{"id":40602,"date":"2023-02-24T05:54:46","date_gmt":"2023-02-24T05:54:46","guid":{"rendered":"https:\/\/codeandpepper.com\/?p=40602"},"modified":"2023-02-24T06:03:46","modified_gmt":"2023-02-24T06:03:46","slug":"what-is-cloud-security-and-how-to-implement-it","status":"publish","type":"post","link":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/","title":{"rendered":"What is Cloud Security and How to Implement It?"},"content":{"rendered":"\n<p>Today, doing business without a cloud seems like implementing a handicap. You can do it but don\u2019t expect a lot of flexibility and options. With pay-per-use approach and multiple services available from top cloud providers, you can scale your business in a reasonable timeframe. The problem \u2013 it also has to be secure. How to introduce cloud to your organization and make it safe at the same time? Here\u2019s some tips on cloud security.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Top cloud providers like Amazon and it\u2019s <a href=\"https:\/\/aws.amazon.com\/\">Amazon Web Services (AWS)<\/a> is a first choice for companies that needs scalability. It\u2019s also safe, which we have covered in the article about <a href=\"https:\/\/codeandpepper.com\/security-aws-amazon-web-services\">AWS security<\/a>. OK, but what we are exactly talking about?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-cloud-security\"><strong>What is cloud security?<\/strong><\/h2>\n\n\n\n<p>Cloud security refers to the infrastructure, technology, services applications, data and policies that are exposed to the risk of getting hacked, damaged or destroyed. Either electronically (through the break in) or physically.<\/p>\n\n\n\n<p>One of key aspects of this topic, present in AWS, for example, is something called \u201cshared responsibility\u201d. In this model, a cloud provider is partially responsible for the safety. When it comes to infrastructure, hardware, power supply and physical space occupied by the servers, the ball is in their court. Operating system and virtualization is also their domain. The rest is up to you.<\/p>\n\n\n\n<p>There are several areas in which cloud security can be measured:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Software development life cycle (including version management)<\/li><li>Providing network connectivity and high availability<\/li><li>Assuring physical security of hardware and access to the infrastructure<\/li><li>Usage of encryption keys and password management<\/li><li>Security auditing, measuring, and testing<\/li><\/ul>\n\n\n\n<p>These are typical domains for the topic. The real question is: how exactly can you measure them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-measure-cloud-security\"><strong>How to measure cloud security?<\/strong><\/h2>\n\n\n\n<p>The security of the cloud must be audited in two ways: internally by the cloud provider and by an independent thirty party. It\u2019s a good practice to ask any provider for their audit results and latest certificate.<\/p>\n\n\n\n<p>There are many standards of quality in that field but few of them are most recognizable. It\u2019s especially important for the FinTech industry and <a href=\"https:\/\/codeandpepper.com\/services\/financial-software-development-services\">financial software development services<\/a> that aim to aid it.<\/p>\n\n\n\n<p>PCI-DSS \u2013 confirms the compliance of all (or some) services with the Payment Card Industry Data Security Standard.<\/p>\n\n\n\n<p>CSA STAR Level 2 \u2013 confirms the compliance with the&nbsp;<a href=\"https:\/\/cloudsecurityalliance.org\/star\/#tab_levelTwo\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Security Alliance STAR&nbsp;<\/a>requirements for high-risk data processing.<\/p>\n\n\n\n<p>ISO\/IEC 27001 together with the declaration of compliance with ISO\/IEC 27017 and ISO\/IEC 27018 \u2013 confirms implementing standardized Information Security Management System along with security and privacy controls dedicated for public cloud providers.<\/p>\n\n\n\n<p>SOC 2 Type II \u2013 confirms the compliance with&nbsp;<a href=\"https:\/\/www.aicpa.org\/home\" target=\"_blank\" rel=\"noreferrer noopener\">US AICPA\u2019s<\/a>&nbsp;SOC 2 requirements in the following areas: network and physical security, data availability, data processing integrity, data confidentiality, privacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cloud-security-challenges\"><strong>Cloud security challenges<\/strong><\/h2>\n\n\n\n<p>There are some undeniable challenges that your company will have to tackle sooner or later.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>DevOps and automation<\/strong>. Organizations that have embraced the highly automated DevOps CI\/CD culture must ensure that appropriate security controls are identified and embedded in code and templates early in the development cycle.