{"id":24366,"date":"2021-01-12T16:26:50","date_gmt":"2021-01-12T21:26:50","guid":{"rendered":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/"},"modified":"2025-02-20T22:44:01","modified_gmt":"2025-02-21T03:44:01","slug":"ciber-seguridad-de-quien-es-la-responsabilidad","status":"publish","type":"post","link":"https:\/\/iteraprocess.com\/es_la\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/","title":{"rendered":"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24366\" class=\"elementor elementor-24366 elementor-20028\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-139ef2f e-con-full e-flex e-con e-parent\" data-id=\"139ef2f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-61c3724 e-con-full custom-breadcrumbs-content e-flex e-con e-child\" data-id=\"61c3724\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a9d0ca elementor-widget__width-auto custom-breadcrumbs elementor-widget elementor-widget-text-editor\" data-id=\"0a9d0ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li><a href=\"\/\">Home<\/a><\/li>\n<li><a href=\"https:\/\/iteraprocess.com\/es_la\/blog\/\">Blog<\/a><\/li>\n<li>Ciberseguridad<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a2bc44 elementor-widget elementor-widget-text-editor\" data-id=\"6a2bc44\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 class=\"header_title title_small\"><span class=\"title_a\">Ciber Seguridad:<\/span><span class=\"title_b\">\u00bfDe qui\u00e9n es la responsabilidad?<\/span><\/h1>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9701f50 e-flex e-con-boxed e-con e-parent\" data-id=\"9701f50\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c338536 elementor-widget elementor-widget-html\" data-id=\"c338536\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sidebar_mobile_trigger\"><\/div>\r\n\r\n<script>\r\n    jQuery(document).ready(function() {\r\n        jQuery('.sidebar_mobile_trigger').on('click',function(){\r\n            jQuery('.sidebar_mobile').toggleClass('active');\r\n        })        \r\n    })\r\n<\/script>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7699d0 e-con-full e-flex e-con e-child\" data-id=\"a7699d0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be576bd elementor-widget elementor-widget-image\" data-id=\"be576bd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1312\" height=\"402\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_1.png\" class=\"attachment-full size-full wp-image-20023\" alt=\"\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_1.png 1312w, https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_1-300x92.png 300w, https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_1-1024x314.png 1024w, https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_1-768x235.png 768w\" sizes=\"(max-width: 1312px) 100vw, 1312px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0dee0a elementor-widget elementor-widget-text-editor\" data-id=\"a0dee0a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Son los asuntos relacionados con la seguridad y la conformidad compartida entre AWS y el cliente. Este modelo compartido puede aliviar la carga operativa del cliente, ya que AWS opera, administra y controla los componentes del sistema operativo host y la capa de virtualizaci\u00f3n hasta la seguridad f\u00edsica de las instalaciones en las que funcionan los servicios. El cliente asume la responsabilidad y la administraci\u00f3n del sistema operativo invitado (incluidas las actualizaciones y los parches de seguridad), de cualquier otro software de aplicaciones asociado y de la configuraci\u00f3n del firewall del grupo de seguridad que ofrece AWS.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Los clientes deben pensar detenidamente en los servicios que eligen, ya que las responsabilidades var\u00edan en funci\u00f3n de los servicios que utilicen, de la integraci\u00f3n de estos en su entorno de TI y de la legislaci\u00f3n y los reglamentos correspondientes. La naturaleza de esta responsabilidad compartida tambi\u00e9n ofrece la flexibilidad y el control por parte del cliente que permite concretar la implementaci\u00f3n. Como se muestra a continuaci\u00f3n, la diferenciaci\u00f3n de responsabilidades se conoce normalmente como seguridad \u201cde\u201d la nube y seguridad \u201cen\u201d la nube.<\/span><\/p>\n<h2><b>Responsabilidad AWS<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">AWS es responsable de proteger la infraestructura que ejecuta todos los servicios provistos en la nube de AWS. Esta infraestructura est\u00e1 conformada por el hardware, el software, las redes y las instalaciones que ejecutan los servicios de la nube de AWS.