{"id":18449,"date":"2019-07-25T14:48:14","date_gmt":"2019-07-25T18:48:14","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=18449"},"modified":"2024-06-03T13:49:43","modified_gmt":"2024-06-03T17:49:43","slug":"cloud-security-certifications-that-matter-to-your-customers","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/","title":{"rendered":"Cloud security compliance certifications that matter to your customers"},"content":{"rendered":"<p>We\u2019ve probably all been guilty at least once of spouting off an IT acronym in response to a prospective customer\u2019s question about compliance, only to see their eyes glaze over. They don\u2019t care about a string of letters, they want to know how we\u2019re going to solve their business problems.<\/p>\n<p>And unfortunately, when it comes to security and compliance, there are a whole lot of different acronyms our Partners need to wade through.<\/p>\n<p>The slew of IT compliance standards, programs, and frameworks out there today can be mind-boggling, even for IT professionals. So here we\u2019re going to take a look at the major security standards that Sherweb\u2019s <a href=\"https:\/\/www.sherweb.com\/cloud\/managed\/\" target=\"_blank\" rel=\"noopener noreferrer\">managed cloud services<\/a> and our other supported services are certified for. We\u2019ll also talk about the best ways to explain them to customers.<\/p>\n<h2><strong>SOC2 Type II Certification<\/strong><\/h2>\n<p>Let\u2019s start with the big one. System and Organization Control 2 is the gold standard used for assessing the quality of IT service providers. Sherweb is proud to be SOC 2 Type II-certified for <a href=\"https:\/\/twitter.com\/i\/web\/status\/1134565267743432709\" target=\"_blank\" rel=\"noopener noreferrer\">seven years running<\/a>.<\/p>\n<h3>What Is It?<\/h3>\n<p>SOC reports assess the reliability of service providers of many different types, including IT service providers. They receive a SOC report after completing an intensive audit of their practices and controls, performed by an independent certified public accountant. There are three different SOC reports: SOC 1 is intended only to assess financial service controls. SOC 2 and 3 both report on operational and technical service controls. They\u2019re assessed on five \u2018Trust Service Principles\u2019: Their system\u2019s security, availability, and integrity. As well as the confidentiality and privacy of their data handling practices.<\/p>\n<p>The primary difference between SOC 2 and 3 reports are their intended audiences. SOC 3 reports are designed to be public-facing documents. SOC 2 reports offer more confidential details about the service provider\u2019s operations, and so are only available to customers under contract and\/or NDA.<\/p>\n<p>At the end of the SOC audit, the CPA issues a Type I report verifying that the service provider is capable of meeting all the standards. Some providers, like Sherweb, take the audit a step further and get a Type II report, where the CPA verifies that the service provider\u2019s standards and practices have actually been consistently applied over time.<\/p>\n<h3>What Customers Actually Care About<\/h3>\n<p>Customers just want to know that their IT assets are safe and will be available when they need them. If your customer isn\u2019t going to know what SOC 2 is, one useful approach is to explain the underlying Trust Service Principles that Sherweb\u2019s services are certified. You can short-hand \u2018Type II\u2019 by saying that the provider has been certified at the highest standard by an independent auditor.<\/p>\n<p>Then there are customers in more heavily-regulated industries, who are often already familiar with SOC. These are easier to deal with. Saying you can put their apps and data in a SOC 2 Type-II certified cloud environment should make them relax, because it often means half their next audit is already done for them, since they\u2019re \u2018inheriting\u2019 Sherweb\u2019s certified practices.<\/p>\n<h2><strong>SOC2 for Office 365<\/strong><\/h2>\n<p>This is another one we\u2019re proud to hold. Not only have we received SOC 2 certification for our own infrastructure and processes, we\u2019re also SOC 2-certified for managing Office 365 for your customers.<\/p>\n<h3>What Is It?<\/h3>\n<p>Since Microsoft\u2019s cloud services are already <a href=\"https:\/\/www.microsoft.com\/en-us\/trustcenter\/compliance\/soc\" target=\"_blank\" rel=\"noopener noreferrer\">SOC 1, 2, and 3-certified<\/a>, our own SOC 2 certification is validation of our practices managing your customers\u2019 O365 tenants. For example, the reliability of our user and ACL configurations, and the confidentiality we have built into our processes for managing their user and organizational requests.<\/p>\n<h3>What Customers Actually Care About<\/h3>\n<p>One of the main concerns we\u2019ve heard from customers resistant to cloud services is they feel that the infrastructure they rely on will be out of their control. If you\u2019re talking to a customer with that concern you can explain that Sherweb\u2019s O365 service practices have been independently audited and verified to be at the highest levels of reliability and confidentiality.<\/p>\n<p>And unlike working with Microsoft alone, Sherweb can handle the O365 migration and onboarding top-to-bottom for your customers. They\u2019ll have a dedicated migration specialist and 24\/7 support available for all issues, not just ones Microsoft internally classifies as \u2018critical.