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Visibility (or lack of) and tracking<\/strong>. In the Infrastructure-as-a-Code (IaaS) model, the cloud providers have full control over the infrastructure layer and do not expose it to their customers. The lack of visibility and control is further extended in the PaaS and SaaS cloud models. Cloud customers often cannot effectively identify and quantify their cloud assets or visualize their cloud environments.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Risk of attacks<\/strong>. The public cloud environment has become a large and highly attractive attack surface for hackers who exploit poorly secured cloud ingress ports in order to access and disrupt workloads and data in the cloud.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Key management and the granular privileges model<\/strong>. Often cloud user roles are configured very loosely, granting extensive privileges beyond what is intended or required. One common example is giving database delete or write permissions to untrained users or users who have no business need to delete or add database assets. At the application level, improperly configured keys and privileges expose sessions to security risks.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Compliance<\/strong>. All the leading cloud providers have aligned themselves with most of the well-known accreditation programs such as PCI 3.2, NIST 800-53, HIPAA and GDPR. However, customers are responsible for ensuring that their workload and data processes are compliant. Given the poor visibility as well as the dynamics of the cloud environment, the compliance audit process becomes close to mission impossible unless tools are used to achieve continuous compliance checks and issue real-time alerts about misconfigurations.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-as-the-client-are-you-responsible-for\"><strong>What, as the client, are you responsible for?<\/strong><\/h2>\n\n\n\n<p>Despite cloud provider being responsible for the heavy lifting around the hardware, it is you, who takes the responsibility for widely understood management of cloud security. Let\u2019s break it down.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>PaaS security<\/strong>. In Platform-as-a-Service (PaaS) cloud model, clients must take care of application\u2019s maintenance and security. This includes data backups, machine learning for threat detection, secured and high-level network connections, covering potential vulnerabilities of used databases, libraries, etc., security of the code itself.<\/li><li><strong>IaaS security tools<\/strong>. You must apply these security measures: high availability, network security, updated and patched operating system, configuration and data backup, data storage scalability.<\/li><li><strong>Identity and access management<\/strong>. Again, especially important for all FinTech businesses out there. Cloud provider\u2019s client should generate reports on user permission nad related services. They should also prepare reports on the usage of credentials (passwords, API keys, etc.). Clients are also faced with machine learning-supported reports on possible sensitive data storage and conditional access to applications (based on user\u2019s behavior or detected environment).<\/li><li><strong>Logging and monitoring activities<\/strong>. Here we have: reports on operations regarding any kind of confidential data (creation, modifications, and deletion), granting and revoking user permissions, creating, altering and deletion of accounts, groups and roles, failed attempts of signing-in (especially multiple), successful signing-ins, modifications of configurations (especially related to disabling security controls).<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-latest-cloud-security-developments\"><strong>Latest cloud security developments<\/strong><\/h2>\n\n\n\n<p>In its <a href=\"https:\/\/www.checkpoint.com\/downloads\/resources\/cloud-security-report-2022.pdf?mkt_tok=NzUwLURRSC01MjgAAAGJnTs_-d8ZrZ3ChHE5yBiMdWiP2ZDHSLHth1YMG5-0clmbHLdqkVisAy1V-Xot6xKFSlGuZoJvIq1H_d2aKY9m2uAbpVd4acVKN2XfpUB8S1KJrMx3\">2022 report on cloud security<\/a>&nbsp; Checkpoint pointed out that cloud adoption continues to grow, but so does threat levels. 27% of organizations experienced public cloud-related security incident in the last 12 months. That\u2019s a lot. 14% of them was exploitation-related, 15% was linked to compromised attacks, also 15% to inappropriate used or share data, 23% came from wrongly configured resource of account. Conclusion? Cloud security should be treated as a common good.<\/p>\n\n\n\n<p>This more or less corresponds with current cloud priorities in interview companies: 20% want to prevent cloud misconfigurations, 16% would like to secure major cloud apps already in use, and reach regulatory compliance, 13% will defend against malware.