Abstract1 How it all started—the story of an online bookstore2 Consolidation of terminologies and perspectives3 The achilles’ heel—depending on a trust relationship4 Top threats and vulnerabilities of cloud security5 Managing cloud security risks with the deming cycle6 Plan—threats, risk, and requirements landscape7 Do—cloud security approaches and challenges8 Check—forensics and incident response9 Act—governance and auditing10 Summary