An effective cloud security posture begins with these three steps