<\/p>\n\n\n\n<p>It\u2019s also interesting to see what security measures companies take to defend their cloud infrastructure. As it happens, 72% of them use access control, 60% anti-virus and anti-malware protection, 53% application protection and 53% multi-factor authentication.<\/p>\n\n\n\n<p>The report also points out additional threats regarding multi-provider cloud model, in which companies use at least two vendors. That seems complementary but it also increases risks. The report clearly shows it, too. 46% lost visibility and control over their cloud data, 50% don\u2019t understand how different solutions fit together (sometimes they don\u2019t!), 56% lack skills to deploy and manage a complete solution across all cloud environments, and 57% want to ensure data protection and privacy for each environment.<\/p>\n\n\n\n<p>That\u2019s why at Code &amp; Pepper we recommend limiting ourselves to one provider. We have chosen Amazon for their experience, huge number of cloud-related services and applications and our skills in implementing their solutions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-summary\"><strong>Summary<\/strong><\/h2>\n\n\n\n<p>When it comes to cloud security, you can\u2019t second guess your team or business partners\u2019 capabilities. That\u2019s why we recommend our <a href=\"https:\/\/codeandpepper.com\/services\/aws-amazon-web-services-consulting\">AWS development services<\/a>. We can help you and guide you on your way to scalable business. No matter if you\u2019re deep in FinTech or unrelated industry. We are here to answer all your questions. <a href=\"https:\/\/codeandpepper.com\/contact\">Contact us<\/a>, let\u2019s talk!<\/p>\n\n\n\n\n\n<section id=\"contact\" class=\"contact-block block common-block \">\n  <div class=\"container\">\n\n\n    \n  <svg class=\"wave\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"280\" height=\"9\" viewBox=\"0 0 280 9\">\n    <path fill=\"currentColor\" fill-rule=\"evenodd\" d=\"M0 3.6c2.88 0 4.18-.668 5.824-1.515C7.724 1.108 9.879 0 13.998 0c4.12 0 6.274 1.108 8.175 2.085 1.644.847 2.943 1.515 5.823 1.515 2.88 0 4.179-.668 5.824-1.515C35.72 1.108 37.874 0 41.995 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.824 1.515 2.88 0 4.18-.668 5.826-1.515C63.719 1.108 65.873 0 69.993 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.18-.668 5.825-1.515C91.715 1.108 93.87 0 97.99 0c4.12 0 6.273 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.178-.668 5.824-1.515 1.9-.977 4.054-2.085 8.173-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.055-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.179-.668 5.824-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.274 1.108 8.175 2.085 1.646.847 2.946 1.515 5.826 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.881 0 4.18-.668 5.827-1.515 1.9-.977 4.056-2.085 8.176-2.085 4.121 0 6.276 1.108 8.177 2.085 1.646.847 2.946 1.515 5.827 1.515s4.181-.668 5.828-1.515C259.718 1.108 261.873 0 265.995 0c4.121 0 6.275 1.108 8.177 2.084 1.645.848 2.946 1.516 5.828 1.516V9h-.007l-5.252-.793c-1.129-.382-2.056-.848-2.919-1.291-1.646-.847-2.946-1.516-5.827-1.516-2.882 0-4.183.669-5.829 1.516-1.9.977-4.056 2.084-8.177 2.084-4.12 0-6.275-1.107-8.176-2.084-1.647-.847-2.947-1.516-5.828-1.516-2.88 0-4.18.669-5.827 1.516-1.9.977-4.055 2.084-8.176 2.084-4.12 0-6.273-1.107-8.175-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.826 1.516c-1.9.977-4.055 2.084-8.175 2.084-4.12 0-6.275-1.107-8.176-2.084-1.644-.847-2.945-1.516-5.825-1.516-2.88 0-4.18.669-5.825 1.516-1.9.977-4.054 2.084-8.174 2.084-4.12 0-6.274-1.107-8.176-2.084-1.644-.847-2.943-1.516-5.823-1.516-2.88 0-4.18.669-5.826 1.516-1.9.977-4.054 2.084-8.175 2.084-4.12 0-6.274-1.107-8.174-2.084-1.646-.847-2.946-1.516-5.825-1.516s-4.179.669-5.824 1.516c-1.9.977-4.053 2.084-8.173 2.084s-6.273-1.107-8.173-2.084c-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.179.669-5.824 1.516C90.265 7.893 88.11 9 83.99 9c-4.12 0-6.273-1.107-8.173-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.825 1.516C62.268 7.893 60.113 9 55.993 9c-4.12 0-6.274-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.18.669-5.825 1.516C34.27 7.893 32.116 9 27.996 9c-4.12 0-6.273-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516s-4.179.669-5.824 1.516C7.311 7.359 1.127 8.618 0 9\"\/>\n<\/svg>\n\n<h2 class=\"block-title section-title\">\n  Let&#8217;s talk about your project<\/h2>\n\n\n  <div class=\"block-description typography-body\">\n    <p>Do you want to implement or enhance your cloud solutions? We are here to help, let&#8217;s talk about possibilities and best ways to achieve your goals.