If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?