Watch this video on YouTube
When formulating a defensive approach against internal security threats within cloud operations, which initiative is typically not included in such protective measures?