Who is responsible for managing the encryption of sensitive data and configuring identity access policies when utilizing cloud computing services?
The cloud service customer
A third-party security services firm
The Internet service provider of the customer
The cloud service provider