Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?