3. Prioritize Have an understanding of exposures in context to prioritize remediation according to asset criticality, danger context and vulnerability severity. Insider threats – A rogue personnel is able to applying cloud services to reveal an organization to some cybersecurity breach. A latest McAfee Cloud Adoption and Possibility Report http://security-issues-in-cloud81470.fitnell.com/32997148/considerations-to-know-about-cloud-computing-security