<\/span><\/p>\n<h2><b>Responsabilidad del cliente<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">La responsabilidad del cliente estar\u00e1 determinada por los servicios de la nube de AWS que el cliente seleccione. Esto determina el alcance del trabajo de configuraci\u00f3n a cargo del cliente como parte de sus responsabilidades de seguridad. Por ejemplo, un servicio como Amazon Elastic Compute Cloud (Amazon EC2) se clasifica como Infraestructura como servicio (IaaS) y, como tal, requiere que el cliente realice todas las tareas de administraci\u00f3n y configuraci\u00f3n de seguridad necesarias.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Los clientes que implementan una instancia de Amazon EC2 son responsables de la administraci\u00f3n del sistema operativo hu\u00e9sped (incluidos los parches de seguridad y las actualizaciones), de cualquier utilidad o software de aplicaciones que el cliente haya instalado en las instancias y de la configuraci\u00f3n del firewall provisto por AWS (llamado grupo de seguridad) en cada instancia. En el caso de los servicios extra\u00eddos, c\u00f3mo Amazon S3 y Amazon DynamoDB, AWS maneja la capa de infraestructura, el sistema operativo y las plataformas, mientras que los clientes acceden a los puntos de enlace para recuperar y almacenar los datos. Los clientes son responsables de administrar sus datos (incluidas las opciones de cifrado), clasificar sus recursos y utilizar las herramientas de IAM para solicitar los permisos correspondientes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Este modelo de responsabilidad compartida entre los clientes y AWS tambi\u00e9n abarca los controles de TI. De la misma forma que AWS y sus clientes comparten la responsabilidad del funcionamiento del entorno de TI, tambi\u00e9n comparten la administraci\u00f3n, el funcionamiento y la verificaci\u00f3n de los controles de TI. AWS puede ayudar a aliviar la carga que supone para los clientes operar los controles, para lo que administra los controles asociados con la infraestructura f\u00edsica implementada en el entorno de AWS de cuya administraci\u00f3n se encargaba anteriormente el cliente. Dado que la implementaci\u00f3n de cada cliente se realiza de manera diferente en AWS, los clientes tienen la oportunidad de migrar a AWS la administraci\u00f3n de determinados controles de TI para obtener un (nuevo) entorno de control distribuido. Los clientes pueden usar la documentaci\u00f3n de conformidad y control de AWS disponible para ejecutar sus procedimientos de verificaci\u00f3n y evaluaci\u00f3n de controles seg\u00fan sea necesario. A continuaci\u00f3n se incluyen ejemplos de controles cuya administraci\u00f3n est\u00e1 a cargo de AWS, de los clientes de AWS o de ambos.<\/span><\/p>\n<h2><b>Controles f\u00edsicos y de entorno<\/b><\/h2>\n<h2><b>Controles heredados<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Controles que un cliente hereda totalmente de AWS.<\/span><\/p>\n<h2><b>Controles Compartidos<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Controles que se aplican tanto a la capa de la infraestructura como a las capas de los clientes, pero en contextos o perspectivas completamente independientes. En un control compartido, AWS suministra los requisitos para la infraestructura y el cliente debe proveer su propia implementaci\u00f3n de controles en el uso que haga de los servicios de AWS. Entre los ejemplos se incluyen:<\/span><\/p>\n<h2><b>Administraci\u00f3n de parches<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">AWS es responsable de implementar parches y de corregir imperfecciones en el interior de la infraestructura, pero los clientes son responsables de implementar parches en sus aplicaciones y sistemas operativos hu\u00e9sped.<\/span><\/p>\n<h2><b>Administraci\u00f3n de configuraci\u00f3n<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">AWS mantiene la configuraci\u00f3n de sus dispositivos de infraestructura, pero el cliente es responsable de configurar sus aplicaciones, bases de datos y sistemas operativos hu\u00e9sped.<\/span><\/p>\n<h2><b>Informaci\u00f3n y formaci\u00f3n t\u00e9cnica<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">AWS capacita a los empleados de AWS, pero el cliente debe capacitar a sus propios empleados.<\/span><\/p>\n<h2><b>Controles espec\u00edficos del cliente<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">controles que son de absoluta responsabilidad del cliente en funci\u00f3n de la aplicaci\u00f3n que implementa dentro de los servicios de AWS. Entre los ejemplos se incluyen:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Seguridad de zona o protecci\u00f3n de comunicaciones y servicios, qu\u00e9 podr\u00edan necesitar que el cliente direccione o separe en zonas datos en entornos de seguridad espec\u00edficos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fuente: <\/span><a href=\"https:\/\/aws.amazon.com\/es\/compliance\/shared-responsibility-model\/\"><span style=\"font-weight: 400;\">https:\/\/aws.amazon.com\/es\/compliance\/shared-responsibility-model\/<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">En Itera podemos ayudarte.