Watch this video on YouTube
As a dedicated cloud security professional tasked with overseeing system integrity, which element is typically outside the monitoring scope of a Host Intrusion Detection System (HIDS)?