{"id":1446,"date":"2014-01-02T07:42:47","date_gmt":"2014-01-02T12:42:47","guid":{"rendered":"http:\/\/techtonictimes.com\/?p=1446"},"modified":"2015-07-28T15:18:49","modified_gmt":"2015-07-28T15:18:49","slug":"access-privileges-ssl","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/","title":{"rendered":"Why Every Relationship Needs A Little SSL"},"content":{"rendered":"<p><a href=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg\"><img decoding=\"async\" class=\"alignleft size-full wp-image-1449\" src=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg\" alt=\"accesspriviliges (150x150)\" width=\"150\" height=\"150\" \/><\/a><\/p>\n<p>Doesn&#8217;t the word &#8216;access&#8217; turn you on on multiple levels?<\/p>\n<p>The idea that,<\/p>\n<p>you&#8217;re in the know,<\/p>\n<p>that you&#8217;ve got clout,<\/p>\n<p>And,<\/p>\n<p>that you&#8217;re an<\/p>\n<h2>Insider?<\/h2>\n<p>Now,<\/p>\n<p>Let&#8217;s add,<\/p>\n<p>&#8216;Privilege.&#8217;<\/p>\n<h1>Access Privilege.<\/h1>\n<p>Sends your &#8216;cloutiness&#8217; over the top, doesn&#8217;t it?<\/p>\n<p>Now you&#8217;re a real high roller&#8230;<\/p>\n<p>But, you know what?<\/p>\n<p>Privileged Access is <em>Expensive.<\/em><\/p>\n<p>Cost me a friend of 7 years.<\/p>\n<p>We were at ground zero of operating a small business. She contributed no financial capital,<\/p>\n<p>Yet,<\/p>\n<p>She wanted <em>access<\/em> to the bank account.<\/p>\n<p>I said,<\/p>\n<p>&#8216;No.&#8217;<\/p>\n<p>In an earlier post, we discussed the<a title=\"In A Cloud? Careful, You Could Fall Off The Edge.\" href=\"http:\/\/www.abrahamsconsulting.com\/blog\/dont-be-cloudy-about-the-cloud\/\" target=\"_blank\"> 7 elements of choosing a Cloud Provider.<\/a> Now we will investigate the first component:<\/p>\n<h2>Access Privileges<\/h2>\n<blockquote><p><span style=\"color: #3366ff;\">Cloud service providers should be able to demonstrate they enforce adequate hiring, oversight and access controls to enforce administrative delegation.<\/span><\/p><\/blockquote>\n<h4>Secure Socket Layer (SSL) is a security protocol used by web browsers and web servers to help users protect their data during transfer. It is the standard for establishing <span style=\"text-decoration: underline;\">trusted exchanges<\/span> of information over the internet.<\/h4>\n<p>&#8216;Trusted Exchanges.&#8217;<\/p>\n<p>That&#8217;s the ticket. The missing element in my relationship in what was, I thought, a solid friendship.<\/p>\n<p><em>I thought<\/em>.<\/p>\n<p>We do not have time to discuss her presumption.<\/p>\n<p>Tacky.<\/p>\n<p>So how does SSL work?<\/p>\n<p>Well,<\/p>\n<p>Before I tell you how it <strong>works<\/strong>, let me tell you how it will <em><strong>help<\/strong><\/em> you when you are hanging out in the Cloud.<\/p>\n<h4>SSL delivers two services that help with some cloud security issues. First SSL encryption keeps inquisitive eyes from reading private data as it is transmitted from server to server and between server and browser.<\/h4>\n<p>The second benefit, and possibly more important?<\/p>\n<h4>It establishes that a specific server and domain that can be trusted. An SSL certificate can authenticate that a specific server and domain do belong to the person or organization that it claims to represent. This benefit requires that the hosting provider use SSL from a third-party Certificate Authority (CA).<\/h4>\n<h2>How SSL Works<\/h2>\n<p>An SSL certificate contains a public and private key pair as well as verified identification information. When a browser (or client) points to a secured domain, the server shares its public key (via the SSL certificate) with the client to establish an encryption method and a unique encryption key for the session. The client confirms that it recognizes and trusts the issuer of the SSL certificate.<\/p>\n<p>Most reasonable people know this to be true:<\/p>\n<p>A handshake can go a long way in every relationship.<\/p>\n<p>SSL is just that, a firm handshake.<\/p>\n<p>It says, this thing between you and me? <em>It&#8217;s real.<\/em><\/p>\n<p>So go ahead,<\/p>\n<p>Access my data.<\/p>\n<p>My data is safe with you. My privacy is your top priority and integrity regulates our relationship.<\/p>\n<p>SSL also says,<\/p>\n<p>Trust but verify.<\/p>\n<p>&nbsp;<\/p>\n<address><strong><em>Further Reading:<\/em><\/strong><\/address>\n<address><a href=\"http:\/\/www.cio.com\/article\/745155\/2014_Forecast_for_Cloud_Computing?page=4&amp;taxonomyId=3024\">2014 Forecast for Cloud Computing<\/a><\/address>\n<address><a href=\"http:\/\/www.itproportal.com\/2013\/12\/20\/gartner-one-quarter-of-all-cloud-providers-will-disappear-by-2015\/\">One quarter of all Cloud Providers will disappear by 2015<\/a><\/address>\n<address>\u00a0<\/address>\n<address><em> Source:<\/em><\/address>\n<ul>\n<li><em>Gartner Research<\/em><\/li>\n<li><em>Gartner EXPworldwide Survey<\/em><\/li>\n<li><em>IDC exchange<\/em><\/li>\n<li><em>&#8220;Assessing the Security Risk of Cloud computing.