Strict supply chain management, comprehensive supplier assessment, HR resource requirements, transparent information security and management, compliance reporting, and a security breach notification process are defense against which of the following cloud computing threats?
a) Data breaches
b) Insider threats
c) Cloud account hijacking
d) DDoS attacks