Identify and document the cloud services being used
Perform risk assessment of the cloud services
Review the cloud service provider's security policies
Check encryption methods used for data transmission
Approval: Encryption Methods
Check data storage encryption
Investigate incident response time
Approval: Incident Response Time
Review cloud service provider's SLA
Verify compliance with relevant regulations and standards
Evaluate the security of APIs being used
Review user access management policies
Investigate existence of malware protection systems
Auditing of log and event data
Test Disaster Recovery and Business Continuity Planning
Verify Secure Development Life Cycle (SDLC) processes
Check availability of multi-factor authentication
Approval: Multi-Factor Authentication
Assess vendor lock-in risks and exit strategies