Shared hardware from the big cloud players adds attack vectors, but it also comes with some of the best security minds trying to keep the entire platform secure.
For example, they'll typically be on secret mailing lists and aware of security vulnerabilities weeks before you know about them.
For example, they'll typically be on secret mailing lists and aware of security vulnerabilities weeks before you know about them.