<?xml encoding="utf-8" ??>As an increasing number of companies become dependent on the cloud, attackers are taking advantage of its large attack surface and inconsistent security protocols. Many users lack an adequate understanding of their own security responsibilities, which makes their environments vulnerable to attack.To mitigate this,