When deploying a web application using a cloud infrastructure provider, what aspect of security is the user's obligation alone?
Encryption of underlying storage media
Constructing access barriers for resource provisioning
Guarding against environmental risks within data centers
Security management of the guest operating system