{"id":34617,"date":"2020-04-24T17:26:43","date_gmt":"2020-04-24T17:26:43","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=543886"},"modified":"2020-04-24T17:26:43","modified_gmt":"2020-04-24T17:26:43","slug":"principles-of-a-cloud-migration-security-the-w5h-episode-what","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/","title":{"rendered":"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-300x225.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"cloud\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-300x225.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-768x576.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-640x480.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-440x330.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-380x285.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Teaching you to be a Natural Born Pillar!<\/p>\n<p>Last week, we took you through the \u201cWHO\u201d of securing a cloud migration <a href=\"https:\/\/blog.trendmicro.com\/principles-of-a-cloud-migration-security-the-w5h\/\">here<\/a>, detailing each of the roles involved with implementing a successful security practice during a cloud migration. Read: everyone. This week, I will be touching on the \u201cWHAT\u201d of security; the key principles required before your first workload moves.&nbsp; <a href=\"https:\/\/wa.aws.amazon.com\/wat.pillar.security.en.html\" target=\"_blank\" rel=\"noopener noreferrer\">The Well-Architected Framework Security Pillar<\/a> will be the baseline for this article since it thoroughly explains security concepts in a best practice cloud design.<\/p>\n<p>If you are not familiar with the AWS Well-Architected Framework, go google it right now. I can wait. I\u2019m sure telling readers to leave the article they\u2019re currently reading is a cardinal sin in marketing, but it really is important to understand just how powerful this framework is. Wait, this blog is html ready \u2013 here\u2019s the link: <a href=\"https:\/\/wa.aws.amazon.com\/index.en.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/wa.aws.amazon.com\/index.en.html<\/a>. It consists of five pillars that include best practice information written by architects with vast experience in each area.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-543887 size-full\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/well-architected-framework.png\" alt width=\"1040\" height=\"177\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/well-architected-framework.png 1040w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/well-architected-framework-300x51.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/well-architected-framework-1024x174.png 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/well-architected-framework-768x131.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/well-architected-framework-640x109.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/well-architected-framework-900x153.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/well-architected-framework-440x75.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/well-architected-framework-380x65.png 380w\" sizes=\"auto, (max-width: 1040px) 100vw, 1040px\"><\/p>\n<p>Since the topic here is Security, I\u2019ll start by giving a look into this pillar. However, I plan on writing about each and as I do, each one of the graphics above will become a link. Internet Magic!<\/p>\n<p>There are seven principles as a part of the security framework, as follows:<\/p>\n<table>\n<tbody readability=\"2\">\n<tr readability=\"4\">\n<td width=\"10px\"><\/td>\n<td>\n<ul>\n<li>Implement a strong identity foundation<\/li>\n<li>Enable traceability<\/li>\n<li>Apply security at all layers<\/li>\n<li>Automate security best practices<\/li>\n<li>Protect data in transit and at rest<\/li>\n<li>Keep people away from data<\/li>\n<li>Prepare for security events<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Now, a lot of these principles can be solved by using native cloud services and usually these are the easiest to implement. One thing the framework does not give you is suggestions on how to set up or configure these services. While it might reference turning on multi-factor authentication as a necessary step for your identity and access management policy, it is not on by default. Same thing with file object encryption. It is there for you to use but not necessarily enabled on the ones you create.<\/p>\n<p>Here is where I make a super cool (and free) recommendation on technology to accelerate your learning about these topics. We have a knowledge base with hundreds of cloud rules mapped to the Well-Architected Framework (and others!) to help accelerate your knowledge during and after your cloud migration. Let us take the use case above on multi-factor authentication. Our knowledge base article <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/RTM\/iam-user-sign-in-without-mfa.html\">here<\/a> details the four R\u2019s: Risk, Reason, Rationale, and References on why MFA is a security best practice.<\/p>\n<p>Starting with a Risk Level and detailing out why this is presents a threat to your configurations is a great way to begin prioritizing findings.&nbsp; It also includes the different compliance mandates and Well-Architected pillar (obviously Security in this case) as well as descriptive links to the different frameworks to get even more details.