Patching guest operating systems
Encrypting stored data
Maintaining underlying network infrastructure
Securing virtualization infrastructure
Managing firewall rules in cloud instances
Configuring user access permissions
Physical security of data centers