ENISA: Which is not one of the five key legal issues common across all scenarios:
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
How does running applications on distinct virtual networks and only connecting networks as needed help?
What is true of a workload?
What are the primary security responsibilities of the cloud provider in the management infrastructure?
What is true of searching data across cloud environments?