We configured an additional authentication layer. This ensures that critical databases and other key assets could only be accessed by authorized, essential user groups. We also separated cloud services into single subnets to control the cross-service communication.