Cloud Security Security Fundamentals Defense in depth Encryption Zero Trust Identity Security Keys Know your devices Protect it with a proxy Glue it with Policy