ccsp video for as a cloud security manager, what should be a primary consideration to maintain vigilant and ongoing surveillance for unauthorized modifications
As a cloud security manager, what should be a primary consideration to maintain vigilant and ongoing surveillance for unauthorized modifications that may introduce security misconfigurations within cloud services?