<\/p>\n  <\/div>\n\n    \n          <div class=\"contact-block-person\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"90\" height=\"90\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-90x90.png\" class=\"contact-block-person-image\" alt=\"\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-90x90.png 90w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-150x150.png 150w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-140x140.png 140w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-160x160.png 160w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6-136x136.png 136w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/09\/Olga_Pogorzelska_online-6.png 200w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/>        <div class=\"contact-block-person-text\">\n          <div class=\"typography-title-m\">\n            Olga Pogorzelska          <\/div>\n          <div class=\"typography-body-medium\">\n            New Business          <\/div>\n        <\/div>\n      <\/div>\n    \n\n    <form class=\"contact-form\" method=\"POST\" action=\"https:\/\/codeandpepper.com\/wp-admin\/admin-ajax.php\">\n            <amp-recaptcha-input layout=\"nodisplay\" name=\"recaptcha_token\" data-sitekey=\"6LeEo8cqAAAAABpahzrYQeEsO-xoutAjoIkrKpTB\" data-action=\"contact_block\"><\/amp-recaptcha-input>\n            <input type=\"hidden\" name=\"action\" value=\"contact_block_submit\" \/>\n      <input type=\"hidden\" name=\"block\" value=\"smallContactForm\" \/>\n      <input id=\"contact-email\" type=\"email\" name=\"email\" placeholder=\"Email\" class=\"gtm_form_input\" required>\n      <label for=\"contact-email\" class=\"contact-block-hidden-label\">Email<\/label>\n      <input id=\"contact-name\" type=\"text\" name=\"name\" placeholder=\"Full name\" class=\"gtm_form_input\" required>\n      <label for=\"contact-name\" class=\"contact-block-hidden-label\">\n        Full name      <\/label>\n\n      <input type=\"submit\" name=\"submit\" value=\"GET A QUOTE\" class=\"gtm_form_submit btn-big\">\n\n      <div submitting>\n      <\/div>\n      <div id=\"TYPSmallForm\" class=\"submit-msg submit-success\" submit-success>\n        <template type=\"amp-mustache\">\n          <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26\" height=\"26\" viewBox=\"0 0 26 26\">\n    <g fill=\"none\" fill-rule=\"evenodd\">\n        <g stroke=\"#FFF\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" transform=\"translate(1 1)\">\n            <path d=\"M17 8.5l-7.5 7L7 13\"\/>\n            <circle cx=\"12\" cy=\"12\" r=\"11.5\"\/>\n        <\/g>\n        <path d=\"M1 1h24v24H1z\"\/>\n    <\/g>\n<\/svg>\n          Your message has been sent. We will get back to you as soon as possible.\n        <\/template>\n      <\/div>\n      <div id=\"ErrorSmallForm\" class=\"submit-msg submit-error\" submit-error>\n        <template type=\"amp-mustache\">\n          <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"25\" viewBox=\"0 0 25 25\">\n    <g fill=\"none\" fill-rule=\"evenodd\">\n        <g stroke=\"currentColor\" stroke-linejoin=\"round\">\n            <path stroke-linecap=\"round\" stroke-width=\"2\" d=\"M23.498 12.31c.105 6.075-4.923 11.086-10.998 11.192-6.074.104-10.893-4.734-10.998-10.81C1.396 6.619 6.426 1.606 12.5 1.502c6.074-.106 10.893 4.734 10.998 10.808zM12.5 14V7\"\/>\n            <path fill=\"currentColor\" stroke-width=\"1.5\" d=\"M13 17.5a.5.5 0 0 1-1 0 .5.5 0 0 1 1 0z\"\/>\n        <\/g>\n        <path d=\"M1 0h24v24H1z\"\/>\n    <\/g>\n<\/svg>\n          Oops! Something went wrong. Please try again later.\n        <\/template>\n      <\/div>\n    <\/form>\n\n\n  <\/div>\n<\/section>\n<style type=\"text\/css\">\n  #contact {\n    background: #009fe3;\n    color: #FFFFFF;\n  }\n\n  #contactsvg {\n    color: #ffffff;\n  }\n<\/style>\n\n<section id=\"related-posts-block_63f84f89831d8\" class=\"related-posts-block block common-block \">\n  <div class=\"container\">\n\n\n    \n  <svg class=\"wave\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"280\" height=\"9\" viewBox=\"0 0 280 9\">\n    <path fill=\"currentColor\" fill-rule=\"evenodd\" d=\"M0 3.6c2.88 0 4.18-.668 5.824-1.515C7.724 1.108 9.879 0 13.998 0c4.12 0 6.274 1.108 8.175 2.085 1.644.847 2.943 1.515 5.823 1.515 2.88 0 4.179-.668 5.824-1.515C35.72 1.108 37.874 0 41.995 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.824 1.515 2.88 0 4.18-.668 5.826-1.515C63.719 1.108 65.873 0 69.993 0c4.12 0 6.274 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.18-.668 5.825-1.515C91.715 1.108 93.87 0 97.99 0c4.12 0 6.273 1.108 8.174 2.085 1.645.847 2.945 1.515 5.823 1.515 2.88 0 4.178-.668 5.824-1.515 1.9-.977 4.054-2.085 8.173-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.055-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.88 0 4.179-.668 5.824-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.274 1.108 8.175 2.085 1.646.847 2.946 1.515 