7 Steps to Securing Cloud Operations at the Edge