||Key Management: Service providers should segregate key management from the cloud provider hosting the data, creating a chain of separation. This protects both the cloud provider and customer from conflicts when compelled to provide data due to a legal mandate.
||Cable; Internet/Data; Satellite; Wireless; Wireline
||Cyber Security;Encryption;Information Protection;Intrusion Detection;
||Cloud Security Alliance (CSA)