5.826 1.515 2.88 0 4.18-.668 5.826-1.515 1.9-.977 4.054-2.085 8.175-2.085 4.12 0 6.273 1.108 8.174 2.085 1.646.847 2.945 1.515 5.825 1.515 2.881 0 4.18-.668 5.827-1.515 1.9-.977 4.056-2.085 8.176-2.085 4.121 0 6.276 1.108 8.177 2.085 1.646.847 2.946 1.515 5.827 1.515s4.181-.668 5.828-1.515C259.718 1.108 261.873 0 265.995 0c4.121 0 6.275 1.108 8.177 2.084 1.645.848 2.946 1.516 5.828 1.516V9h-.007l-5.252-.793c-1.129-.382-2.056-.848-2.919-1.291-1.646-.847-2.946-1.516-5.827-1.516-2.882 0-4.183.669-5.829 1.516-1.9.977-4.056 2.084-8.177 2.084-4.12 0-6.275-1.107-8.176-2.084-1.647-.847-2.947-1.516-5.828-1.516-2.88 0-4.18.669-5.827 1.516-1.9.977-4.055 2.084-8.176 2.084-4.12 0-6.273-1.107-8.175-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.826 1.516c-1.9.977-4.055 2.084-8.175 2.084-4.12 0-6.275-1.107-8.176-2.084-1.644-.847-2.945-1.516-5.825-1.516-2.88 0-4.18.669-5.825 1.516-1.9.977-4.054 2.084-8.174 2.084-4.12 0-6.274-1.107-8.176-2.084-1.644-.847-2.943-1.516-5.823-1.516-2.88 0-4.18.669-5.826 1.516-1.9.977-4.054 2.084-8.175 2.084-4.12 0-6.274-1.107-8.174-2.084-1.646-.847-2.946-1.516-5.825-1.516s-4.179.669-5.824 1.516c-1.9.977-4.053 2.084-8.173 2.084s-6.273-1.107-8.173-2.084c-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.179.669-5.824 1.516C90.265 7.893 88.11 9 83.99 9c-4.12 0-6.273-1.107-8.173-2.084-1.645-.847-2.944-1.516-5.824-1.516s-4.18.669-5.825 1.516C62.268 7.893 60.113 9 55.993 9c-4.12 0-6.274-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516-2.88 0-4.18.669-5.825 1.516C34.27 7.893 32.116 9 27.996 9c-4.12 0-6.273-1.107-8.174-2.084-1.645-.847-2.945-1.516-5.824-1.516s-4.179.669-5.824 1.516C7.311 7.359 1.127 8.618 0 9\"\/>\n<\/svg>\n\n<h2 class=\"block-title section-title\">\n  Related posts<\/h2>\n\n\n\n    <div>\n      <div class=\"related-posts\">\n                  <div class=\"related-post\">\n            <h3 class=\"related-post-title typography-title-m\">\n              <a href=\"https:\/\/codeandpepper.com\/infrastructure-as-code-deploying-web-applications-on-aws-cloudformation\/\" title=\"Infrastructure as Code: AWS and CloudFormation\">\n                Infrastructure as Code: AWS and CloudFormation              <\/a>\n            <\/h3>\n                          <a class=\"related-post-thumbnail\" aria-label=\"Infrastructure as Code: AWS and CloudFormation\" href=\"https:\/\/codeandpepper.com\/infrastructure-as-code-deploying-web-applications-on-aws-cloudformation\/\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"189\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code.png\" class=\"attachment-blog-thumbnail size-blog-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code.png 1200w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-768x400.png 768w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-192x100.png 192w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-720x375.png 720w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-864x450.png 864w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2020\/09\/infrastructure_as_code-432x225.png 432w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/>              <\/a>\n                        <p class=\"related-post-description typography-body-smaller\">\n              From this short guide, you will learn how to use CloudFormation and Infrastructure as Code to deploy your web application on AWS.            <\/p>\n            <a class=\"plus-link\" href=\"https:\/\/codeandpepper.com\/infrastructure-as-code-deploying-web-applications-on-aws-cloudformation\/\">\n              <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"17\" height=\"17\" viewBox=\"0 0 17 17\">\n    <path d=\"M7 0h3v17H7z\"\/>\n    <path d=\"M17 7v3H0V7z\"\/>\n<\/svg>\n              <span>Full Article<\/span>\n            <\/a>\n          <\/div>\n                  <div class=\"related-post\">\n            <h3 class=\"related-post-title typography-title-m\">\n              <a href=\"https:\/\/codeandpepper.com\/cloud-banking-solutions-key-facts-and-benefits\/\" title=\"Cloud Banking Solutions - Key Facts and Benefits\">\n                Cloud Banking Solutions &#8211; Key Facts and Benefits              <\/a>\n            <\/h3>\n                          <a class=\"related-post-thumbnail\" aria-label=\"Cloud Banking Solutions - Key Facts and Benefits\" href=\"https:\/\/codeandpepper.com\/cloud-banking-solutions-key-facts-and-benefits\/\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"189\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/08\/download.jpg\" class=\"attachment-blog-thumbnail size-blog-thumbnail wp-post-image\" alt=\"Cloud banking solutions cover image\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/08\/download.jpg 864w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/08\/download-768x400.jpg 768w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/08\/download-192x100.jpg 192w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/08\/download-720x375.jpg 720w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/08\/download-432x225.jpg 432w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/>              <\/a>\n                        <p class=\"related-post-description typography-body-smaller\">\n              Cloud computing is the perfect solution. It allows for transferring information throughout the Internet in the most efficient way. How?            <\/p>\n            <a class=\"plus-link\" href=\"https:\/\/codeandpepper.com\/cloud-banking-solutions-key-facts-and-benefits\/\">\n              <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"17\" height=\"17\" viewBox=\"0 0 17 17\">\n    <path d=\"M7 0h3v17H7z\"\/>\n    <path d=\"M17 7v3H0V7z\"\/>\n<\/svg>\n              <span>Full Article<\/span>\n            <\/a>\n          <\/div>\n                  <div class=\"related-post\">\n            <h3 class=\"related-post-title typography-title-m\">\n              <a href=\"https:\/\/codeandpepper.com\/top-3-cloud-services-providers\/\" title=\"Top 3 Cloud Services Providers for FinTech\">\n                Top 3 Cloud Services Providers for FinTech              <\/a>\n            <\/h3>\n                          <a class=\"related-post-thumbnail\" aria-label=\"Top 3 Cloud Services Providers for FinTech\" href=\"https:\/\/codeandpepper.com\/top-3-cloud-services-providers\/\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"189\" src=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/10\/Cloud_service_providers.jpg\" class=\"attachment-blog-thumbnail size-blog-thumbnail wp-post-image\" alt=\"Cloud services providers\" srcset=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/10\/Cloud_service_providers.jpg 864w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/10\/Cloud_service_providers-768x400.jpg 768w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/10\/Cloud_service_providers-80x42.jpg 80w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/10\/Cloud_service_providers-119x62.jpg 119w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/10\/Cloud_service_providers-433x226.jpg 433w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/10\/Cloud_service_providers-192x100.jpg 192w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/10\/Cloud_service_providers-720x375.jpg 720w, https:\/\/codeandpepper.com\/wp-content\/uploads\/2021\/10\/Cloud_service_providers-432x225.jpg 432w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/>              <\/a>\n                        <p class=\"related-post-description typography-body-smaller\">\n              Cloud services providers and what they offer has changed the landscape of FinTech completely in recent years. Check how!            <\/p>\n            <a class=\"plus-link\" href=\"https:\/\/codeandpepper.com\/top-3-cloud-services-providers\/\">\n              <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"17\" height=\"17\" viewBox=\"0 0 17 17\">\n    <path d=\"M7 0h3v17H7z\"\/>\n    <path d=\"M17 7v3H0V7z\"\/>\n<\/svg>\n              <span>Full Article<\/span>\n            <\/a>\n          <\/div>\n              <\/div>\n    <\/div>\n\n\n  <\/div>\n<\/section>\n\n<style type=\"text\/css\">\n  #related-posts-block_63f84f89831d8 {\n    background: ;\n    color: ;\n  }\n\n  #related-posts-block_63f84f89831d8 .block-title {\n    color: ;\n  }\n<\/style>","protected":false},"excerpt":{"rendered":"<p>Today, doing business without a cloud seems like implementing a handicap. You can do it but don\u2019t expect a lot of flexibility and options. With pay-per-use approach and multiple services available from top cloud providers, you can scale your business in a reasonable timeframe. The problem \u2013 it also has to be secure. How to<a class=\"moretag\" href=\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/\"> Read the full article&#8230;<\/a><\/p>\n","protected":false},"author":20413,"featured_media":34857,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[81],"tags":[1609,173,2072],"class_list":["post-40602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-project-management-approach","tag-cloud-computing","tag-software-development-process","tag-software-infrastructure"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cloud Security and How to Implement It? | Code &amp; Pepper<\/title>\n<meta name=\"description\" content=\"What are you responsible, as the client, when implementing cloud security? What covers software vendor or cloud platform holder and why?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cloud Security and How to Implement It? | Code &amp; Pepper\" \/>\n<meta property=\"og:description\" content=\"What are you responsible, as the client, when implementing cloud security? What covers software vendor or cloud platform holder and why?