DefenScope
    OverviewEndpointsPlatformHow It WorksIntegrationsPricingContactBlog
    Back to all articles
    Cloud Security

    Cloud Security Posture for Modern Organizations: Navigating Risk in a Multi-Cloud World

    DefenScope Cloud Security Team
    February 12, 2026
    15 min read
    Cloud Security Posture for Modern Organizations: Navigating Risk in a Multi-Cloud World

    Cloud computing has fundamentally reshaped how organizations build, deploy, and operate technology. What began as a cost optimization strategy has evolved into the default infrastructure paradigm for businesses of every size and sector. Yet this transformation has outpaced the security models designed to protect it. Traditional security architectures that assumed a static, on-premises infrastructure are fundamentally incompatible with the dynamic, API-driven, ephemeral nature of cloud environments.

    The consequences of this mismatch are visible in breach after breach. Misconfigured cloud storage buckets exposing millions of records. Overly permissive IAM roles granting unintended access to production databases. Unencrypted data flowing between services in multi-cloud architectures. These are not sophisticated zero-day exploits — they are preventable misconfigurations that persist because organizations lack the visibility and automation needed to manage cloud security posture at scale.

    Cloud Security Posture Management (CSPM) has emerged as the discipline and tooling category dedicated to solving this challenge. In this article, we examine why cloud security posture is uniquely difficult, explore the frameworks and methodologies that underpin effective CSPM programs, and provide practical guidance for organizations operating in complex multi-cloud environments.

    Cloud network infrastructure with interconnected nodes

    Multi-cloud environments introduce unprecedented complexity that demands automated and continuous security posture management.

    Why Cloud Security Posture Is Fundamentally Different

    Cloud infrastructure differs from traditional on-premises environments in ways that have profound implications for security posture management. Understanding these differences is essential for designing effective CSPM programs that account for the unique characteristics of cloud-native architectures.

    Infrastructure as Code and Configuration Drift

    In the cloud, infrastructure is defined and provisioned through code — Terraform templates, CloudFormation stacks, ARM templates, and Kubernetes manifests. This is powerful because it enables reproducibility and automation, but it also means that a single misconfiguration in a template can propagate across hundreds of resources instantaneously. Worse, manual changes made through the cloud console — known as configuration drift — can silently undermine the security properties that were defined in the infrastructure code.

    Traditional security scanning tools that assess running configurations miss the root cause when the vulnerability exists in the infrastructure template itself. Effective cloud security posture management must operate at both layers: scanning live configurations for runtime drift and analyzing infrastructure-as-code templates to catch misconfigurations before they are deployed.

    The Shared Responsibility Model

    Every major cloud provider operates under a shared responsibility model in which the provider secures the underlying infrastructure — physical data centers, hypervisors, network fabric — while the customer is responsible for securing everything they build on top of it. This includes network configurations, identity and access management, data encryption, application security, and operating system hardening for IaaS workloads.

    • IaaS (EC2, Compute Engine, Azure VMs): Customer responsible for OS patching, network security groups, identity management, application security, and data encryption
    • PaaS (Lambda, Cloud Functions, App Service): Customer responsible for application code, identity management, and data security; provider manages the runtime environment
    • SaaS (Microsoft 365, Salesforce, Workday): Customer responsible for access control, data classification, and configuration settings; provider manages everything else
    • The boundary of responsibility shifts with each service model, and organizations using hundreds of different cloud services must understand the responsibility boundary for each one

    Ephemeral and Dynamic Resources

    Cloud environments are inherently dynamic. Auto-scaling groups create and destroy virtual machines in response to demand. Serverless functions exist only for the duration of their execution. Container orchestrators schedule and reschedule workloads across clusters continuously. This ephemerality means that a security assessment performed at 9 AM may be irrelevant by 10 AM because the resources assessed no longer exist and new ones have taken their place.

    Cloud security posture management must therefore be continuous and event-driven rather than periodic and scan-based. The system must react to resource creation and modification events in real time, evaluate new resources against security policies before they serve traffic, and maintain an always-current view of the environment despite constant change.

    The Anatomy of Cloud Misconfigurations

    Cloud misconfigurations are the leading cause of cloud-related security incidents, responsible for a greater share of breaches than sophisticated attacks or insider threats. Understanding the most common categories of misconfiguration helps organizations prioritize their CSPM efforts and design policies that address the highest-risk issues first.

