Which type of security activities can BPI reasonable expect to be responsible for conducting under your recommended cloud service offering you identified in question 2?
Which security activities can BPI reasonable expect the cloud service provider to be responsible for conducting based on the CSA guide?