What kind of strategy is thebest approach based on the IBM Cloud Computing Reference Architecture V4 to minimize the risks in cloud computing?
A. Implement cloud native services that are inherently security aware.
B. Enable strong authentication of cloud users to make it less likely that unauthorized users can access the cloud.
C. Implement tools for monitoring, logging, and controlling access to or distribution of sensitive organizational data.
D. Define a cloud strategy with security in mind, identify the security measures needed, and enable security for the cloud