    Security monitoring dashboard with cloud metrics

    Cloud misconfigurations remain the leading cause of cloud security breaches, making automated detection essential.

    Identity and Access Management Misconfigurations

    IAM is consistently the most complex and error-prone area of cloud security. The principle of least privilege — granting only the minimum permissions necessary for a task — is simple in theory but extraordinarily difficult to implement in practice across environments with hundreds of services, thousands of API actions, and complex trust relationships between accounts and roles.

    • Overly permissive policies using wildcard (*) permissions that grant broad access instead of scoping to specific resources and actions
    • Long-lived access keys that are never rotated and may be embedded in code repositories, CI/CD pipelines, or developer workstations
    • Cross-account role trust policies that are too permissive, allowing unintended principals to assume roles in sensitive accounts
    • Service accounts with administrative privileges that are shared across teams and applications without audit trails
    • Inactive users and roles that retain permissions long after the person or application that used them has moved on
    # Cloud IAM Posture Assessment
    import json
    
    class IAMPostureAnalyzer:
        def __init__(self, cloud_provider):
            self.provider = cloud_provider
            self.findings = []
        
        def assess_policy_permissions(self, policy: dict) -> list:
            """Identify overly permissive IAM policies."""
            risks = []
            for statement in policy.get("Statement", []):
                if statement.get("Effect") == "Allow":
                    actions = statement.get("Action", [])
                    resources = statement.get("Resource", [])
                    
                    if "*" in actions or "*" in resources:
                        risks.append({
                            "severity": "CRITICAL",
                            "finding": "Wildcard permissions detected",
                            "recommendation": "Scope to specific "
                                "actions and resources"
                        })
                    
                    if any("Admin" in a for a in actions):
                        risks.append({
                            "severity": "HIGH",
                            "finding": "Administrative privileges granted",
                            "recommendation": "Apply least privilege "
                                "principle"
                        })
            return risks
        
        def check_key_rotation(self, access_keys: list) -> list:
            """Flag access keys older than 90 days."""
            from datetime import datetime, timedelta
            threshold = datetime.now() - timedelta(days=90)
            return [
                {"key_id": key["id"], "age_days": key["age"]}
                for key in access_keys
                if key["created"] < threshold
            ]

    Network and Storage Exposure

    Public exposure of cloud resources — whether storage buckets, databases, or compute instances — remains one of the most common and damaging categories of misconfiguration. The ease with which cloud resources can be made publicly accessible, combined with the complexity of bucket policies, network ACLs, and security group rules, creates a persistent risk that requires continuous monitoring.

    • Storage buckets with public read or write access, often due to legacy policies or misconfigured access control lists
    • Database instances (RDS, Cloud SQL, Cosmos DB) with public endpoints exposed to the internet without IP whitelisting
    • Security groups allowing unrestricted inbound access (0.0.0.0/0) on sensitive ports such as SSH (22), RDP (3389), or database ports
    • VPC configurations missing flow logs, making it impossible to detect and investigate unauthorized network traffic patterns
    • Missing encryption in transit between services, exposing sensitive data to potential interception on internal cloud networks

    Logging, Monitoring, and Detection Gaps

    A common and often overlooked category of cloud misconfiguration involves insufficient logging and monitoring. Organizations that fail to enable comprehensive cloud audit logs, configure alerting on suspicious activities, or retain logs for adequate periods create environments where attackers can operate undetected for extended periods. Cloud trail logs disabled, VPC flow logs not enabled, and object-level access logging turned off are all posture gaps that amplify the impact of any other security incident.

    Building a Cloud Security Posture Management Program

    An effective CSPM program combines automated tooling, well-defined policies, organizational processes, and continuous improvement cycles. The following framework provides a structured approach to building CSPM capabilities that scale with cloud adoption.

    1. Cloud Asset Inventory and Visibility

    The first step in managing cloud security posture is establishing comprehensive visibility into every cloud resource across all accounts, subscriptions, and projects. This inventory must be continuously updated as resources are created, modified, and destroyed. Multi-cloud organizations face the additional challenge of normalizing asset inventories across providers with different resource models and APIs.

