10.1 Encryption10.2 Hashing10.3 Digital Signature10.4 Cloud-Based Security Groups10.5 Public Key Infrastructure (PKI) System10.6 Single Sign-On (SSO) System10.7 Hardened Virtual Server Image10.8 Firewall10.9 Virtual Private Network (VPN)10.10 Biometric Scanner10.11 Multi-Factor Authentication (MFA) System10.12 Identity and Access Management (IAM) System10.13 Intrusion Detection System (IDS)10.14 Penetration Testing Tool10.15 User Behavior Analytics (UBA) System10.16 Third-Party Software Update Utility10.17 Network Intrusion Monitor10.18 Authentication Log Monitor10.19 VPN Monitor10.20 Additional Cloud Security Access-Oriented Practices and Technologies