<br \/>Contacta con un especialista: seguridad@iteraprocess.com<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1d47d8 e-con-full e-flex e-con e-child\" data-id=\"f1d47d8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5629e9a elementor-widget elementor-widget-template\" data-id=\"5629e9a\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"27671\" class=\"elementor elementor-27671 elementor-21565\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ee58c95 e-con-full e-flex e-con e-child\" data-id=\"4ee58c95\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61f2e0b1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"61f2e0b1\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f686172 elementor-share-buttons--view-icon elementor-share-buttons--skin-minimal elementor-share-buttons--shape-circle elementor-share-buttons--align-right elementor-share-buttons--color-custom elementor-widget__width-inherit elementor-share-buttons-mobile--align-center shared_buttons_content elementor-grid-0 elementor-widget elementor-widget-share-buttons\" data-id=\"4f686172\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_x-twitter\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on x-twitter\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-x-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_facebook\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on facebook\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_linkedin\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on linkedin\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_whatsapp\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on whatsapp\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6ce4d9 e-con-full sidebar_mobile e-flex e-con e-child\" data-id=\"b6ce4d9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2f19faf e-con-full e-flex e-con e-child\" data-id=\"2f19faf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d3d99f underline_gradient_azul elementor-widget elementor-widget-text-editor\" data-id=\"0d3d99f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 24px; color: #00607b;\">Post relacionados<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e877df9 blogs_tipo_listado_pequeno listing-pagination-border-style-gradient listing-pagination-background-style-solid elementor-widget elementor-widget-neuros_blog_listing\" data-id=\"e877df9\" data-element_type=\"widget\" data-widget_type=\"neuros_blog_listing.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"archive-listing\" data-ajax='{&quot;post_type&quot;:&quot;post&quot;,&quot;posts_per_page&quot;:3,&quot;orderby&quot;:&quot;date&quot;,&quot;order&quot;:&quot;desc&quot;,&quot;paged&quot;:1,&quot;category_name&quot;:&quot;&quot;,&quot;tag&quot;:&quot;ai,aws,ia-generativa&quot;,&quot;post__in&quot;:&quot;&quot;,&quot;ignore_sticky_posts&quot;:false,&quot;link_base&quot;:&quot;https:\\\/\\\/iteraprocess.com\\\/es_la\\\/wp-json\\\/wp\\\/v2\\\/posts\\\/24366\\\/&quot;}' data-widget='{&quot;listing_type&quot;:&quot;classic&quot;,&quot;excerpt_length&quot;:100,&quot;show_cat&quot;:&quot;&quot;,&quot;show_media&quot;:&quot;yes&quot;,&quot;show_author&quot;:&quot;&quot;,&quot;show_date&quot;:&quot;yes&quot;,&quot;show_title&quot;:&quot;yes&quot;,&quot;show_tags&quot;:&quot;no&quot;,&quot;show_excerpt&quot;:&quot;yes&quot;,&quot;show_read_more&quot;:&quot;&quot;,&quot;read_more_text&quot;:&quot;Read More&quot;,&quot;columns_number&quot;:1,&quot;show_pagination&quot;:&quot;yes&quot;,&quot;item_class&quot;:&quot;post standard-blog-item-wrapper&quot;}'>\n            <div class=\"archive-listing-wrapper classic-listing\">\n                \n<div class=\"standard-blog-item-wrapper post post-29761 type-post status-publish format-standard has-post-thumbnail hentry category-analisis-de-datos-y-business-intelligence-es_la category-aws-es_la-2 category-aws-es_la category-cloud-es_la category-cloud-computing-es_la category-novedades-es_la tag-ai-es_la tag-automatizacion-inteligente tag-aws-es_la tag-ciberseguridad-es_la tag-cloud-es_la tag-seguridad-es_la\">\n    <div class=\"blog-item\">\n        <div class=\"post-media-wrapper\"><a href=\"https:\/\/iteraprocess.com\/es_la\/2025\/12\/02\/impulsa-tu-operacion-empresarial-con-amazon-ai-agentops\/\"><picture><source media=\"(max-width: 575px)\" sizes=\"(max-width: 575px) 575px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/12\/02.png 575w\"><source media=\"(max-width: 991px)\" sizes=\"(max-width: 991px) 991px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/12\/02.png 991w\"><img decoding=\"async\" alt=\"02\" title=\"02\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/12\/02.