• Create a secure Virtual Private Cloud (VPC) and implement baseline network security.
  • Launch secure virtual machines (instances) and run vulnerability assessments in the cloud.