{"id":7427,"date":"2022-01-25T09:05:49","date_gmt":"2022-01-25T17:05:49","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7427"},"modified":"2022-01-25T09:06:27","modified_gmt":"2022-01-25T17:06:27","slug":"protecting-organizations-from-themselves","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/","title":{"rendered":"Protecting Organizations from Themselves"},"content":{"rendered":"<p>Ever heard of the joke that It\u2019s a layer 8 issue? It\u2019s funny because there are only 7 layers in the network model, and they are saying it\u2019s the user\u2019s fault to their IT buddies without the user knowing they are talking about them. While it may be a joke, I think many organizations find this is true more times than not. It\u2019s so common that the first question many IT support agents ask is \u201cis it plugged in?\u201d. regardless of if you work in IT or not, almost everyone has run into issues like this in their profession. One of the most attacked targets in network attacks is the end users themselves. This being considered that users are one of your biggest weak points in the network and security. So, the question comes to what organizations can do to help protect themselves?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-7428\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/protecting-1-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" data-wp-editing=\"1\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-1-300x300.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-1.jpg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-1-150x150.jpg 150w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-1-768x768.jpg 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-1-75x75.jpg 75w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Access Control. There are three types of controls, Physical controls (a locked door or fence), administrative controls (company policies and guidelines), and finally technical controls. That last security control with technical controls is what you can use today to help protect your Infoblox BloxOne Cloud resources.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-7429\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/protecting-2-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-2-300x300.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-2-1024x1024.jpg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-2-150x150.jpg 150w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-2-768x768.jpg 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-2-75x75.jpg 75w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-2.jpg 1430w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Some organizations are so large and have so many people needing access to specific resources that it&#8217;s hard to keep track of them all. With BloxOne cloud you may need to give IT team access to the DDI resources, Security team access to the Threat Defense resources, and may need to give third-party developers access to different resources depending on the developing need. Infoblox BloxOne provides you with this capability with role-based policies.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-7430\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/protecting-3-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-3-300x225.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-3-1024x768.jpg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-3-768x576.jpg 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-3.jpg 1430w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Users are the individual users who you would give access to the environment and the different tools on the BloxOne platform.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7431 size-large\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/protecting-4-1024x546.png\" alt=\"\" width=\"1024\" height=\"546\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-4-1024x546.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-4-300x160.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-4-768x409.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-4.png 1430w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Roles is where organizations can create custom access to different recourses so that everyone can be limited to exactly what they need and nothing more or less.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7432 size-large\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/protecting-5-1024x554.png\" alt=\"\" width=\"1024\" height=\"554\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-5-1024x554.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-5-300x162.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-5-768x416.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-5.png 1430w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>User Groups is where organizations can group hundreds or thousands of users into a single group. Users can also be added to additional groups in the future. Users are not limited to the one group they are placed into.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-7433\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/protecting-6-1024x548.png\" alt=\"\" width=\"1024\" height=\"548\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-6-1024x548.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-6-300x160.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-6-768x411.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-6.png 1430w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Access Policy is where you can assign the different user groups to different roles.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-7434\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/protecting-7-1024x548.png\" alt=\"\" width=\"1024\" height=\"548\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-7-1024x548.png 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-7-300x160.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-7-768x411.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-7.png 1430w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Service API Keys is created because Infoblox understands the importance of automation and API\u2019s and keeping your API\u2019s secured. With Service API keys, you can limit the time that access to API is allowed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7435\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/protecting-8.png\" alt=\"\" width=\"936\" height=\"862\" data-wp-editing=\"1\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-8.png 936w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-8-300x276.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protecting-8-768x707.png 768w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ever heard of the joke that It\u2019s a layer 8 issue? It\u2019s funny because there are only 7 layers in the network model, and they are saying it\u2019s the user\u2019s fault to their IT buddies without the user knowing they are talking about them. While it may be a joke, I think many organizations find [&hellip;]<\/p>\n","protected":false},"author":307,"featured_media":7403,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[18,2],"tags":[628,629,630,361],"class_list":{"0":"post-7427","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cloud-native","8":"category-security","9":"tag-access-control","10":"tag-role-based-policies","11":"tag-user-groups","12":"tag-network-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting Organizations from Themselves<\/title>\n<meta name=\"description\" content=\"Protecting Organizations from Themselves. Access Control. There are three types of controls, Physical controls (a locked door or fence), administrative controls (company policies and guidelines), and finally technical controls. That last security control with technical controls is what you can use today to help protect your Infoblox BloxOne Cloud resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Organizations