Importance of security in Cloud Application Development

Data Protection

Compliance Requirements

Threat  Mitigation

User Authentication