Watch this video on YouTube
During an audit of cloud security configurations, what technique should be used to ensure compliance with data protection regulations?