This article presents a cloud computing adoption framework (CCAF) security suitable for business clouds. CCAF multilayered security is based on the development and integration of three major security technologies: firewall, identity management, and encryption based on the development of enterprise file sync and share technologies. The article explains the core technologies in detail and presents the results of large-scale experiments for penetration testing, SQL injection, and data scanning. The article also discusses the blending of CCAF multilayered security with policy, real services, and business activities. The subject is cloud computing and the course code and college/university are not mentioned.