Key Steps to Securing Your Cloud Environment