The document discusses cloud security and decomposes cloud computing into objectives, models, and deployment types. It outlines key security controls for the cloud, including controls for abstraction of resources, elastic scaling, APIs, and the public/private/virtual private cloud deployment models. Concerns are raised about hypervisor security, cloud platform maturity, identity/federation, API security, billing changes, terms of service, and lack of visibility within public clouds. Short term recommendations include implementing detection of public cloud use, getting involved in business/IT cloud plans, and tracking cloud security standards and research.