&#8221;~Gartner<\/em><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Most reasonable people know this to be true: A handshake can go a long way in every relationship. SSL is just that, a firm handshake.<\/p>\n","protected":false},"author":2,"featured_media":1449,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,10],"tags":[17,30,31,93],"class_list":["post-1446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-trends-in-technology","tag-access-privileges","tag-cloud-provider","tag-cloud-security","tag-ssl"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How SSL Secures Your Data In The Cloud<\/title>\n<meta name=\"description\" content=\"An SSL certificate increases the integrity of your data because it contains a public and private key pair as well as verified information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How SSL Secures Your Data In The Cloud\" \/>\n<meta property=\"og:description\" content=\"An SSL certificate increases the integrity of your data because it contains a public and private key pair as well as verified information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-02T12:42:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-28T15:18:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Why Every Relationship Needs A Little SSL\",\"datePublished\":\"2014-01-02T12:42:47+00:00\",\"dateModified\":\"2015-07-28T15:18:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/\"},\"wordCount\":497,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg\",\"keywords\":[\"Access Privileges\",\"cloud provider\",\"Cloud Security\",\"SSL\"],\"articleSection\":[\"Cloud\",\"Trends In Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/\",\"name\":\"How SSL Secures Your Data In The Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg\",\"datePublished\":\"2014-01-02T12:42:47+00:00\",\"dateModified\":\"2015-07-28T15:18:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"An SSL certificate increases the integrity of your data because it contains a public and private key pair as well as verified information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg\",\"width\":150,\"height\":150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Every Relationship Needs A Little SSL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How SSL Secures Your Data In The Cloud","description":"An SSL certificate increases the integrity of your data because it contains a public and private key pair as well as verified information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/","og_locale":"en_US","og_type":"article","og_title":"How SSL Secures Your Data In The Cloud","og_description":"An SSL certificate increases the integrity of your data because it contains a public and private key pair as well as verified information.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/","og_site_name":"TechTonic Times","article_published_time":"2014-01-02T12:42:47+00:00","article_modified_time":"2015-07-28T15:18:49+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Why Every Relationship Needs A Little SSL","datePublished":"2014-01-02T12:42:47+00:00","dateModified":"2015-07-28T15:18:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/"},"wordCount":497,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg","keywords":["Access Privileges","cloud provider","Cloud Security","SSL"],"articleSection":["Cloud","Trends In Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/","name":"How SSL Secures Your Data In The Cloud","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg","datePublished":"2014-01-02T12:42:47+00:00","dateModified":"2015-07-28T15:18:49+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"An SSL certificate increases the integrity of your data because it contains a public and private key pair as well as verified information.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/01\/accesspriviliges-150x150.jpg","width":150,"height":150},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/access-privileges-ssl\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Every Relationship Needs A Little SSL"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/1446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=1446"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/1446\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/1449"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=1446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=1446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=1446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}