{"id":121548,"date":"2023-03-15T08:00:00","date_gmt":"2023-03-15T07:00:00","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=121548"},"modified":"2023-03-15T19:29:08","modified_gmt":"2023-03-15T18:29:08","slug":"cloud-first-compliance-second","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/es\/cloud-first-compliance-second\/","title":{"rendered":"\u00bfLa nube primero - el cumplimiento despu\u00e9s?"},"content":{"rendered":"<p>Las diversas y prometedoras ofertas de los hiperescaladores, la disponibilidad de cada vez m\u00e1s aplicaciones y servicios \"solo en la nube\", as\u00ed como la pandemia como motor de la digitalizaci\u00f3n: todos estos factores llevan a que a veces se tomen decisiones a corto plazo para las ofertas en la nube y, lamentablemente, los procesos GRC (gobernanza, riesgo y cumplimiento) ya establecidos a menudo se suavizan en favor de una r\u00e1pida implantaci\u00f3n sin ser realmente conscientes de las consecuencias posteriores.<\/p>\n\n\n\n<p>Pero, \u00bfqu\u00e9 incluye un buen proceso de GRC cuando partes significativas de su TI se externalizan a la nube? Trate los cambios importantes de su entorno inform\u00e1tico a la nube del mismo modo que tratar\u00eda una externalizaci\u00f3n de personal y procesos empresariales a un proveedor de servicios y h\u00e1gase las siguientes preguntas:<\/p><div class=\"great-fullsize-content-es\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-994916384\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/kit-de-medios\/\" target=\"_blank\" aria-label=\"nl_werbung_800x100_es\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-en\" id=\"great-3077355028\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/media-kit\/\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-de\" style=\"margin-bottom: 20px;margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-48895013\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/steampunk-summit-2025\/\" target=\"_blank\" aria-label=\"steampunk_2024_1_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg 1920w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1200x150.jpg 1200w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-960x120.jpg 960w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1168x146.jpg 1168w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1440x180.jpg 1440w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1536x192.jpg 1536w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-600x75.jpg 600w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"2560\" height=\"320\"   \/><\/a><\/div>\n\n\n\n<p>\u00bfQu\u00e9 obst\u00e1culos legales y reglamentarios hay que superar? Ejemplos como la DSGVO, la nueva ley de diligencia debida en la cadena de suministro o la normativa espec\u00edfica del sector como MaRisk, Bait y Dora en el \u00e1mbito de las finanzas deben tenerse en cuenta a la hora de tomar una decisi\u00f3n, por adelantado.<\/p>\n\n\n\n<p>\u00bfQu\u00e9 procesos quiere trasladar realmente a la nube? Incluso si en el futuro persigue una estrategia que d\u00e9 prioridad a la nube, puede que no sea aconsejable transferir procesos cr\u00edticos o sensibles de sistemas alojados localmente a manos de terceros. A menudo se subestima la cuesti\u00f3n de la migraci\u00f3n de datos y el almacenamiento de datos en la nube de conformidad con la legislaci\u00f3n. La clasificaci\u00f3n de los datos puede ayudar en este sentido, pero los riesgos restantes deben gestionarse con medidas t\u00e9cnicas y organizativas (TOM), como el cifrado propietario.<\/p>\n\n\n\n<p>\u00bfA qu\u00e9 riesgos me enfrento? Haga una evaluaci\u00f3n conservadora de los posibles costes, pero tambi\u00e9n de la dependencia real del proveedor de servicios correspondiente. \u00bfSe ajustan los tiempos de servicio y la disponibilidad a sus necesidades y a los contratos con sus clientes? A menudo, el uso h\u00edbrido o un modelo multicloud resulta ser una alternativa m\u00e1s sensata y segura.<\/p>\n\n\n\n<p>\u00bfEst\u00e1n mis empleados preparados para la nube? La formaci\u00f3n y la educaci\u00f3n son necesarias para garantizar que la transici\u00f3n se realiza sin problemas. Tambi\u00e9n hay que consultar previamente a los \u00f3rganos internos, como el consejo de personal, el responsable de seguridad inform\u00e1tica y el responsable de protecci\u00f3n de datos.