Managing firewall rules in cloud instances
Encrypting stored data
Securing virtualization infrastructure
Maintaining underlying network infrastructure
Physical security of data centers
Configuring user access permissions
Patching guest operating systems