In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?