• Create and secure virtual networks (VPC).
  • Launch and secure virtual machine instances.
  • Conduct vulnerability assessments in the cloud environment.