{"id":34873,"date":"2020-05-08T21:38:57","date_gmt":"2020-05-08T21:38:57","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=544002"},"modified":"2020-05-08T21:38:57","modified_gmt":"2020-05-08T21:38:57","slug":"principles-of-a-cloud-migration-security-w5h-the-where","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/","title":{"rendered":"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-300x225.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"cloud\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-300x225.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-768x576.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-640x480.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-440x330.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2-380x285.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/04\/cloud2.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>\u201cWherever I go, there I am\u201d -Security<\/p>\n<p>I recently had a discussion with a large organization that had a few workloads in multiple clouds while assembling a cloud security focused team to build out their security policy moving forward.&nbsp; It\u2019s one of my favorite conversations to have since I\u2019m not just talking about Trend Micro solutions and how they can help organizations be successful, but more so on how a business approaches the creation of their security policy to achieve a successful center of operational excellence.&nbsp; While I will talk more about the COE (center of operational excellence) in a future blog series, I want to dive into the core of the discussion \u2013 where do we add security in the cloud?<\/p>\n<p>We started discussing how to secure these new cloud native services like hosted services, serverless, container infrastructures, etc., and how to add these security strategies into their ever-evolving security policy.<\/p>\n<p>Quick note: If your cloud security policy is not ever-evolving, it\u2019s out of date. More on that later.<\/p>\n<p>A colleague and friend of mine, Bryan Webster, presented a concept that traditional security models have been always been about three things: Best Practice Configuration for Access and Provisioning, Walls that Block Things, and Agents that Inspect Things.&nbsp; We have relied heavily on these principles since the first computer was connected to another. I present to you this handy graphic he presented to illustrate the last two points.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-544003 size-full\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/05\/cloud-migration-where.png\" alt width=\"804\" height=\"525\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/05\/cloud-migration-where.png 804w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/05\/cloud-migration-where-300x196.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/05\/cloud-migration-where-768x501.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/05\/cloud-migration-where-640x418.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/05\/cloud-migration-where-440x287.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/05\/cloud-migration-where-380x248.png 380w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\"><\/p>\n<p>But as we move to secure cloud native services, some of these are outside our walls, and some don\u2019t allow the ability to install an agent. &nbsp;So WHERE does security go now?<\/p>\n<p>Actually, it\u2019s not all that different \u2013 just how it\u2019s deployed and implemented. Start by removing the thinking that security controls are tied to specific implementations. You don\u2019t need an intrusion prevention wall that\u2019s a hardware appliance much like you don\u2019t need an agent installed to do anti-malware. There will also be a big focus on your configuration, permissions, and other best practices.&nbsp; Use security benchmarks like the AWS Well-Architected, CIS, and SANS to help build an adaptable security policy that can meet the needs of the business moving forward.&nbsp; You might also want to consider consolidating technologies into a cloud-centric service platform like <a href=\"https:\/\/www.trendmicro.com\/cloudone\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro Cloud One<\/a>, which enables builders to protect their assets regardless of what\u2019s being built.&nbsp; Need IPS for your serverless functions or containers?&nbsp; Try <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/cloud-one-application-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cloud One Application Security<\/a>!&nbsp; Do you want to push security further left into your development pipeline? Take a look at <a href=\"https:\/\/www.trendmicro.com\/devops\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro Container Security<\/a> for Pre-Runtime Container Scanning or <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/cloud-one-conformity.html\">Cloud One Conformity<\/a> for helping developers scan your Infrastructure as Code.<\/p>\n<p>Keep in mind \u2013 wherever you implement security, there it is. Make sure that it\u2019s in a place to achieve the goals of your security policy using a combination of people, process, and products, all working together to make your business successful!<\/p>\n<p>This is part of a multi-part blog series on things to keep in mind during a cloud migration project.&nbsp; You can start at the beginning which was kicked off with a webinar here:&nbsp;<a href=\"https:\/\/resources.trendmicro.com\/Cloud-One-Webinar-Series-Secure-Cloud-Migration.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/resources.trendmicro.com\/Cloud-One-Webinar-Series-Secure-Cloud-Migration.html<\/a>.<\/p>\n<p>Also, feel free to give me a follow on&nbsp;<a href=\"https:\/\/www.linkedin.com\/in\/jasondablow\/\">LinkedIn<\/a>&nbsp;for additional security content to use throughout your cloud journey!<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/principles-of-a-cloud-migration-security-w5h-the-where\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cWherever I go, there I am\u201d -Security I recently had a discussion with a large organization that had a few workloads in multiple clouds while assembling a cloud security focused team to build out their security policy moving forward.\u00a0 It\u2019s one of my favorite conversations to have since I\u2019m not just talking about Trend Micro&#8230;<br \/>\nThe post Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34874,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1252,1253,8568,536,1254],"class_list":["post-34873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-cloud","tag-cloud-computing","tag-cloud-migration","tag-cloud-security","tag-devops"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-08T21:38:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE\",\"datePublished\":\"2020-05-08T21:38:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/\"},\"wordCount\":574,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg\",\"keywords\":[\"cloud\",\"cloud computing\",\"cloud migration\",\"Cloud Security\",\"devops\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/\",\"name\":\"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg\",\"datePublished\":\"2020-05-08T21:38:57+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg\",\"width\":300,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cloud\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/","og_locale":"en_US","og_type":"article","og_title":"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-08T21:38:57+00:00","og_image":[{"width":300,"height":225,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE","datePublished":"2020-05-08T21:38:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/"},"wordCount":574,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg","keywords":["cloud","cloud computing","cloud migration","Cloud Security","devops"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/","url":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/","name":"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg","datePublished":"2020-05-08T21:38:57+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/principles-of-a-cloud-migration-security-w5h-the-where.jpg","width":300,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/principles-of-a-cloud-migration-security-w5h-the-where\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud\/"},{"@type":"ListItem","position":3,"name":"Principles of a Cloud Migration \u2013 Security W5H \u2013 The WHERE"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34873"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34873\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34874"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}