Automation and orchestration
Encryption configuration
Logs
Availability
Collection
Monitoring
Configuration
Alerting
Monitoring configurations
Key ownership and location
Key life-cycle management
Backup and recovery methods
Cloud as business continuity and disaster recovery (BCDR)
Primary provider BCDR
Alternative provider BCDR
Infrastructure vs. serverless computing
Application virtualization
Software-defined networking
Misconfigurations
Storage configurations
Bit splitting
Data dispersion
Cloud access security broker (CASB)