<\/p>\n\n\n\n<p>\u00bfQui\u00e9n asume la responsabilidad? B\u00e1sicamente, la externalizaci\u00f3n no le exime de sus obligaciones en materia de protecci\u00f3n de datos, seguridad de los datos y gesti\u00f3n de riesgos. A menudo se utiliza aqu\u00ed el t\u00e9rmino responsabilidad compartida: el proveedor de la nube es responsable de la seguridad de la nube, pero el usuario de la nube es responsable de la seguridad de sus procesos y datos en la nube. Aseg\u00farese de que su comprensi\u00f3n de las responsabilidades coincide con la del proveedor de la nube y de que est\u00e1 contractualmente asegurada en consecuencia.<\/p>\n\n\n\n<p>\u00bfQu\u00e9 hago cuando las cosas van mal? Los errores ocurren, eso tambi\u00e9n se aplica a la digitalizaci\u00f3n. Si se interrumpen los servicios en la nube, fallan los centros de datos, aumentan los costes o el \"nuevo mundo\" no cumple sus expectativas, hay que contar con una estrategia de salida: \u00bfPuede volver a incorporar sus procesos y datos localmente en cualquier momento o cambiar a otro proveedor de servicios? Juegue con estos escenarios y documente los pasos correspondientes, de forma similar a su gesti\u00f3n de continuidad de negocio (BCM).<\/p>\n\n\n\n<p>El paso a la nube es un paso hacia el futuro digital. Para garantizar que este paso se da sobre una base s\u00f3lida, la externalizaci\u00f3n a la nube debe ir acompa\u00f1ada de un proceso de GRC establecido y de una estrategia de nube desde el principio. El proceso de GRC debe adaptarse al alcance de la externalizaci\u00f3n deseada para que act\u00fae como facilitador de la transformaci\u00f3n digital y no como impedimento.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Cada vez m\u00e1s autoridades y empresas se aventuran en la nube.<br \/>\nSin embargo, la digitalizaci\u00f3n exitosa y sostenible con la ayuda de la computaci\u00f3n en nube no puede funcionar sin una estrategia de nube que incluya la gesti\u00f3n de GRC.<\/p>","protected":false},"author":2724,"featured_media":2451,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[21,42102],"tags":[25869,174,15055,31057,1790,42103,41787],"coauthors":[42142],"class_list":["post-121548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-mag-23-02","tag-cloud-first","tag-compliance","tag-cyberattacken","tag-cybercrime","tag-it-security","tag-mag-23-02","tag-security-experte"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",400,172,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-768x331.jpg",768,331,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-100x43.jpg",100,43,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-480x207.jpg",480,207,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-640x276.jpg",640,276,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-720x310.jpg",720,310,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",1000,431,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security.jpg",600,259,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2016\/11\/It-Security-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Immer mehr Beh\u00f6rden und Unternehmen wagen den Sprung in die Cloud.<br \/>\nEine erfolgreiche und nachhaltige Digitalisierung mithilfe von Cloud Computing kann aber nicht ohne eine Cloud-Strategie samt GRC-Management funktionieren.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/opinion\/seguridad-informatica\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/categoria\/mag-23-02\/\" rel=\"category tag\">Mag 23-02<\/a>","author_info_v2":{"name":"Fabian Januchowski, Conet","url":"https:\/\/e3magpmp.greatsolution.dev\/es\/author\/fabian-januchowski\/"},"comments_num_v2":"0 comentarios","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/121548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/users\/2724"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/comments?post=121548"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/posts\/121548\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media\/2451"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/media?parent=121548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/categories?post=121548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/tags?post=121548"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/es\/wp-json\/wp\/v2\/coauthors?post=121548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}