When establishing a secure environment for hosting web applications in the public cloud, which approach would best improve your security posture against infiltration and resource exploitation?
Configuring strict user and service roles with minimum necessary permissions
Employing firewalls to shield the perimeter of the cloud environment
Implementing continuous data backup solutions for all persistent storage resources
Mandating additional verification factors for all accounts in the cloud environment