This document discusses security in cloud computing environments. It recommends implementing security through layered protections including physically secure and redundant infrastructure, encrypted and separately networked storage, firewalls, intrusion detection systems, secure connectivity, and access management. The document emphasizes that people remain the weakest link and stresses developing securely with care and management. It advocates a layered approach with physical, technical, and procedural security controls to prevent cloud environments from being compromised.