Cloud Security: Thinking Beyond the Perimeter