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Code &amp; Pepper\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codeandpepper\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-24T05:54:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-24T06:03:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"864\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jaros\u0142aw \u015aci\u015blak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@codeandpepper\" \/>\n<meta name=\"twitter:site\" content=\"@codeandpepper\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jaros\u0142aw \u015aci\u015blak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/\"},\"author\":{\"name\":\"Jaros\u0142aw \u015aci\u015blak\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/person\/4d99a36115b17f10860637a13b3b3885\"},\"headline\":\"What is Cloud Security and How to Implement It?\",\"datePublished\":\"2023-02-24T05:54:46+00:00\",\"dateModified\":\"2023-02-24T06:03:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/\"},\"wordCount\":1295,\"publisher\":{\"@id\":\"https:\/\/codeandpepper.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg\",\"keywords\":[\"Cloud computing\",\"Software development process\",\"Software infrastructure\"],\"articleSection\":[\"Project Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/\",\"url\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/\",\"name\":\"What is Cloud Security and How to Implement It? | Code &amp; Pepper\",\"isPartOf\":{\"@id\":\"https:\/\/codeandpepper.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg\",\"datePublished\":\"2023-02-24T05:54:46+00:00\",\"dateModified\":\"2023-02-24T06:03:46+00:00\",\"description\":\"What are you responsible, as the client, when implementing cloud security? What covers software vendor or cloud platform holder and why?\",\"breadcrumb\":{\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#primaryimage\",\"url\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg\",\"contentUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg\",\"width\":864,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/codeandpepper.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cloud Security and How to Implement It?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/codeandpepper.com\/#website\",\"url\":\"https:\/\/codeandpepper.com\/\",\"name\":\"Code & Pepper\",\"description\":\"FinTech Developers\",\"publisher\":{\"@id\":\"https:\/\/codeandpepper.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/codeandpepper.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/codeandpepper.com\/#organization\",\"name\":\"Code & Pepper\",\"url\":\"https:\/\/codeandpepper.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png\",\"contentUrl\":\"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png\",\"width\":319,\"height\":144,\"caption\":\"Code & Pepper\"},\"image\":{\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codeandpepper\/\",\"https:\/\/x.com\/codeandpepper\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/person\/4d99a36115b17f10860637a13b3b3885\",\"name\":\"Jaros\u0142aw \u015aci\u015blak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/codeandpepper.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ab028da5fc780b19966f305918b0045520176e8bc7c265540adcce45ab2cd0c9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ab028da5fc780b19966f305918b0045520176e8bc7c265540adcce45ab2cd0c9?s=96&d=mm&r=g\",\"caption\":\"Jaros\u0142aw \u015aci\u015blak\"},\"description\":\"Branding, marketing, business scaling, content &amp; company culture specialist. Over 20 years of experience in marketing, strategy, and writing. Learn more by visiting: scislak.com\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jaroslawscislak\"],\"url\":\"https:\/\/codeandpepper.com\/author\/jarek-scislak\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cloud Security and How to Implement It? | Code &amp; Pepper","description":"What are you responsible, as the client, when implementing cloud security? What covers software vendor or cloud platform holder and why?