During an initial discovery of a companys environment you realize there are applications with
unique risk considerations. In anticipation of moving the organization to ITaaS, how should these
application security requirements be managed?

A.
Address security on an application by application basis
B.
Adopt the public cloud provider’s security standards
C.
Implement an intrusion protection system
D.
Identify a unique cloud service provider to host each sensitive application