from Themselves\" \/>\n<meta property=\"og:description\" content=\"Protecting Organizations from Themselves. Access Control. There are three types of controls, Physical controls (a locked door or fence), administrative controls (company policies and guidelines), and finally technical controls. That last security control with technical controls is what you can use today to help protect your Infoblox BloxOne Cloud resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-25T17:05:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-25T17:06:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1189\" \/>\n\t<meta property=\"og:image:height\" content=\"619\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Zettel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Zettel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/\"},\"author\":{\"name\":\"Kevin Zettel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e66bbdb07578952c5b5b5a002c6e028a\"},\"headline\":\"Protecting Organizations from Themselves\",\"datePublished\":\"2022-01-25T17:05:49+00:00\",\"dateModified\":\"2022-01-25T17:06:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/\"},\"wordCount\":409,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IT-updates-3.jpg\",\"keywords\":[\"access control\",\"role based policies\",\"user groups\",\"Network Security\"],\"articleSection\":[\"Cloud Native\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/\",\"name\":\"Protecting Organizations from Themselves\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IT-updates-3.jpg\",\"datePublished\":\"2022-01-25T17:05:49+00:00\",\"dateModified\":\"2022-01-25T17:06:27+00:00\",\"description\":\"Protecting Organizations from Themselves. Access Control. There are three types of controls, Physical controls (a locked door or fence), administrative controls (company policies and guidelines), and finally technical controls. That last security control with technical controls is what you can use today to help protect your Infoblox BloxOne Cloud resources.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IT-updates-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/IT-updates-3.jpg\",\"width\":1189,\"height\":619},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/cloud-native\\\/protecting-organizations-from-themselves\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Native\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/cloud-native\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecting Organizations from Themselves\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e66bbdb07578952c5b5b5a002c6e028a\",\"name\":\"Kevin Zettel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_307_1572278967-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_307_1572278967-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_307_1572278967-96x96.jpg\",\"caption\":\"Kevin Zettel\"},\"description\":\"Kevin Zettel is a security-focused Technical Marketing Engineer who works with Infoblox to lock down the DNS and secure it for enterprises. Kevin knows that security is the center focus of companies and believes that without security, industries will unquestionably fall apart. Kevin has managed many security vendors such as McAfee, Cisco, Palo Alto, ServiceNow and many others. He knows the security landscape and sees the necessity and demand that businesses have to secure their capital. With a degree from Central Washington University and education in programming, Kevin has the Technical Know how to get secured!\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/kevin-zettel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting Organizations from Themselves","description":"Protecting Organizations from Themselves. Access Control. There are three types of controls, Physical controls (a locked door or fence), administrative controls (company policies and guidelines), and finally technical controls. That last security control with technical controls is what you can use today to help protect your Infoblox BloxOne Cloud resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Organizations from Themselves","og_description":"Protecting Organizations from Themselves. Access Control. There are three types of controls, Physical controls (a locked door or fence), administrative controls (company policies and guidelines), and finally technical controls. That last security control with technical controls is what you can use today to help protect your Infoblox BloxOne Cloud resources.","og_url":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/","og_site_name":"Infoblox Blog","article_published_time":"2022-01-25T17:05:49+00:00","article_modified_time":"2022-01-25T17:06:27+00:00","og_image":[{"width":1189,"height":619,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","type":"image\/jpeg"}],"author":"Kevin Zettel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Zettel","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/"},"author":{"name":"Kevin Zettel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e66bbdb07578952c5b5b5a002c6e028a"},"headline":"Protecting Organizations from Themselves","datePublished":"2022-01-25T17:05:49+00:00","dateModified":"2022-01-25T17:06:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/"},"wordCount":409,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","keywords":["access control","role based policies","user groups","Network Security"],"articleSection":["Cloud Native","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/","url":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/","name":"Protecting Organizations from Themselves","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","datePublished":"2022-01-25T17:05:49+00:00","dateModified":"2022-01-25T17:06:27+00:00","description":"Protecting Organizations from Themselves. Access Control. There are three types of controls, Physical controls (a locked door or fence), administrative controls (company policies and guidelines), and finally technical controls. That last security control with technical controls is what you can use today to help protect your Infoblox BloxOne Cloud resources.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/IT-updates-3.jpg","width":1189,"height":619},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/cloud-native\/protecting-organizations-from-themselves\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Native","item":"https:\/\/www.infoblox.com\/blog\/category\/cloud-native\/"},{"@type":"ListItem","position":3,"name":"Protecting Organizations from Themselves"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e66bbdb07578952c5b5b5a002c6e028a","name":"Kevin Zettel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_307_1572278967-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_307_1572278967-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_307_1572278967-96x96.jpg","caption":"Kevin Zettel"},"description":"Kevin Zettel is a security-focused Technical Marketing Engineer who works with Infoblox to lock down the DNS and secure it for enterprises. Kevin knows that security is the center focus of companies and believes that without security, industries will unquestionably fall apart. Kevin has managed many security vendors such as McAfee, Cisco, Palo Alto, ServiceNow and many others. He knows the security landscape and sees the necessity and demand that businesses have to secure their capital. With a degree from Central Washington University and education in programming, Kevin has the Technical Know how to get secured!","url":"https:\/\/www.infoblox.com\/blog\/author\/kevin-zettel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/307"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7427"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7427\/revisions"}],"predecessor-version":[{"id":7436,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7427\/revisions\/7436"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7403"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}