The design and configuration of these types of services will be driven by requirements, including an organization???s security and compliance standards, application and data sensitivity, risk assessment, and the policies implemented by the service providers an organization selects.