When going through the workspace creation process, the first step does not clearly tell how you should decide which one to pick specifically around cybersecurity. It reads like cybersecurity engagements should use it, and not that it has additional security.