Who is responsible for managing the encryption of sensitive data and configuring identity access policies when utilizing cloud computing services?
A third-party security services firm
The cloud service provider
The Internet service provider of the customer
The cloud service customer