<\/p>\n<p>The reason this knowledge base rule is in place is also included. This gives you and your teams context to the rule and helps further drive your posture during your cloud migration. Sample reason is as follows for our MFA Use Case:<\/p>\n<p>\u201cAs a security best practice, it is always recommended to supplement your IAM user names and passwords by requiring a one-time passcode during authentication. This method is known as AWS Multi-Factor Authentication and allows you to enable extra security for your privileged IAM users. Multi-Factor Authentication (MFA) is a simple and efficient method of verifying your IAM user identity by requiring an authentication code generated by a virtual or hardware device on top of your usual access credentials (i.e. user name and password). The MFA device signature adds an additional layer of protection on top of your existing user credentials making your AWS account virtually impossible to breach without the unique code generated by the device.\u201d<\/p>\n<p>If Reason is the \u201cwhat\u201d of the rule, Rationale is the \u201cwhy\u201d supplying you with the need for adoption.&nbsp; Again, perfect for confirming your cloud migration path and strategy along the way.<\/p>\n<p>\u201cMonitoring IAM access in real-time for vulnerability assessment is essential for keeping your AWS account safe. When an IAM user has administrator-level permissions (i.e. can modify or remove any resource, access any data in your AWS environment and can use any service or component \u2013 except the Billing and Cost Management service), just as with the AWS root account user, it is mandatory to secure the IAM user login with Multi-Factor Authentication.<\/p>\n<p>Implementing MFA-based authentication for your IAM users represents the best way to protect your AWS resources and services against unauthorized users or attackers, as MFA adds extra security to the authentication process by forcing IAM users to enter a unique code generated by an approved authentication device.\u201d<\/p>\n<p>Finally, all the references for each of the risk, reason, and rationale, are included at the bottom which helps provide additional clarity. You\u2019ll also notice remediation steps, the 5<sup>th<\/sup> \u2018R\u2019 when applicable, which shows you how to actually the correct the problem.<\/p>\n<p>All of this data is included to the community as Trend Micro continues to be a valued security research firm helping the world be safe for exchanging digital information. Explore all the rules we have available in our public knowledge base: <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.cloudconformity.com\/knowledge-base\/<\/a>.<\/p>\n<p>This blog is part of a multi-part series dealing with the principles of a successful cloud migration.&nbsp; For more information, start at the first post here: <a href=\"https:\/\/blog.trendmicro.com\/principles-of-a-cloud-migration-from-step-one-to-done\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/blog.trendmicro.com\/principles-of-a-cloud-migration-from-step-one-to-done\/<\/a><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Teaching you to be a Natural Born Pillar! Last week, we took you through the \u201cWHO\u201d of securing a cloud migration here, detailing each of the roles involved with implementing a successful security practice during a cloud migration. Read: everyone. This week, I will be touching on the \u201cWHAT\u201d of security; the key principles required&#8230;<br \/>\nThe post Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT? appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34618,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1252,1253,8568,536],"class_list":["post-34617","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-cloud","tag-cloud-computing","tag-cloud-migration","tag-cloud-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-24T17:26:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT?\",\"datePublished\":\"2020-04-24T17:26:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/\"},\"wordCount\":926,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg\",\"keywords\":[\"cloud\",\"cloud computing\",\"cloud migration\",\"Cloud Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/\",\"name\":\"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg\",\"datePublished\":\"2020-04-24T17:26:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg\",\"width\":300,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/principles-of-a-cloud-migration-security-the-w5h-episode-what\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/","og_locale":"en_US","og_type":"article","og_title":"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-24T17:26:43+00:00","og_image":[{"width":300,"height":225,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT?","datePublished":"2020-04-24T17:26:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/"},"wordCount":926,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg","keywords":["cloud","cloud computing","cloud migration","Cloud Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/","url":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/","name":"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg","datePublished":"2020-04-24T17:26:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/principles-of-a-cloud-migration-security-the-w5h-episode-what.jpg","width":300,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-the-w5h-episode-what\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud\/"},{"@type":"ListItem","position":3,"name":"Principles of a Cloud Migration \u2013 Security, The W5H \u2013 Episode WHAT?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34617"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34617\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34618"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}