Strategies Used by Cloud Security Managers to Implement Secure Access Methods