{"id":2371,"date":"2019-07-13T22:55:29","date_gmt":"2019-07-13T22:55:29","guid":{"rendered":"https:\/\/ptp.cloud\/ptp\/?p=2371"},"modified":"2024-04-09T21:07:23","modified_gmt":"2024-04-10T01:07:23","slug":"capital-one-breach-reaction-you-can-secure-data-in-aws","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/","title":{"rendered":"Capital One Breach Reaction: You Can Secure Data in AWS!"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/ptp.cloud\/ptp\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg&#8221; title_text=&#8221;capital-one-breach-post-feature&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p>The recent announcement on the Capital One breach that affected over 100 million people (good detail from Krebs on Security <a href=\"https:\/\/krebsonsecurity.com\/2019\/07\/capital-one-data-theft-impacts-106m-people\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>) is compelling for a number of reasons. One, it was related to data on the Amazon Web Services (AWS) cloud, which cloud nay-sayers will use as fodder for why to keep your data on-premises. Second, the attacker, Paige Thompson, aka &#8216;erratic&#8217;, was a former Amazon employee. Third, the breach is one of the largest in terms of the amount of personal identifiable information (PII) that was compromised. All of this has made for an interesting story to follow, no question. The facts on data security, however, remain the same: there are vulnerabilities in ANY environment, the cloud is a secure Infrastructure as a Service (IaaS) platform, and security requires a layered approach. Business can match their risk from data loss with effective security strategies in the cloud.<\/p>\n[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p><strong>Adopt and Follow an Accepted Security Framework<\/strong><br \/> The security team at PTP favors the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener noreferrer\">NIST Cybersecurity Framework<\/a> as we assess environments, discuss technologies for hardening, and review processes and solutions for ongoing security and risk monitoring. The framework contains five major sections for consideration: Identify, Protect, Detect, Respond and Recover. Without turning this piece into a NIST framework training, the takeaway is the reduction of risk from a breach comes from implementing process and systems to apply to each area &#8211; &#8211; identifying critical\/sensitive data and it&#8217;s whereabouts, applying protection policies and technologies that are commensurate with the business risk and budget, having the discipline (previous PTP blog here on the subject) to continually monitor for potential threat, and when an identified breach occurs, to have the appropriate procedures in place to eradicate the breach and recover from the attack. If you are in the AWS cloud or considering the move, AWS has a helpful white paper to review related to mapping their cloud infrastructure to NIST. Check it out here.<\/p>\n[\/et_pb_text][et_pb_image src=&#8221;https:\/\/ptp.cloud\/ptp\/wp-content\/uploads\/2020\/11\/aws-security-framework-graphic.png&#8221; title_text=&#8221;aws-security-framework-graphic&#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p><strong>The AWS Cloud is the Gartner Leader, Fast-Growing, and Secure<\/strong><br \/> Recent announcements on earnings and growth from AWS showed a continued impressive growth due to adoption. They announced a 37% growth on the cloud business with 2nd Quarter revenue up to $8.38B. A key customer, Slack, a communications provider, announced a commitment to spending at least $250M on AWS over the next 5 years. Similarly, Lyft committed to spending $300M on AWS in the next 3 years and Pinterest committed to spending $750M on AWS in the next 6 years. This growth speaks to the usability and speed-to-market that AWS offers users. Companies that wish to turn Information Technology into a differentiator, advancing application development faster due to eliminating the effort to deploy and manage datacenter and infrastructure. While none of this growth speaks to the security measures for the IaaS and PaaS provided by AWS, the use by such public brands supports the due-diligence to ensure the appropriate protections are in place. On June 25th and 26th AWS hosted its innaugural re:Inforce security conference in Boston, MA. The incredibly well-attended event featured leading security personnel from AWS and customers discussing measures AWS takes to protect and tools it provides uses to aid in data protection. Highlights of the event can be found here.<\/p>\n[\/et_pb_text][et_pb_image src=&#8221;https:\/\/ptp.cloud\/ptp\/wp-content\/uploads\/2020\/11\/aws-gartner-grahic.png&#8221; title_text=&#8221;aws-gartner-grahic&#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p><strong>Your Business, AWS and PTP in the AWS Shared Responsibility Model<\/strong><br \/> AWS has done a great job outlining the cooperative effort between their responsibility of the cloud infrastructure and the responsibility of their customers in what they call the Shared Responsibility Model. While AWS accepts the fundamental security &#8220;OF&#8221; the cloud, the customer is responsible for their data security &#8220;IN&#8221; the cloud. As I outlined above with regards to NIST, the policies, procedures, tools and security expertise needs do not go away in the cloud, the needs are simply different. Mis-configurations can occur, poor policies can still be deployed, data may not be encrypted, data segmentation could be inadequate, too many admins can be allowed, and much more. Security in the cloud still requires a layered approach. The &#8220;Customer&#8221; functions in the graphic above show the elements that require alignment with a security framework such as NIST for proper security and oversight.<\/p>\n[\/et_pb_text][et_pb_image src=&#8221;https:\/\/ptp.cloud\/ptp\/wp-content\/uploads\/2020\/11\/shared-responsibility-post-feature.png&#8221; title_text=&#8221;shared-responsibility-post-feature&#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p><strong>Our Mission at PTP &#8211; Enable Secure and Compliant Use of the AWS Cloud<\/strong><br \/> Our services help provide the oversight to data inside the AWS cloud. We provide insight, reporting and analysis of cloud configurations, alignment of configurations with security and compliance frameworks such as NIST and HIPAA, scan for vulnerabilities at the OS and application levels, and monitor on a 24&#215;7 basis for security threats, which can be analyzed by the PTP Security Operations Center (SOC). Recognizing that the cloud environment is dynamic and ever-changing, we provide these services on an ongoing basis to be our customers governance extension, escalating issues that require remediation every month. The tools we use in our platform, along with our expert staff are delivered at a low recurring monthly cost, delivering lower risk, critical information for compliance, cost-optimization that&#8217;s critical for the CFO, and the discipline to execute on our mission every day of every year. Embrace the cloud, make your Information Technology a differentiator for your business, and ensure you have the security oversight that matches your level of risk.