Security always depends on context, and in most cases, the context is influenced by how an organization intends to use its cloud presence.