A compromise of this cloud infrastructure component would provide an attacker with the ability to take over the entire cloud environment, therefore securing it must be a top priority when doing business in the cloud. Cloud storage Compute Management plane Hardware security module