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/","og_locale":"en_US","og_type":"article","og_title":"What is Cloud Security and How to Implement It? | Code &amp; Pepper","og_description":"What are you responsible, as the client, when implementing cloud security? What covers software vendor or cloud platform holder and why?","og_url":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/","og_site_name":"Code &amp; Pepper","article_publisher":"https:\/\/www.facebook.com\/codeandpepper\/","article_published_time":"2023-02-24T05:54:46+00:00","article_modified_time":"2023-02-24T06:03:46+00:00","og_image":[{"width":864,"height":450,"url":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg","type":"image\/jpeg"}],"author":"Jaros\u0142aw \u015aci\u015blak","twitter_card":"summary_large_image","twitter_creator":"@codeandpepper","twitter_site":"@codeandpepper","twitter_misc":{"Written by":"Jaros\u0142aw \u015aci\u015blak","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#article","isPartOf":{"@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/"},"author":{"name":"Jaros\u0142aw \u015aci\u015blak","@id":"https:\/\/codeandpepper.com\/#\/schema\/person\/4d99a36115b17f10860637a13b3b3885"},"headline":"What is Cloud Security and How to Implement It?","datePublished":"2023-02-24T05:54:46+00:00","dateModified":"2023-02-24T06:03:46+00:00","mainEntityOfPage":{"@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/"},"wordCount":1295,"publisher":{"@id":"https:\/\/codeandpepper.com\/#organization"},"image":{"@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#primaryimage"},"thumbnailUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg","keywords":["Cloud computing","Software development process","Software infrastructure"],"articleSection":["Project Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/","url":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/","name":"What is Cloud Security and How to Implement It? | Code &amp; Pepper","isPartOf":{"@id":"https:\/\/codeandpepper.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#primaryimage"},"image":{"@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#primaryimage"},"thumbnailUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg","datePublished":"2023-02-24T05:54:46+00:00","dateModified":"2023-02-24T06:03:46+00:00","description":"What are you responsible, as the client, when implementing cloud security? What covers software vendor or cloud platform holder and why?","breadcrumb":{"@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#primaryimage","url":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg","contentUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2022\/01\/Cloud-Computing-Trends-2022.jpeg","width":864,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/codeandpepper.com\/what-is-cloud-security-and-how-to-implement-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/codeandpepper.com\/"},{"@type":"ListItem","position":2,"name":"What is Cloud Security and How to Implement It?"}]},{"@type":"WebSite","@id":"https:\/\/codeandpepper.com\/#website","url":"https:\/\/codeandpepper.com\/","name":"Code & Pepper","description":"FinTech Developers","publisher":{"@id":"https:\/\/codeandpepper.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/codeandpepper.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/codeandpepper.com\/#organization","name":"Code & Pepper","url":"https:\/\/codeandpepper.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/","url":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png","contentUrl":"https:\/\/codeandpepper.com\/wp-content\/uploads\/2019\/06\/logo.png","width":319,"height":144,"caption":"Code & Pepper"},"image":{"@id":"https:\/\/codeandpepper.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codeandpepper\/","https:\/\/x.com\/codeandpepper"]},{"@type":"Person","@id":"https:\/\/codeandpepper.com\/#\/schema\/person\/4d99a36115b17f10860637a13b3b3885","name":"Jaros\u0142aw \u015aci\u015blak","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeandpepper.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ab028da5fc780b19966f305918b0045520176e8bc7c265540adcce45ab2cd0c9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ab028da5fc780b19966f305918b0045520176e8bc7c265540adcce45ab2cd0c9?s=96&d=mm&r=g","caption":"Jaros\u0142aw \u015aci\u015blak"},"description":"Branding, marketing, business scaling, content &amp; company culture specialist. Over 20 years of experience in marketing, strategy, and writing. Learn more by visiting: scislak.com","sameAs":["https:\/\/www.linkedin.com\/in\/jaroslawscislak"],"url":"https:\/\/codeandpepper.com\/author\/jarek-scislak\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts\/40602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/users\/20413"}],"replies":[{"embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/comments?post=40602"}],"version-history":[{"count":5,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts\/40602\/revisions"}],"predecessor-version":[{"id":40607,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/posts\/40602\/revisions\/40607"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/media\/34857"}],"wp:attachment":[{"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/media?parent=40602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/categories?post=40602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codeandpepper.com\/wp-json\/wp\/v2\/tags?post=40602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}