This document discusses securing cloud infrastructure from the hypervisor to the edge. It covers three dimensions: security for cloud infrastructure, security for cloud access, and commercial cloud security services. It provides examples of implementing security controls at different layers, including at the virtual access layer, hypervisor layer, and cloud edge. Virtual security appliances and segmentation techniques are also described.