartOf":{"@id":"http:\/\/4.184.192.234\/#website"},"primaryImageOfPage":{"@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/#primaryimage"},"image":{"@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/#primaryimage"},"thumbnailUrl":"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-01.jpg","datePublished":"2022-02-10T18:00:57+00:00","dateModified":"2025-08-27T09:15:16+00:00","description":"It's simple: security in the cloud is entirely your responsibility. How do you ensure it? It's not easy. Continuous Cloud Compliance can answer that for you.","breadcrumb":{"@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["http:\/\/4.184.192.234\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/#primaryimage","url":"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-01.jpg","contentUrl":"http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-01.jpg","width":1078,"height":720,"caption":"Continuous cloud compliance: Aby byl v\u00e1\u0161 cloud st\u00e1le v bezpe\u010d\u00ed | Encyklopedie cloudu ORBIT"},{"@type":"BreadcrumbList","@id":"http:\/\/4.184.192.234\/encyklopedie-cloudu\/continuous-cloud-compliance-aby-byl-vas-cloud-stale-v-bezpeci\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/4.184.192.234\/"},{"@type":"ListItem","position":2,"name":"Continuous cloud compliance: Aby byl v\u00e1\u0161 cloud st\u00e1le v&nbsp;bezpe\u010d\u00ed"}]},{"@type":"WebSite","@id":"http:\/\/4.184.192.234\/#website","url":"http:\/\/4.184.192.234\/","name":"ORBIT | create IT your own way","description":"ORBIT | create IT your own way","publisher":{"@id":"http:\/\/4.184.192.234\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/4.184.192.234\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"http:\/\/4.184.192.234\/#organization","name":"ORBIT s.r.o.","url":"http:\/\/4.184.192.234\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"http:\/\/4.184.192.234\/#\/schema\/logo\/image\/","url":"http:\/\/4.184.192.234\/wp-content\/uploads\/2020\/11\/logoslogan-01.png","contentUrl":"http:\/\/4.184.192.234\/wp-content\/uploads\/2020\/11\/logoslogan-01.png","width":1417,"height":829,"caption":"ORBIT s.r.o."},"image":{"@id":"http:\/\/4.184.192.234\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/orbit\/"]}]}},"taxonomy_info":{"category":[{"value":129,"label":"Cloud compliance"},{"value":127,"label":"Cloud governance"},{"value":128,"label":"Cloud security"}]},"featured_image_src_large":["http:\/\/4.184.192.234\/wp-content\/uploads\/2022\/02\/continuous-cloud-compliance-01-1024x684.jpg",1024,684,true],"author_info":{"display_name":"Martin Gavanda","author_link":"http:\/\/4.184.192.234\/en\/author\/e2d35802bbda7175\/"},"comment_info":"","_links":{"self":[{"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/encyklopedie-cloudu\/11209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/encyklopedie-cloudu"}],"about":[{"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/types\/encyklopedie-cloudu"}],"author":[{"embeddable":true,"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/users\/10"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/media\/11210"}],"wp:attachment":[{"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/media?parent=11209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/4.184.192.234\/en\/wp-json\/wp\/v2\/categories?post=11209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}