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" \/><\/picture><\/a><\/div><div class=\"post-meta-header\"><div class=\"post-meta-items-wrapper\"><div class=\"post-meta-items\"><div class=\"post-meta-item post-meta-item-date\"><a href=\"https:\/\/iteraprocess.com\/es_la\/2025\/12\/02\/\">2 December, 2025<\/a><\/div><\/div><\/div><\/div><h3 class=\"post-title\"><a href=\"https:\/\/iteraprocess.com\/es_la\/2025\/12\/02\/impulsa-tu-operacion-empresarial-con-amazon-ai-agentops\/\">Impulsa tu operaci\u00f3n empresarial con Amazon AI AgentOps<\/a><\/h3><div class=\"post-content\">Descubre c\u00f3mo nuestro servicio Amazon AI AgentOps habilita agentes de IA capaces de ejecutar accion<\/div>    <\/div>\n<\/div>\n<div class=\"standard-blog-item-wrapper post post-27896 type-post status-publish format-standard has-post-thumbnail hentry category-analisis-de-datos-y-business-intelligence-es_la category-aws-es_la-2 category-aws-es_la category-ciberseguridad-es_la category-cloud-es_la category-cloud-computing-es_la category-logistica-es_la category-novedades-es_la tag-aws-es_la tag-aws-mexico-es_la tag-aws-mexico-beneficios-es_la tag-aws-mexico-incentivos-es_la\">\n    <div class=\"blog-item\">\n        <div class=\"post-media-wrapper\"><a href=\"https:\/\/iteraprocess.com\/es_la\/2025\/07\/30\/como-beneficia-el-well-architected-framework-de-aws-a-tu-organizacion-y-sus-objetivos-de-negocio\/\"><picture><source media=\"(max-width: 575px)\" sizes=\"(max-width: 575px) 575px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/630x274-WAPP.png 575w\"><source media=\"(max-width: 991px)\" sizes=\"(max-width: 991px) 991px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/630x274-WAPP.png 991w\"><img decoding=\"async\" alt=\"630x274-WAPP\" title=\"630x274-WAPP\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/630x274-WAPP.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" \/><\/picture><\/a><\/div><div class=\"post-meta-header\"><div class=\"post-meta-items-wrapper\"><div class=\"post-meta-items\"><div class=\"post-meta-item post-meta-item-date\"><a href=\"https:\/\/iteraprocess.com\/es_la\/2025\/07\/30\/\">30 July, 2025<\/a><\/div><\/div><\/div><\/div><h3 class=\"post-title\"><a href=\"https:\/\/iteraprocess.com\/es_la\/2025\/07\/30\/como-beneficia-el-well-architected-framework-de-aws-a-tu-organizacion-y-sus-objetivos-de-negocio\/\">\u00bfC\u00f3mo beneficia el Well-Architected Framework de AWS a tu organizaci\u00f3n y sus objetivos de negocio?<\/a><\/h3><div class=\"post-content\">Descubre c\u00f3mo el Well-Architected Framework de AWS ayuda a tu empresa a mejorar seguridad, costos, <\/div>    <\/div>\n<\/div>\n<div class=\"standard-blog-item-wrapper post post-27578 type-post status-publish format-standard has-post-thumbnail hentry category-analisis-de-datos-y-business-intelligence-es_la category-aws-es_la category-aws-es_la-2 category-ciberseguridad-es_la category-cloud-es_la category-cloud-computing-es_la category-logistica-es_la category-novedades-es_la tag-aws-es_la tag-aws-mexico-es_la tag-aws-mexico-beneficios-es_la tag-aws-mexico-incentivos-es_la\">\n    <div class=\"blog-item\">\n        <div class=\"post-media-wrapper\"><a href=\"https:\/\/iteraprocess.com\/es_la\/2025\/07\/14\/migrar-vmware-a-aws-4-beneficios-estrategicos-para-tu-infraestructura\/\"><picture><source media=\"(max-width: 575px)\" sizes=\"(max-width: 575px) 575px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/1312x402-VMware.jpg 575w\"><source media=\"(max-width: 991px)\" sizes=\"(max-width: 991px) 991px\" srcset=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/1312x402-VMware.jpg 991w\"><img decoding=\"async\" alt=\"1312x402-VMware\" title=\"1312x402-VMware\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/07\/1312x402-VMware.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" \/><\/picture><\/a><\/div><div class=\"post-meta-header\"><div class=\"post-meta-items-wrapper\"><div class=\"post-meta-items\"><div class=\"post-meta-item post-meta-item-date\"><a href=\"https:\/\/iteraprocess.com\/es_la\/2025\/07\/14\/\">14 July, 2025<\/a><\/div><\/div><\/div><\/div><h3 class=\"post-title\"><a href=\"https:\/\/iteraprocess.com\/es_la\/2025\/07\/14\/migrar-vmware-a-aws-4-beneficios-estrategicos-para-tu-infraestructura\/\">Migrar VMware a AWS: 4 beneficios estrat\u00e9gicos para tu infraestructura<\/a><\/h3><div class=\"post-content\">Migrar VMware a AWS es m\u00e1s f\u00e1cil de lo que crees. Descubre los beneficios clave para tu operaci\u00f3n<\/div>    <\/div>\n<\/div>            <\/div>\n\n            <div class=\"content-pagination\"><nav class=\"navigation pagination\" role=\"navigation\"><h2 class=\"screen-reader-text\">Pagination<\/h2><div class=\"nav-links\"><span aria-current=\"page\" class=\"page-numbers current\"><span class=\"button-inner\"><\/span>1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/posts\/24366\/?e877df9-paged=2\"><span class=\"button-inner\"><\/span>2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/posts\/24366\/?e877df9-paged=3\"><span class=\"button-inner\"><\/span>3<\/a>\n<span class=\"page-numbers dots\">&hellip;<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/posts\/24366\/?e877df9-paged=13\"><span class=\"button-inner\"><\/span>13<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/posts\/24366\/?e877df9-paged=14\"><span