3. Prioritize Realize exposures in context to prioritize remediation according to asset criticality, threat context and vulnerability severity. Firms and buyers of cloud computing companies are ultimately answerable for their particular security, since they stand to shed most in case of reduction of knowledge they keep in the cloud. http://cloud-security-management05813.dbblog.net/24112660/cloud-computing-security-for-dummies