\u2019<\/p>\n<h2><strong>PCI-DSS Compliance<\/strong><\/h2>\n<p>Our <a href=\"https:\/\/www.sherweb.com\/cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\">Performance Cloud<\/a> platform is compliant with the Payment Card Industry Data Security Standard, verified annually by an independent auditor.<\/p>\n<h3>What Is It?<\/h3>\n<p>Any business that wants to process, store, or transact credit card payments needs to run PCI-DSS compliant network infrastructure or IaaS. The DSS was originally developed to protect against credit card fraud, but over time as threats have evolved, it\u2019s become the <em>de facto<\/em> payment card security standard. It has 12 underlying and lengthy key requirements. These group together into six requirement categories, which we\u2019ve found are more meaningful to customers. They stipulate that a service provider must:<\/p>\n<ol>\n<li>Maintain a Secure Network<\/li>\n<li>Maintain a Vulnerability Management Program<\/li>\n<li>Maintain an Infosec Policy<\/li>\n<li>Protect Cardholder Data<\/li>\n<li>Use Strong Access Control<\/li>\n<li>Regularly Monitor and Test Infrastructure<\/li>\n<\/ol>\n<h3>What Customers Actually Care About<\/h3>\n<p>Unless your customers are doing cash-only business they should care about this. They\u2019ll want to know that their <em>own<\/em> customers\u2019 transaction data will be handled securely. Which in turn protects both their own finances and their reputation.<\/p>\n<p>You can tell them that moving to Sherweb Performance Cloud infrastructure puts their transactions on a platform that meets the strict standards of the payment card industry&#8217;s governing body.<\/p>\n<h2><strong>MS Azure Compliance Portfolio<\/strong><\/h2>\n<p>Sherweb is also a service provider for Azure, which supports a variety of different compliance standards on its own. It meets SOC 2 and 3, and PCI-DSS standards, just like Sherweb\u2019s own offerings. But we can also stand up Azure environments that meet many other standards that your customers may care about. Three of the most important are ISO-27001, FedRAMP, and HITRUST for HIPAA.<\/p>\n<h3>What Are They and Why Do They Matter?<\/h3>\n<p>First, Azure is <strong>ISO-27001 <\/strong>compliant. This standard mandates that an organization have more than just a certain number of security controls in place, they need a fully-fledged information security management system to keep those controls organized and up to date.<\/p>\n<p>Often times, startups or smaller customers going for private funding will benefit from showing\u2014\u2014or may <em>need<\/em> to show\u2014investors that they have an infosec management system (ISMS) in place. Showing that their cloud services are ISO-27001 compliant makes that easy. Also, state, provincial, and federal programs will sometimes require this certification to award contracts.<\/p>\n<p>Speaking of Federal compliance, Azure and O365 also meet <a href=\"https:\/\/www.microsoft.com\/en-us\/trustcenter\/compliance\/fedramp\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>FedRAMP<\/strong><\/a> standards. FedRAMP mandates a set of controls as part of an overall security program that contractors for many US Federal agencies need to hold.<\/p>\n<p>If your customers already do business with the US government they should be familiar with this, and be happy to hear that you can easily provision compliant environments. And if you hear from customers who are thinking about pursuing a US government contract it\u2019s worth pointing out that this is a program they\u2019ll need to comply with, and that you\u2019re able to provision what they need.<\/p>\n<p>Azure environments can also be configured according to the <strong>HITRUST Common Security Framework<\/strong>. This is a set of security standards designed to ensure IT infrastructure meets HIPAA patient data privacy requirements. Penalties for HIPAA breaches can easily reach into the millions of dollars.<\/p>\n<p>Provisioning a HIPAA-compliant computing environment on in-house infrastructure is usually time-consuming and cumbersome. So you can tell your customers that migrating to Azure means they can deploy HIPAA-compliant environments using predefined <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/blueprints\/azure-health\" target=\"_blank\" rel=\"noopener noreferrer\">blueprints<\/a> basically on demand, without weeks, months, or even years of planning.<\/p>\n<p>These are just some of the standards that Sherweb can make Azure environments compliant with. The platform is also able to work with <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/gdpr-dsr-azure\" target=\"_blank\" rel=\"noopener noreferrer\">GDPR<\/a> and a variety of other European, global, US, and industry-specific <a href=\"https:\/\/azure.microsoft.com\/en-ca\/overview\/trusted-cloud\/compliance\/\" target=\"_blank\" rel=\"noopener noreferrer\">requirements<\/a>.<\/p>\n<h2><strong>It\u2019s All About Trust<\/strong><\/h2>\n<p>That\u2019s a lot of security standards. What all of this boils down to is that when you\u2019re sitting across the table from a prospective customer, no matter what industry, and they ask if their data is safe with you, you can reply, \u201cyes\u201d with confidence. Sherweb\u2019s service portfolio gives you secure, compliant IaaS options for any customer need.