Watch this video on YouTube
As a cloud security architect, what should be the fundamental criterion for setting access controls in a cloud environment to align with organizational objectives and security requirements?