{"id":333,"date":"2021-05-25T14:12:57","date_gmt":"2021-05-25T14:12:57","guid":{"rendered":"https:\/\/directortic.es\/fortinet\/?p=333"},"modified":"2023-01-30T16:43:02","modified_gmt":"2023-01-30T16:43:02","slug":"como-proteger-las-aplicaciones-en-aws","status":"publish","type":"post","link":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/","title":{"rendered":"\u00bfC\u00f3mo proteger las aplicaciones en AWS?"},"content":{"rendered":"<p>El mundo empresarial est\u00e1 repleto de falsas creencias en torno a la seguridad. Algunas se han conseguido derribar, pero otras permanecen inalterables. Una de las m\u00e1s afianzadas pasa por la innecesaria preocupaci\u00f3n de la seguridad al hospedar las aplicaciones en Amazon Web Services, cuando la realidad indica que AWS protege la infraestructura, pero el cliente es responsable de la protecci\u00f3n de la aplicaci\u00f3n y de los datos. Y m\u00e1s teniendo en cuenta que a medida que las empresas migran las aplicaciones cr\u00edticas para el negocio a la nube, crece su exposici\u00f3n a todo tipo de ataques.<\/p>\n<p>\u00bfQu\u00e9 tipo de protecci\u00f3n es conveniente usar en estos casos? Aplicaciones orientadas a Internet: firewall de aplicaciones web (WAF). Una herramienta que, como describe el Instituto Nacional de Ciberseguridad (INCIBE), \u201cfiltra, monitoriza y bloquea las conexiones desde y hacia una aplicaci\u00f3n web\u201d. Con la misma es posible denegar o permitir la entrada de solicitudes y respuestas, en funci\u00f3n de las pol\u00edticas definidas a trav\u00e9s de reglas.<\/p>\n<p>El fabricante de ciberseguridad Fortinet, consciente del gran n\u00famero de empresas que alojan sus aplicaciones en la nube de AWS, ofrece a las organizaciones la protecci\u00f3n que necesitan en este sentido. \u00bfC\u00f3mo? Con FortiWeb, su Web Application Firewall que protege a las aplicaciones web cr\u00edticas para las compa\u00f1\u00edas contra ataques dirigidos a vulnerabilidades conocidas y desconocidas. Una protecci\u00f3n que se extiende al DDoS, a la reputaci\u00f3n de la IP, la validaci\u00f3n de firmas de ataque de aplicaciones o la mitigaci\u00f3n de bots. Adem\u00e1s, su aprendizaje autom\u00e1tico identifica el tr\u00e1fico benigno y malicioso de las aplicaciones sin el aprendizaje manual de aplicaciones que necesitan la mayor\u00eda de los WAF.<\/p>\n<p>La apuesta por AWS de Fortinet es innegable. No en vano cuenta con un robusto conjunto de soluciones de seguridad integradas de forma nativa en esta multinacional, con el fin de dar a los clientes la seguridad que necesitan, aumentando su confianza y flexibilidad a la hora de desplegar aplicaciones en sus instalaciones o en la nube, entre ellas nuevas reglas gestionadas para AWS WAF o la integraci\u00f3n de FortiGate con el framework para partners de AWS CloudFormation.<\/p>\n<p>Recientemente Fortinet anunciaba nuevas integraciones con AWS para ofrecer a los clientes una seguridad avanzada en sus plataformas cloud, aplicaciones y red. Una mayor visibilidad, control total de sus aplicaciones y una gesti\u00f3n centralizada a trav\u00e9s de entornos en la nube e h\u00edbridos, por poner algunos ejemplos. En definitiva, Fortinet se preocupa de la protecci\u00f3n que una empresa necesita, haciendo que la organizaci\u00f3n ocupe su tiempo en sacar adelante su negocio.<\/p>\n<div  class=\"jeg_postblock_5 jeg_postblock jeg_module_hook jeg_pagination_disable jeg_col_3o3 jnews_module__0_69def55c6b502   \" data-unique=\"jnews_module__0_69def55c6b502\">\n\t\t\t\t\t<div class=\"jeg_block_heading jeg_block_heading_6 jeg_subcat_right\">\n                     <h3 class=\"jeg_block_title\"><span>DOCUMENTO RELACIONADO<\/span><\/h3>\n                     \n                 <\/div>\n\t\t\t\t\t<div class=\"jeg_block_container\">\n                    \n                    <div class=\"jeg_posts jeg_load_more_flag\"><article class=\"jeg_post jeg_pl_lg_2 format-standard\">\n                    <div class=\"jeg_thumb\">\n                        \n                        <a href=\"https:\/\/directortic.es\/fortinet\/2021\/05\/19\/que-debes-tener-en-cuenta-para-proteger-las-aplicaciones-web-en-aws\/\" aria-label=\"Read article: \u00bfQu\u00e9 debes tener en cuenta para proteger las aplicaciones web en AWS?