<\/p>\n[\/et_pb_text][et_pb_image src=&#8221;https:\/\/ptp.cloud\/ptp\/wp-content\/uploads\/2020\/11\/aws-secure-compliant-graphic.jpg&#8221; title_text=&#8221;aws-secure-compliant-graphic&#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>The recent announcement on the Capital One breach that affected over 100 million people (good detail from Krebs on Security here) is compelling for a number of reasons. One, it was related to data on the Amazon Web Services (AWS) cloud, which cloud nay-sayers will use as fodder for why to keep your data on-premises. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2373,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[23,9,1,10],"tags":[],"table_tags":[],"class_list":["post-2371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws-archive","category-cloudops-archive","category-news-archive","category-secops-archive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Capital One Breach Reaction: You Can Secure Data in AWS! | PTP News<\/title>\n<meta name=\"description\" content=\"Exploring the Capital One Breach: Lessons in Cloud Security and the NIST Framework. Understand the implications of the recent Capital One breach on AWS, the importance of a layered security approach in the cloud, and how PTP leverages the NIST Cybersecurity Framework to help businesses enhance their cloud security posture effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Capital One Breach Reaction: You Can Secure Data in AWS! | PTP News\" \/>\n<meta property=\"og:description\" content=\"Exploring the Capital One Breach: Lessons in Cloud Security and the NIST Framework. Understand the implications of the recent Capital One breach on AWS, the importance of a layered security approach in the cloud, and how PTP leverages the NIST Cybersecurity Framework to help businesses enhance their cloud security posture effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-13T22:55:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T01:07:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PTPstaff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PTPstaff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/\"},\"author\":{\"name\":\"PTPstaff\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5\"},\"headline\":\"Capital One Breach Reaction: You Can Secure Data in AWS!\",\"datePublished\":\"2019-07-13T22:55:29+00:00\",\"dateModified\":\"2024-04-10T01:07:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/\"},\"wordCount\":1186,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg\",\"articleSection\":[\"AWS\",\"CloudOps\",\"News\",\"SecOps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/\",\"url\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/\",\"name\":\"Capital One Breach Reaction: You Can Secure Data in AWS! | PTP News\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg\",\"datePublished\":\"2019-07-13T22:55:29+00:00\",\"dateModified\":\"2024-04-10T01:07:23+00:00\",\"description\":\"Exploring the Capital One Breach: Lessons in Cloud Security and the NIST Framework. Understand the implications of the recent Capital One breach on AWS, the importance of a layered security approach in the cloud, and how PTP leverages the NIST Cybersecurity Framework to help businesses enhance their cloud security posture effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg\",\"width\":1600,\"height\":1067,\"caption\":\"Securing Data in the Cloud: A Response to the Capital One Breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Capital One Breach Reaction: You Can Secure Data in AWS!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5\",\"name\":\"PTPstaff\",\"sameAs\":[\"https:\/\/ptpcloud.mystagingwebsite.com\/ptp\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Capital One Breach Reaction: You Can Secure Data in AWS! | PTP News","description":"Exploring the Capital One Breach: Lessons in Cloud Security and the NIST Framework. Understand the implications of the recent Capital One breach on AWS, the importance of a layered security approach in the cloud, and how PTP leverages the NIST Cybersecurity Framework to help businesses enhance their cloud security posture effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/","og_locale":"en_US","og_type":"article","og_title":"Capital One Breach Reaction: You Can Secure Data in AWS! | PTP News","og_description":"Exploring the Capital One Breach: Lessons in Cloud Security and the NIST Framework. Understand the implications of the recent Capital One breach on AWS, the importance of a layered security approach in the cloud, and how PTP leverages the NIST Cybersecurity Framework to help businesses enhance their cloud security posture effectively.","og_url":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2019-07-13T22:55:29+00:00","article_modified_time":"2024-04-10T01:07:23+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg","type":"image\/jpeg"}],"author":"PTPstaff","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"PTPstaff","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/"},"author":{"name":"PTPstaff","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5"},"headline":"Capital One Breach Reaction: You Can Secure Data in AWS!","datePublished":"2019-07-13T22:55:29+00:00","dateModified":"2024-04-10T01:07:23+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/"},"wordCount":1186,"commentCount":0,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg","articleSection":["AWS","CloudOps","News","SecOps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/","url":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/","name":"Capital One Breach Reaction: You Can Secure Data in AWS! | PTP News","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg","datePublished":"2019-07-13T22:55:29+00:00","dateModified":"2024-04-10T01:07:23+00:00","description":"Exploring the Capital One Breach: Lessons in Cloud Security and the NIST Framework. Understand the implications of the recent Capital One breach on AWS, the importance of a layered security approach in the cloud, and how PTP leverages the NIST Cybersecurity Framework to help businesses enhance their cloud security posture effectively.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg","width":1600,"height":1067,"caption":"Securing Data in the Cloud: A Response to the Capital One Breach"},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/capital-one-breach-reaction-you-can-secure-data-in-aws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"Capital One Breach Reaction: You Can Secure Data in AWS!"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5","name":"PTPstaff","sameAs":["https:\/\/ptpcloud.mystagingwebsite.com\/ptp"]}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/capital-one-breach-post-feature.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/2371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=2371"}],"version-history":[{"count":0,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/2371\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/2373"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=2371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=2371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=2371"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=2371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}