    # Multi-Cloud Asset Inventory
    class CloudAssetInventory:
        def __init__(self):
            self.providers = {
                "aws": AWSInventoryCollector(),
                "azure": AzureInventoryCollector(),
                "gcp": GCPInventoryCollector()
            }
        
        def collect_all_assets(self) -> dict:
            """Aggregate assets across all cloud providers."""
            inventory = {
                "compute": [],
                "storage": [],
                "networking": [],
                "identity": [],
                "databases": [],
                "serverless": [],
                "containers": []
            }
            
            for provider_name, collector in self.providers.items():
                assets = collector.discover_assets()
                for category, resources in assets.items():
                    for resource in resources:
                        resource["cloud_provider"] = provider_name
                        resource["discovery_time"] = datetime.utcnow()
                        inventory[category].append(resource)
            
            return inventory
        
        def detect_shadow_cloud(self, known_accounts: list) -> list:
            """Identify cloud accounts not in the
            official inventory — shadow cloud usage."""
            all_accounts = self.scan_for_cloud_accounts()
            return [
                acct for acct in all_accounts
                if acct["id"] not in known_accounts
            ]

    2. Policy Definition and Compliance Mapping

    CSPM policies define the expected security configuration for every type of cloud resource. These policies should be mapped to compliance frameworks (SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR) to enable automated compliance reporting and should be versioned and managed as code alongside the infrastructure they govern.

    • Define policies for each cloud service type covering encryption, access control, network exposure, logging, and tagging requirements
    • Map each policy to one or more compliance controls to automate audit evidence collection and gap analysis
    • Version policies in a Git repository alongside infrastructure-as-code to maintain a clear audit trail of policy changes
    • Implement policy exceptions with defined expiration dates, business justifications, and compensating controls for approved deviations
    • Review and update policies quarterly to account for new cloud services, emerging threats, and changes in regulatory requirements

    3. Continuous Assessment and Scoring

    Cloud posture assessment must be continuous and event-driven. Every time a resource is created or modified, it should be evaluated against applicable policies. This real-time approach catches misconfigurations within seconds of their introduction rather than waiting for the next scheduled scan. Aggregate posture scores at the account, subscription, and organizational level provide executives with a meaningful measure of cloud risk.

    Developer working on code with security integrations

    Integrating security posture assessment into CI/CD pipelines enables organizations to catch misconfigurations before they reach production.

    4. Shift-Left: Security in the CI/CD Pipeline

    The most cost-effective place to catch cloud misconfigurations is before they are deployed. By integrating infrastructure-as-code scanning into CI/CD pipelines, organizations can evaluate Terraform plans, CloudFormation templates, and Kubernetes manifests against security policies and block deployments that introduce unacceptable risk. This shift-left approach reduces remediation costs by orders of magnitude and prevents production incidents entirely.

    # CI/CD Pipeline Security Gate
    name: Infrastructure Security Scan
    on:
      pull_request:
        paths:
          - "infrastructure/**"
          - "terraform/**"
    
    jobs:
      security-scan:
        runs-on: ubuntu-latest
        steps:
          - uses: actions/checkout@v4
          
          - name: Terraform Plan
            run: |
              cd infrastructure/
              terraform init
              terraform plan -out=tfplan
              terraform show -json tfplan > plan.json
          
          - name: CSPM Policy Evaluation
            run: |
              cspm-scanner evaluate \
                --plan plan.json \
                --policies ./security-policies/ \
                --fail-on critical,high \
                --report sarif \
                --output results.sarif
          
          - name: Upload Results
            uses: github/codeql-action/upload-sarif@v3
            with:
              sarif_file: results.sarif

    5. Automated Remediation

    When misconfigurations are detected in production, the speed of remediation directly determines the window of exposure. Automated remediation — where CSPM tools take corrective action without human intervention for well-understood, low-risk fixes — dramatically reduces mean time to remediation. For higher-risk changes, semi-automated workflows that generate remediation plans for human approval provide a balance between speed and safety.

