Watch this video on YouTube
You are tasked with designing a cloud storage solution for sensitive data. What should be your first step to secure this environment?