class=\"button-inner\"><\/span>14<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/posts\/24366\/?e877df9-paged=2\">Next<span class=\"button-inner\"><\/span><span class=\"icon-button-arrow left\"><\/span><span class=\"icon-button-arrow right\"><\/span><\/a><\/div><\/nav><\/div>        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f35190d e-con-full contenedor_etiquetas e-flex e-con e-child\" data-id=\"f35190d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33b7e8e underline_gradient_azul elementor-widget elementor-widget-text-editor\" data-id=\"33b7e8e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-size: 24px; color: #00607b;\">Temas<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41b1e50 elementor-widget elementor-widget-shortcode\" data-id=\"41b1e50\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"tagcloud\"><a href=\"https:\/\/iteraprocess.com\/tag\/aws-es_la\" class=\"tag-cloud-link tag-link-223\" style=\"font-size: 9.6912751677852pt;\" aria-label=\"AWS\"> AWS <\/a><a href=\"https:\/\/iteraprocess.com\/tag\/aws-mexico-es_la\" class=\"tag-cloud-link tag-link-500\" style=\"font-size: 9.6912751677852pt;\" aria-label=\"AWS MEXICO\"> AWS MEXICO <\/a><a href=\"https:\/\/iteraprocess.com\/tag\/aws-mexico-incentivos-es_la\" class=\"tag-cloud-link tag-link-501\" style=\"font-size: 9.6912751677852pt;\" aria-label=\"AWS M\u00e9xico incentivos\"> AWS M\u00e9xico incentivos <\/a><a href=\"https:\/\/iteraprocess.com\/tag\/aws-mexico-beneficios-es_la\" class=\"tag-cloud-link tag-link-502\" style=\"font-size: 9.6912751677852pt;\" aria-label=\"AWS M\u00e9xico beneficios\"> AWS M\u00e9xico beneficios <\/a><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f61fb50 e-con-full e-flex e-con e-parent\" data-id=\"f61fb50\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-198fad1 e-flex e-con-boxed e-con e-child\" data-id=\"198fad1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/youtu.be\\\/RlKo-Nj2r0s&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-video-embed\"><\/div>\n\t\t\t\t\t\t<\/div>\t\t<div class=\"elementor-element elementor-element-c6cd037 elementor-widget elementor-widget-text-editor\" data-id=\"c6cd037\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"font-size: 32px; color: #00334e; text-shadow: 0px 4px 4px rgba(255,255,255,0.4);\"><strong>\u00bfListo para tomar el control total <span style=\"color: #00607b; font-size: 36px;\"><strong>de tu inversi\u00f3n en la nube?<\/strong><\/span><\/strong><\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecea1c6 neuros-button-border-style-gradient neuros-button-bakground-style-solid elementor-widget elementor-widget-neuros_button\" data-id=\"ecea1c6\" data-element_type=\"widget\" data-widget_type=\"neuros_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"button-widget\">\n            <div class=\"button-container\">\n                                <a class=\"neuros-button\" href=\"#modal_contactanos\" href=\"#modal_contactanos\">Cont\u00e1ctanos                        <span class=\"icon-button-arrow left\"><\/span><span class=\"icon-button-arrow right\"><\/span>                    \n                    <span class=\"button-inner\"><\/span>\n                <\/a>\n                            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6c1688 e-con-full e-flex e-con e-child\" data-id=\"d6c1688\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d46ad4 elementor-widget elementor-widget-template\" data-id=\"0d46ad4\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"27665\" class=\"elementor elementor-27665 elementor-21454\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7abf18c9 e-flex e-con-boxed e-con e-parent\" data-id=\"7abf18c9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-129170f elementor-widget elementor-widget-shortcode\" data-id=\"129170f\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><style>\n    .items_50_25_25 {\n    display: flex;\n}\n\n.items_50_25_25 .content_elem {\n    width: 50%;\n    padding: 20px;\n}\n\n.items_50_25_25 .content_elem.two .elementor-element .neuros-button:hover {\n    padding: 0px 40px 0px 20px !important;\n    color: #00334E !important;\n    background-color: #FFFFFF !important;\n}\n\n.items_50_25_25 .content_elem.two {\n    display: flex;\n    justify-content: space-between;\n    gap: 10px;\n    flex-wrap: wrap;\n    align-items: flex-end;\n}\n\n.items_50_25_25 .content_elem.two .post {\n    width: calc(50% - 10px);\n}\n\n.items_50_25_25 .blog-item .post-media-wrapper picture img {\n    width: 100%;\n    height: auto;\n}\n\n.items_50_25_25 .content_elem.one .blog-item .post-media-wrapper picture img {\n    height: 300px;\n}\n\n.items_50_25_25 .blog-item .post-meta-items-wrapper:after {\n    box-shadow: 0 20px 0 0 #f0f0f0;\n}\n\n.items_50_25_25 .content_elem .post-content {\n    color: #00334e;\n    margin: 0 20px;\n    line-height: normal;\n    max-height: 80px;\n    margin: 0 20px !important;\n    overflow: hidden;\n}\n\n.items_50_25_25 .content_elem.two .post-content {\n    font-size: 80%;\n    height: 60px;\n}\n\n.items_50_25_25 .post-meta-items-wrapper:after {\n    right: 4px;\n}\n\n.items_50_25_25 .content_elem.one .post-meta-items-wrapper {\n    width: 50%;\n}\n\n.items_50_25_25 .content_elem.two .post-meta-items-wrapper {\n    width: 70%;\n}\n\n.items_50_25_25 .content_elem.two .post-meta-header {\n    margin-bottom: 5px !important;\n}\n.items_50_25_25 .show_mob{\n    display: none;\n}\n.items_50_25_25 .show_web{\n    display: block;\n}\n@media (max-width: 767px) {\n    .items_50_25_25 {\n        display: flex;\n        flex-direction: column;\n    }\n    .items_50_25_25 .content_elem{\n        width: 100%;\n        padding: 0px;\n    }\n    .items_50_25_25 .show_web{\n        display: none;\n    }\n    .items_50_25_25 .show_mob{\n        display: block;\n    }\n    .items_50_25_25 .content_elem.one .blog-item .post-media-wrapper picture img {\n        height: 220px;\n    }\n    .items_50_25_25 .content_elem.two .post {\n        width: calc(50% - 5px);\n    }\n    .items_50_25_25 .content_elem .post-content {\n        margin: 0 10px !important;\n    }\n}\n<\/style>\n\n\n<div class=\"items_50_25_25\">\n    <div class=\"show_mob\" style=\"width: 100%; margin-bottom: 20px;\">\n                        <h4 class=\"elementor-heading-title elementor-size-default\" style=\"color: #00334E;margin-bottom: 10px;\">Casos de <span style=\"color: #00607B;\"><b>\u00e9xito<\/b><\/span><\/h4>\n                        <div class=\"elementor-element neuros-button-border-style-gradient neuros-button-bakground-style-solid elementor-widget elementor-widget-neuros_button\" data-element_type=\"widget\" data-widget_type=\"neuros_button.default\">\n                            <div class=\"elementor-widget-container\">    \n                                <div class=\"button-widget\">\n                                    <div class=\"button-container\">\n                                        <a class=\"neuros-button\" href=\"https:\/\/iteraprocess.com\/es_la\/casos-de-exito\/\" target=\"_blank\" style=\"font-family: &quot;Poppins&quot;, Sans-serif; font-size: 20px; --button-border-width: 3px; color: #FFFFFF; background-color: #00334E; padding: 0px 20px 0px 40px;\">\n                                            Casos de \u00e9xito \n                                            <span class=\"icon-button-arrow left\"><\/span>\n                                            <span class=\"icon-button-arrow right\"><\/span>\n                                            <span class=\"button-inner\"><\/span>\n                                        <\/a>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                        <\/div>\n                    <\/div><div class=\"content_elem one\"><div class=\"standard-blog-item-wrapper post post-29395 type-page status-publish format-standard has-post-thumbnail hentry category-cde-aws category-casos-de-exito category-logistica tag-aws-es_la tag-cloud-es_la\">\n                        <div class=\"blog-item\" style=\"padding: 25px 0 15px; background-color: #f0f0f0;\">\n                            <div class=\"post-media-wrapper\" style=\"margin: -30px 0 0;\">\n                                <a href=\"https:\/\/iteraprocess.com\/es_la\/intelcia\/\">\n                                    <picture> <img decoding=\"async\" width=\"410\" height=\"279\" src=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2025\/10\/01.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" \/> <\/picture>\n                                <\/a>\n                            <\/div>\n                            <div class=\"post-meta-header\" style=\"margin-bottom: 10px; margin-top: -25px;\">\n                                <div class=\"post-meta-items-wrapper\">\n                                    <div class=\"post-meta-items\" style=\"background-color: #F0f0f0;\">\n                                        <div class=\"post-categories\" style=\"height: 20px\"> <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                            <div class=\"post-content\"> Descubre c\u00f3mo Intelcia moderniz\u00f3 sus entornos de trabajo con Amazon WorkSpaces junto a Itera, logrando agilidad, seguridad y optimizaci\u00f3n operativa. <\/div>\n                        <\/div>\n                    <\/div><\/div><\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Son los asuntos relacionados con la seguridad y la conformidad compartida entre AWS y el cliente. Este modelo compartido puede aliviar la carga operativa del cliente, ya que AWS opera, administra y controla los componentes del sistema operativo host y la capa de virtualizaci\u00f3n hasta la seguridad f\u00edsica de las instalaciones en las que funcionan los servicios.