    • Automatically remove public access from storage buckets when public exposure is detected and no approved exception exists
    • Auto-rotate access keys that exceed the maximum age policy and notify the owning team through their preferred channel
    • Automatically enable encryption on unencrypted resources where encryption can be applied without service disruption
    • Generate pull requests against infrastructure-as-code repositories with the required fixes for human review and approval
    • Escalate critical findings to incident response workflows when automated remediation is not possible or appropriate

    Multi-Cloud Posture Management Challenges

    Organizations operating across multiple cloud providers face unique challenges that single-cloud environments do not. Each provider uses different terminology, different APIs, different identity models, and different security service architectures. A security group in AWS is a Network Security Group in Azure and a Firewall Rule in GCP. An IAM role in AWS maps loosely to a Service Principal in Azure and a Service Account in GCP. These differences make it difficult to establish consistent policies, compare posture across providers, and train security teams.

    • Resource normalization: Map provider-specific resource types to a common taxonomy that enables cross-cloud policy enforcement and reporting
    • Identity federation: Implement a centralized identity provider that governs access across all cloud environments with consistent policies
    • Unified posture scoring: Develop a normalized scoring methodology that accounts for the different severity of equivalent misconfigurations across providers
    • Cross-cloud network visibility: Monitor and analyze traffic flows between cloud providers to detect lateral movement and data exfiltration
    • Compliance harmonization: Map provider-specific controls to common compliance frameworks to generate unified audit reports

    Key Metrics for Cloud Security Posture Programs

    Measuring the effectiveness of a CSPM program requires metrics that capture both the current state of posture and the organization's ability to detect and remediate issues over time. The following metrics provide a comprehensive view of program maturity and effectiveness.

    • Misconfiguration Density: Number of misconfigurations per 100 cloud resources, tracked by severity. Mature organizations target < 5 critical misconfigurations per 1,000 resources.
    • Mean Time to Detect (MTTD): Average time between misconfiguration introduction and detection. Event-driven CSPM should achieve < 5 minutes.
    • Mean Time to Remediate (MTTR): Average time between detection and remediation. Automated remediation targets < 1 hour for critical findings.
    • Policy Coverage: Percentage of cloud resource types covered by CSPM policies. Target > 95% of resource types in production environments.
    • Compliance Score: Percentage of cloud resources passing all applicable compliance controls, tracked by framework (SOC 2, ISO 27001, PCI DSS).
    • Shift-Left Catch Rate: Percentage of misconfigurations caught in CI/CD pipelines before reaching production. Target > 80% as the program matures.

    The Role of AI in Cloud Security Posture Management

    As cloud environments grow in complexity, AI and machine learning are becoming essential for managing posture at scale. Rule-based policies alone cannot keep pace with the rate of change in modern cloud architectures. ML models can identify misconfiguration patterns that human-authored rules miss, predict which resources are most likely to drift out of compliance, and prioritize findings based on actual exploitability rather than theoretical severity.

    • Graph-based analysis maps relationships between cloud resources to identify attack paths that chain multiple low-severity misconfigurations into critical exposure
    • Anomaly detection identifies unusual resource configurations and access patterns that deviate from organizational norms, flagging potential misconfigurations and compromises
    • Intelligent prioritization uses threat intelligence, asset criticality, and exploitability data to rank findings by actual risk rather than generic severity ratings
    • Automated policy generation analyzes existing configurations to suggest security policies that reflect the organization's actual architecture and risk tolerance

    Implementation Roadmap for CSPM

    Organizations at different stages of cloud maturity require different CSPM approaches. The following phased roadmap provides a structured path from initial visibility to advanced posture management.

    • Phase 1 — Visibility: Connect all cloud accounts to a CSPM platform. Establish a unified asset inventory. Run initial posture assessments to baseline the current state. Identify and remediate critical misconfigurations.
    • Phase 2 — Policy and Compliance: Define comprehensive security policies for all cloud resource types. Map policies to compliance frameworks. Implement continuous assessment with alerting. Begin tracking posture metrics.
    • Phase 3 — Shift-Left and Automation: Integrate IaC scanning into CI/CD pipelines. Implement automated remediation for low-risk findings. Deploy guardrails that prevent non-compliant deployments. Reduce MTTR through automation.
    • Phase 4 — Intelligence and Optimization: Deploy AI-driven attack path analysis and risk prioritization. Implement predictive posture management. Optimize policies based on false positive rates and operational impact. Achieve mature, metrics-driven program governance.

    Conclusion

    Cloud security posture management is not a product to deploy — it is a capability to build. As organizations deepen their reliance on cloud infrastructure and expand across multiple providers, the attack surface grows in ways that are impossible to manage through manual processes or periodic assessments. Misconfigurations — not sophisticated attacks — remain the primary cause of cloud security incidents, and the organizations that suffer the most damaging breaches are invariably those with the least visibility into their own configurations.