\"><div class=\"thumbnail-container animate-lazy  size-715 \"><img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"250\" src=\"https:\/\/directortic.es\/fortinet\/wp-content\/themes\/jnews\/assets\/img\/jeg-empty.png\" class=\"attachment-jnews-350x250 size-jnews-350x250 lazyload wp-post-image\" alt=\"\u00bfQu\u00e9 debes tener en cuenta para proteger las aplicaciones web en AWS?\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" data-src=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/DESTACADO-FORTINET-AWS-350x250.png\" data-srcset=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/DESTACADO-FORTINET-AWS-350x250.png 350w, https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/DESTACADO-FORTINET-AWS-120x86.png 120w\" data-sizes=\"auto\" data-expand=\"700\" \/><\/div><\/a>\n                        <div class=\"jeg_post_category\">\n                            <span><a href=\"https:\/\/directortic.es\/fortinet\/category\/destacado\/\" class=\"category-destacado\">Destacado<\/a><\/span>\n                        <\/div>\n                    <\/div>\n                    <div class=\"jeg_postblock_content\">\n                        <h3 class=\"jeg_post_title\">\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/05\/19\/que-debes-tener-en-cuenta-para-proteger-las-aplicaciones-web-en-aws\/\">\u00bfQu\u00e9 debes tener en cuenta para proteger las aplicaciones web en AWS?<\/a>\n                        <\/h3>\n                        \n                        <div class=\"jeg_post_excerpt\">\n                            <p>Cada vez m\u00e1s empresas deciden migrar sus aplicaciones cr\u00edticas a la nube. Esta decisi\u00f3n provoca que la superficie de ataque...<\/p>\n                            <a href=\"https:\/\/directortic.es\/fortinet\/2021\/05\/19\/que-debes-tener-en-cuenta-para-proteger-las-aplicaciones-web-en-aws\/\" class=\"jeg_readmore\">Leer m\u00e1s<span class=\"screen-reader-text\">Details<\/span><\/a>\n                        <\/div>\n                    <\/div>\n                <\/article><\/div>\n                    <div class='module-overlay'>\n\t\t\t\t    <div class='preloader_type preloader_dot'>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader dot\">\n\t\t\t\t            <span><\/span><span><\/span><span><\/span>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader circle\">\n\t\t\t\t            <div class=\"jnews_preloader_circle_outer\">\n\t\t\t\t                <div class=\"jnews_preloader_circle_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t        <div class=\"module-preloader jeg_preloader square\">\n\t\t\t\t            <div class=\"jeg_square\">\n\t\t\t\t                <div class=\"jeg_square_inner\"><\/div>\n\t\t\t\t            <\/div>\n\t\t\t\t        <\/div>\n\t\t\t\t    <\/div>\n\t\t\t\t<\/div>\n                <\/div>\n                <div class=\"jeg_block_navigation\">\n                    <div class='navigation_overlay'><div class='module-preloader jeg_preloader'><span><\/span><span><\/span><span><\/span><\/div><\/div>\n                    \n                    \n                <\/div>\n\t\t\t\t\t\n\t\t\t\t\t<script>var jnews_module__0_69def55c6b502 = {\"header_icon\":\"\",\"first_title\":\"DOCUMENTO RELACIONADO\",\"second_title\":\"\",\"url\":\"\",\"header_type\":\"heading_6\",\"header_background\":\"\",\"header_secondary_background\":\"\",\"header_text_color\":\"\",\"header_line_color\":\"\",\"header_accent_color\":\"\",\"header_filter_category\":\"\",\"header_filter_author\":\"\",\"header_filter_tag\":\"\",\"header_filter_text\":\"All\",\"sticky_post\":false,\"sticky_post_filter\":false,\"post_type\":\"post\",\"content_type\":\"all\",\"sponsor\":false,\"number_post\":\"1\",\"post_offset\":0,\"unique_content\":\"disable\",\"include_post\":\"317\",\"included_only\":false,\"exclude_post\":\"\",\"include_category\":\"\",\"exclude_category\":\"\",\"include_author\":\"\",\"include_tag\":\"\",\"exclude_tag\":\"\",\"exclude_visited_post\":false,\"sort_by\":\"latest\",\"date_format\":\"default\",\"date_format_custom\":\"Y\\\/m\\\/d\",\"excerpt_length\":20,\"excerpt_ellipsis\":\"...