<\/p>\n","protected":false},"author":1,"featured_media":20026,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"inline_featured_image":false,"_joinchat":[],"footnotes":""},"categories":[401,256],"tags":[263,329],"class_list":["post-24366","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad-es_la","category-novedades-es_la","tag-ciberseguridad-es_la","tag-seguridad-es_la"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad? - Itera Process<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/\" \/>\n<meta property=\"og:locale\" content=\"es_LA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad?\" \/>\n<meta property=\"og:description\" content=\"Son los asuntos relacionados con la seguridad y la conformidad compartida entre AWS y el cliente. Este modelo compartido puede aliviar la carga operativa del cliente, ya que AWS opera, administra y controla los componentes del sistema operativo host y la capa de virtualizaci\u00f3n hasta la seguridad f\u00edsica de las instalaciones en las que funcionan los servicios.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/\" \/>\n<meta property=\"og:site_name\" content=\"Itera Process\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IteraBusinessProcess\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-12T21:26:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-21T03:44:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"630\" \/>\n\t<meta property=\"og:image:height\" content=\"273\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/person\/c7e75379d1d7a09f5786b5b694f860a5\"},\"headline\":\"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad?\",\"datePublished\":\"2021-01-12T21:26:50+00:00\",\"dateModified\":\"2025-02-21T03:44:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/\"},\"wordCount\":928,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/iteraprocess.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png\",\"keywords\":[\"Ciberseguridad\",\"Seguridad\"],\"articleSection\":[\"Ciberseguridad\",\"Novedades\"],\"inLanguage\":\"es-LA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/\",\"url\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/\",\"name\":\"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad? - Itera Process\",\"isPartOf\":{\"@id\":\"https:\/\/iteraprocess.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png\",\"datePublished\":\"2021-01-12T21:26:50+00:00\",\"dateModified\":\"2025-02-21T03:44:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#breadcrumb\"},\"inLanguage\":\"es-LA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-LA\",\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#primaryimage\",\"url\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png\",\"contentUrl\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png\",\"width\":630,\"height\":273},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/iteraprocess.com\/es_la\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/iteraprocess.com\/#website\",\"url\":\"https:\/\/iteraprocess.com\/\",\"name\":\"Itera Process\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/iteraprocess.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/iteraprocess.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-LA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/iteraprocess.com\/#organization\",\"name\":\"Itera Process\",\"alternateName\":\"IT ERA\",\"url\":\"https:\/\/iteraprocess.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-LA\",\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png\",\"contentUrl\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png\",\"width\":1200,\"height\":1200,\"caption\":\"Itera Process\"},\"image\":{\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/IteraBusinessProcess\",\"https:\/\/www.linkedin.com\/company\/itera-process\"],\"description\":\"Somos especialistas en proyectos complejos de Cloud, Workflow Automation, AI y Data. Aceleramos la transformaci\u00f3n digital de las empresas con un enfoque estrat\u00e9gico, \u00e1gil y centrado en resultados.\",\"email\":\"info.mx.df@iteraprocess.com\",\"telephone\":\"52553300 0650\",\"legalName\":\"IT ERA SA de CV\",\"foundingDate\":\"2001-01-30\",\"vatID\":\"ESB85261071\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"201\",\"maxValue\":\"500\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/person\/c7e75379d1d7a09f5786b5b694f860a5\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-LA\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/iteraprocess.com\"],\"url\":\"https:\/\/iteraprocess.com\/es_la\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad? - Itera Process","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/","og_locale":"es_LA","og_type":"article","og_title":"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad?","og_description":"Son los asuntos relacionados con la seguridad y la conformidad compartida entre AWS y el cliente. Este modelo compartido puede aliviar la carga operativa del cliente, ya que AWS opera, administra y controla los componentes del sistema operativo host y la capa de virtualizaci\u00f3n hasta la seguridad