    Effective CSPM programs combine continuous visibility, policy-driven assessment, shift-left practices, automated remediation, and AI-powered intelligence into an integrated capability that scales with cloud adoption. The investment in building this capability pays dividends not only in reduced security incidents but in faster compliance audits, lower operational overhead, and greater confidence in the security of cloud-hosted services.

    The cloud is not inherently less secure than on-premises infrastructure — but it is differently secure. Organizations that understand and embrace this difference, investing in the tools, processes, and skills needed to manage cloud security posture continuously, will be the ones that realize the full promise of cloud computing without the security compromises that have characterized its early adoption.

    Share this article

    Related Articles

    SOC Analyst Burnout is Real — and Fixable: Restoring Sustainability in Modern Cybersecurity Operations
    SOC Operations

    SOC Analyst Burnout is Real — and Fixable: Restoring Sustainability in Modern Cybersecurity Operations

    Explore the epidemic of SOC analyst burnout and discover how intelligent automation through ML and LLMs can restore purpose, effectiveness, and sustainability to security operations.

    March 28, 2025
    LLMs for Alert Context Understanding: Unlocking Intelligence in the SOC
    Artificial Intelligence

    LLMs for Alert Context Understanding: Unlocking Intelligence in the SOC

    Discover how Large Language Models are revolutionizing Security Operations Centers by transforming raw alerts into actionable intelligence through advanced natural language understanding.

    March 25, 2025
    Why Alert Enrichment is Critical: Turning Signals into Security Knowledge
    Alert Management

    Why Alert Enrichment is Critical: Turning Signals into Security Knowledge

    Discover how alert enrichment transforms raw security signals into actionable intelligence, enabling faster decisions and more effective threat response in modern SOCs.

    March 22, 2025
    Using Machine Learning to Tame the Noise: Transforming SOC Alert Management
    Machine Learning

    Using Machine Learning to Tame the Noise: Transforming SOC Alert Management

    Discover how machine learning algorithms can revolutionize SOC operations by intelligently classifying, clustering, and correlating security alerts to reduce noise and improve threat detection.

    March 20, 2025
    Alert Overload in Modern SOCs: The Hidden Crisis Undermining Cyber Defense
    SOC Operations

    Alert Overload in Modern SOCs: The Hidden Crisis Undermining Cyber Defense

    Explore how overwhelming alert volumes are crippling Security Operations Centers and why AI-driven automation is the only scalable solution.

    March 18, 2025
    Advanced Internet Scanning Techniques for Security Professionals
    Internet Scanning

    Advanced Internet Scanning Techniques for Security Professionals

    Discover the latest methodologies and tools for effective internet scanning to identify potential security vulnerabilities.

    March 12, 2025
    Effective Host Detection Strategies in Complex Networks
    Host Detection

    Effective Host Detection Strategies in Complex Networks

    Learn how to implement robust host detection mechanisms to maintain visibility across your network infrastructure.

    March 5, 2025
    Vulnerability Scanning Best Practices for Enterprise Security
    Vulnerability Scanning

    Vulnerability Scanning Best Practices for Enterprise Security

    Implement effective vulnerability scanning protocols to identify and remediate security weaknesses before they can be exploited.

    February 28, 2025
    Zero-Day Vulnerability Detection: Beyond Traditional Scanning
    Vulnerability Scanning

    Zero-Day Vulnerability Detection: Beyond Traditional Scanning

    Explore advanced techniques for identifying previously unknown vulnerabilities before they become public knowledge.

    February 20, 2025
    Cloud Security Posture Management: Securing Your Digital Transformation
    Cloud Security

    Cloud Security Posture Management: Securing Your Digital Transformation

    Learn how to implement effective cloud security posture management to protect your cloud infrastructure from emerging threats.

    February 15, 2025
    Endpoint Security Posture in Modern Organizations: Why Continuous Monitoring Is No Longer Optional
    Host Detection

    Endpoint Security Posture in Modern Organizations: Why Continuous Monitoring Is No Longer Optional

    Discover why endpoint security posture monitoring has become essential for modern organizations facing an expanding attack surface of remote devices, IoT, and BYOD endpoints.