\",\"force_normal_image_load\":\"\",\"main_custom_image_size\":\"default\",\"pagination_mode\":\"disable\",\"pagination_nextprev_showtext\":\"\",\"pagination_number_post\":4,\"pagination_scroll_limit\":0,\"ads_type\":\"disable\",\"ads_position\":1,\"ads_random\":\"\",\"ads_image\":\"\",\"ads_image_tablet\":\"\",\"ads_image_phone\":\"\",\"ads_image_link\":\"\",\"ads_image_alt\":\"\",\"ads_image_new_tab\":\"\",\"google_publisher_id\":\"\",\"google_slot_id\":\"\",\"google_desktop\":\"auto\",\"google_tab\":\"auto\",\"google_phone\":\"auto\",\"content\":\"\",\"ads_bottom_text\":\"\",\"boxed\":\"\",\"boxed_shadow\":\"\",\"el_id\":\"\",\"el_class\":\"\",\"scheme\":\"\",\"column_width\":\"auto\",\"title_color\":\"\",\"accent_color\":\"\",\"alt_color\":\"\",\"excerpt_color\":\"\",\"css\":\"\",\"paged\":1,\"column_class\":\"jeg_col_3o3\",\"class\":\"jnews_block_5\"};<\/script>\n\t\t\t\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>El mundo empresarial est\u00e1 repleto de falsas creencias en torno a la seguridad. Algunas se han conseguido derribar, pero otras permanecen inalterables. Una de las m\u00e1s afianzadas pasa por la innecesaria preocupaci\u00f3n de la seguridad al hospedar las aplicaciones en Amazon Web Services, cuando la realidad indica que AWS protege la infraestructura, pero el cliente [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":334,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"0","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":""},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"footnotes":""},"categories":[4],"tags":[],"class_list":["post-333","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfC\u00f3mo proteger las aplicaciones en AWS? - Fortinet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfC\u00f3mo proteger las aplicaciones en AWS? - Fortinet\" \/>\n<meta property=\"og:description\" content=\"El mundo empresarial est\u00e1 repleto de falsas creencias en torno a la seguridad. Algunas se han conseguido derribar, pero otras permanecen inalterables. Una de las m\u00e1s afianzadas pasa por la innecesaria preocupaci\u00f3n de la seguridad al hospedar las aplicaciones en Amazon Web Services, cuando la realidad indica que AWS protege la infraestructura, pero el cliente [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortinet\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-25T14:12:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T16:43:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/dreamstime_s_83368354.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"517\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/\"},\"author\":{\"name\":\"Manuel\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"headline\":\"\u00bfC\u00f3mo proteger las aplicaciones en AWS?\",\"datePublished\":\"2021-05-25T14:12:57+00:00\",\"dateModified\":\"2023-01-30T16:43:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/\"},\"wordCount\":467,\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/05\\\/dreamstime_s_83368354.jpg\",\"articleSection\":[\"Art\u00edculos\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/\",\"name\":\"\u00bfC\u00f3mo proteger las aplicaciones en AWS? - Fortinet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/05\\\/dreamstime_s_83368354.jpg\",\"datePublished\":\"2021-05-25T14:12:57+00:00\",\"dateModified\":\"2023-01-30T16:43:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/#primaryimage\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/05\\\/dreamstime_s_83368354.jpg\",\"contentUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/05\\\/dreamstime_s_83368354.jpg\",\"width\":800,\"height\":517},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/05\\\/25\\\/como-proteger-las-aplicaciones-en-aws\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfC\u00f3mo proteger las aplicaciones en AWS?