Watch this video on YouTube
In formulating defensive strategies to shield cloud operations from external threats, which of the following is not typically recognized as a conventional security practice?