While performing discovery of a company’s application environment you realize that some applications have unique risk considerations. When this organization moves to ITaaS, how should they manage application security requirements?
A. Address security on an application by application basis
B. Adopt the public cloud provider’s most stringent security standards
C. Implement an intrusion protection system for the entire environment
D. Identify a unique cloud service provider to host each sensitive application