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\",\"name\":\"Fortinet\",\"description\":\"Dise\u00f1ado para Redes basadas en la Seguridad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\",\"name\":\"Manuel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"caption\":\"Manuel\"},\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/author\\\/manu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfC\u00f3mo proteger las aplicaciones en AWS? - Fortinet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfC\u00f3mo proteger las aplicaciones en AWS? - Fortinet","og_description":"El mundo empresarial est\u00e1 repleto de falsas creencias en torno a la seguridad. Algunas se han conseguido derribar, pero otras permanecen inalterables. Una de las m\u00e1s afianzadas pasa por la innecesaria preocupaci\u00f3n de la seguridad al hospedar las aplicaciones en Amazon Web Services, cuando la realidad indica que AWS protege la infraestructura, pero el cliente [&hellip;]","og_url":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/","og_site_name":"Fortinet","article_published_time":"2021-05-25T14:12:57+00:00","article_modified_time":"2023-01-30T16:43:02+00:00","og_image":[{"width":800,"height":517,"url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/dreamstime_s_83368354.jpg","type":"image\/jpeg"}],"author":"Manuel","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Manuel","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/#article","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/"},"author":{"name":"Manuel","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"headline":"\u00bfC\u00f3mo proteger las aplicaciones en AWS?","datePublished":"2021-05-25T14:12:57+00:00","dateModified":"2023-01-30T16:43:02+00:00","mainEntityOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/"},"wordCount":467,"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/dreamstime_s_83368354.jpg","articleSection":["Art\u00edculos"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/","url":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/","name":"\u00bfC\u00f3mo proteger las aplicaciones en AWS? - Fortinet","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/#website"},"primaryImageOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/#primaryimage"},"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/dreamstime_s_83368354.jpg","datePublished":"2021-05-25T14:12:57+00:00","dateModified":"2023-01-30T16:43:02+00:00","author":{"@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"breadcrumb":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/#primaryimage","url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/dreamstime_s_83368354.jpg","contentUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/05\/dreamstime_s_83368354.jpg","width":800,"height":517},{"@type":"BreadcrumbList","@id":"https:\/\/directortic.es\/fortinet\/2021\/05\/25\/como-proteger-las-aplicaciones-en-aws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/directortic.es\/fortinet\/"},{"@type":"ListItem","position":2,"name":"\u00bfC\u00f3mo proteger las aplicaciones en AWS?"}]},{"@type":"WebSite","@id":"https:\/\/directortic.es\/fortinet\/#website","url":"https:\/\/directortic.es\/fortinet\/","name":"Fortinet","description":"Dise\u00f1ado para Redes basadas en la Seguridad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/directortic.es\/fortinet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8","name":"Manuel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","caption":"Manuel"},"url":"https:\/\/directortic.es\/fortinet\/author\/manu\/"}]}},"_links":{"self":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":1,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/333\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/333\/revisions\/335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media\/334"}],"wp:attachment":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media?parent=333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/categories?post=333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/tags?post=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}