Patching guest operating systems
Configuring user access permissions
Securing virtualization infrastructure
Managing firewall rules in cloud instances
Maintaining underlying network infrastructure
Physical security of data centers
Encrypting stored data