Includes the ability to control access to sensitive data, the capability to contrast differences to assess their performance, and the functionality to stop idle compute instances automatically.