• Configure essential security controls (MFA, IAM) within the first minutes of opening a cloud account.
  • Enable basic monitoring to track security events and threats.