<\/p>\n<p>If you have a tricky security issue, feel free to <a href=\"https:\/\/www.sherweb.com\/contact-us\/\">contact <\/a><a href=\"https:\/\/www.sherweb.com\/contact-us\/\">Sherweb\u2019s<\/a><a href=\"https:\/\/www.sherweb.com\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\"> cloud experts<\/a> for help finding the right solution for your customer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve probably all been guilty at least once of spouting off an IT acronym in response to a pro","protected":false},"author":177,"featured_media":18454,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[349,919],"class_list":["post-18449","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-compliance","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud security compliance certifications that matter to your customers | Sherweb<\/title>\n<meta name=\"description\" content=\"we\u2019re going to take a look at the security compliance standards that SherWeb\u2019s managed cloud services and our other supported services are certified for.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud security compliance certifications that matter to your customers | Sherweb\" \/>\n<meta property=\"og:description\" content=\"we\u2019re going to take a look at the security compliance standards that SherWeb\u2019s managed cloud services and our other supported services are certified for.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-25T18:48:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T17:49:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/blogHer-Certifications.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Cloud security compliance certifications that matter to your customers\",\"datePublished\":\"2019-07-25T18:48:14+00:00\",\"dateModified\":\"2024-06-03T17:49:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/\"},\"wordCount\":1400,\"commentCount\":3,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHer-Certifications.jpg\",\"keywords\":[\"Compliance\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/\",\"name\":\"Cloud security compliance certifications that matter to your customers | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHer-Certifications.jpg\",\"datePublished\":\"2019-07-25T18:48:14+00:00\",\"dateModified\":\"2024-06-03T17:49:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"we\u2019re going to take a look at the security compliance standards that SherWeb\u2019s managed cloud services and our other supported services are certified for.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHer-Certifications.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHer-Certifications.jpg\",\"width\":1200,\"height\":460,\"caption\":\"Compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/cloud-security-certifications-that-matter-to-your-customers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud security compliance certifications that matter to your customers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud security compliance certifications that matter to your customers | Sherweb","description":"we\u2019re going to take a look at the security compliance standards that SherWeb\u2019s managed cloud services and our other supported services are certified for.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/","og_locale":"en_US","og_type":"article","og_title":"Cloud security compliance certifications that matter to your customers | Sherweb","og_description":"we\u2019re going to take a look at the security compliance standards that SherWeb\u2019s managed cloud services and our other supported services are certified for.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2019-07-25T18:48:14+00:00","article_modified_time":"2024-06-03T17:49:43+00:00","og_image":[{"width":1200,"height":460,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/blogHer-Certifications.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Cloud security compliance certifications that matter to your customers","datePublished":"2019-07-25T18:48:14+00:00","dateModified":"2024-06-03T17:49:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/"},"wordCount":1400,"commentCount":3,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/blogHer-Certifications.jpg","keywords":["Compliance","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/","url":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/","name":"Cloud security compliance certifications that matter to your customers | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/blogHer-Certifications.jpg","datePublished":"2019-07-25T18:48:14+00:00","dateModified":"2024-06-03T17:49:43+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"we\u2019re going to take a look at the security compliance standards that SherWeb\u2019s managed cloud services and our other supported services are certified for.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/#primaryimage","url":"\/blog\/wp-content\/uploads\/blogHer-Certifications.jpg","contentUrl":"\/blog\/wp-content\/uploads\/blogHer-Certifications.jpg","width":1200,"height":460,"caption":"Compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/cloud-security-certifications-that-matter-to-your-customers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Cloud security compliance certifications that matter to your customers"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Compliance","Cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/18449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=18449"}],"version-history":[{"count":10,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/18449\/revisions"}],"predecessor-version":[{"id":24802,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/18449\/revisions\/24802"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/18454"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=18449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=18449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=18449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}