Your Cloud Security is Already Built-in: How to Finally Enforce It