Narrative intro
A CISO's job is cross-cluster. SOC operations sit in Security Operations; identity threat detection bridges Security Operations and Identity Operations; data sovereignty bridges Security Operations and Cloud Foundation; change governance is where security influences the platform's design. This map collects the four pillars a CISO is materially accountable for across the cloud estate. It's a buyer-persona map rather than a delivery programme. Use it for CISO conversations — board reporting, regulator engagement, peer benchmarking. The four pillars together make the CISO's mental model legible.