Cloud compute, storage, network, and other security concerns. Implementation and use of security technical policies and methods, such as encryption of data at rest, and hardware security modules. Levels of trust for cloud provider systems. Consequences on data compliance depending on chosen tools.