    February 10, 2026
    SOC Analyst Burnout is Real — and Fixable: Restoring Sustainability in Modern Cybersecurity Operations
    SOC Operations

    SOC Analyst Burnout is Real — and Fixable: Restoring Sustainability in Modern Cybersecurity Operations

    Explore the epidemic of SOC analyst burnout and discover how intelligent automation through ML and LLMs can restore purpose, effectiveness, and sustainability to security operations.

    March 28, 2025
    LLMs for Alert Context Understanding: Unlocking Intelligence in the SOC
    Artificial Intelligence

    LLMs for Alert Context Understanding: Unlocking Intelligence in the SOC

    Discover how Large Language Models are revolutionizing Security Operations Centers by transforming raw alerts into actionable intelligence through advanced natural language understanding.

    March 25, 2025
    Why Alert Enrichment is Critical: Turning Signals into Security Knowledge
    Alert Management

    Why Alert Enrichment is Critical: Turning Signals into Security Knowledge

    Discover how alert enrichment transforms raw security signals into actionable intelligence, enabling faster decisions and more effective threat response in modern SOCs.

    March 22, 2025
    Using Machine Learning to Tame the Noise: Transforming SOC Alert Management
    Machine Learning

    Using Machine Learning to Tame the Noise: Transforming SOC Alert Management

    Discover how machine learning algorithms can revolutionize SOC operations by intelligently classifying, clustering, and correlating security alerts to reduce noise and improve threat detection.

    March 20, 2025
    Alert Overload in Modern SOCs: The Hidden Crisis Undermining Cyber Defense
    SOC Operations

    Alert Overload in Modern SOCs: The Hidden Crisis Undermining Cyber Defense

    Explore how overwhelming alert volumes are crippling Security Operations Centers and why AI-driven automation is the only scalable solution.

    March 18, 2025
    Advanced Internet Scanning Techniques for Security Professionals
    Internet Scanning

    Advanced Internet Scanning Techniques for Security Professionals

    Discover the latest methodologies and tools for effective internet scanning to identify potential security vulnerabilities.

    March 12, 2025
    Effective Host Detection Strategies in Complex Networks
    Host Detection

    Effective Host Detection Strategies in Complex Networks

    Learn how to implement robust host detection mechanisms to maintain visibility across your network infrastructure.

    March 5, 2025
    Vulnerability Scanning Best Practices for Enterprise Security
    Vulnerability Scanning

    Vulnerability Scanning Best Practices for Enterprise Security

    Implement effective vulnerability scanning protocols to identify and remediate security weaknesses before they can be exploited.

    February 28, 2025
    Zero-Day Vulnerability Detection: Beyond Traditional Scanning
    Vulnerability Scanning

    Zero-Day Vulnerability Detection: Beyond Traditional Scanning

    Explore advanced techniques for identifying previously unknown vulnerabilities before they become public knowledge.

    February 20, 2025
    Cloud Security Posture Management: Securing Your Digital Transformation
    Cloud Security

    Cloud Security Posture Management: Securing Your Digital Transformation

    Learn how to implement effective cloud security posture management to protect your cloud infrastructure from emerging threats.

    February 15, 2025
    Endpoint Security Posture in Modern Organizations: Why Continuous Monitoring Is No Longer Optional
    Host Detection

    Endpoint Security Posture in Modern Organizations: Why Continuous Monitoring Is No Longer Optional

    Discover why endpoint security posture monitoring has become essential for modern organizations facing an expanding attack surface of remote devices, IoT, and BYOD endpoints.

    February 10, 2026
    DefenScope

    Unified security posture for endpoints and cloud.

    Transforming security posture across cloud and endpoints with continuous attack surface scanning, risk-based remediation, and audit-ready reporting.

    Navigation

    • Overview
    • Platform
    • Integrations
    • Pricing
    • Contact
    • Blog

    Contact

    • info@defenscope.ioGeneral inquiries
    • sales@defenscope.ioSales and partnerships
    • support@defenscope.ioTechnical support
    • security@defenscope.ioSecurity issues

    Security & Compliance

    Aligned with ISO 27001 controls
    SOC 2 controls aligned
    GDPR-ready data handling

    © 2026 DefenScope. All rights reserved.

    Privacy PolicyTerms of Service