f\u00edsica de las instalaciones en las que funcionan los servicios.","og_url":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/","og_site_name":"Itera Process","article_publisher":"https:\/\/www.facebook.com\/IteraBusinessProcess","article_published_time":"2021-01-12T21:26:50+00:00","article_modified_time":"2025-02-21T03:44:01+00:00","og_image":[{"width":630,"height":273,"url":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#article","isPartOf":{"@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/"},"author":{"name":"admin","@id":"https:\/\/iteraprocess.com\/#\/schema\/person\/c7e75379d1d7a09f5786b5b694f860a5"},"headline":"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad?","datePublished":"2021-01-12T21:26:50+00:00","dateModified":"2025-02-21T03:44:01+00:00","mainEntityOfPage":{"@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/"},"wordCount":928,"commentCount":0,"publisher":{"@id":"https:\/\/iteraprocess.com\/#organization"},"image":{"@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#primaryimage"},"thumbnailUrl":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png","keywords":["Ciberseguridad","Seguridad"],"articleSection":["Ciberseguridad","Novedades"],"inLanguage":"es-LA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/","url":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/","name":"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad? - Itera Process","isPartOf":{"@id":"https:\/\/iteraprocess.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#primaryimage"},"image":{"@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#primaryimage"},"thumbnailUrl":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png","datePublished":"2021-01-12T21:26:50+00:00","dateModified":"2025-02-21T03:44:01+00:00","breadcrumb":{"@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#breadcrumb"},"inLanguage":"es-LA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/"]}]},{"@type":"ImageObject","inLanguage":"es-LA","@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#primaryimage","url":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png","contentUrl":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2021\/01\/46_2.png","width":630,"height":273},{"@type":"BreadcrumbList","@id":"https:\/\/iteraprocess.com\/2021\/01\/12\/ciber-seguridad-de-quien-es-la-responsabilidad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/iteraprocess.com\/es_la\/"},{"@type":"ListItem","position":2,"name":"Ciber Seguridad: \u00bfDe qui\u00e9n es la responsabilidad?"}]},{"@type":"WebSite","@id":"https:\/\/iteraprocess.com\/#website","url":"https:\/\/iteraprocess.com\/","name":"Itera Process","description":"","publisher":{"@id":"https:\/\/iteraprocess.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iteraprocess.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-LA"},{"@type":"Organization","@id":"https:\/\/iteraprocess.com\/#organization","name":"Itera Process","alternateName":"IT ERA","url":"https:\/\/iteraprocess.com\/","logo":{"@type":"ImageObject","inLanguage":"es-LA","@id":"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/","url":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png","contentUrl":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png","width":1200,"height":1200,"caption":"Itera Process"},"image":{"@id":"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IteraBusinessProcess","https:\/\/www.linkedin.com\/company\/itera-process"],"description":"Somos especialistas en proyectos complejos de Cloud, Workflow Automation, AI y Data. Aceleramos la transformaci\u00f3n digital de las empresas con un enfoque estrat\u00e9gico, \u00e1gil y centrado en resultados.","email":"info.mx.df@iteraprocess.com","telephone":"52553300 0650","legalName":"IT ERA SA de CV","foundingDate":"2001-01-30","vatID":"ESB85261071","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"201","maxValue":"500"}},{"@type":"Person","@id":"https:\/\/iteraprocess.com\/#\/schema\/person\/c7e75379d1d7a09f5786b5b694f860a5","name":"admin","image":{"@type":"ImageObject","inLanguage":"es-LA","@id":"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/575233c67e54e7ab21a35b6fa0d7523630e8a60cf72be0285259cf5bb72f679f?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/iteraprocess.com"],"url":"https:\/\/iteraprocess.com\/es_la\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/posts\/24366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/comments?post=24366"}],"version-history":[{"count":0,"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/posts\/24366\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/media\/20026"}],"wp:attachment":[{"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/media?parent=24366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/categories?post=24366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iteraprocess.com\/es_la\/wp-json\/wp\/v2\/tags?post=24366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}