Task 1 Encryption of user data such as the passwords for the application the various IP’s and passwords for the VM’s that will come from the infrastructure being deployed will all have to be transferred to and from the application securely, this will attempt to limit the exposure of this sensitive information to an exterior source/entity. This is my suggestion, only password algorithm Salt & hash would be more secure for this .I guess. Also provide algorithm ideas (picture of algorithm draft). And also the rest as well Task 2 User need to be able to see when there are potential security threats from configuration settings or capacity issues, these could include network configuration (if they have changed something) such as opening vulnerable ports or infrastructure capacity problems such as insufficient cores, RAM or memory. We should highlight these potential issues on the monitoring page so the user is made aware.