Security mitigation is the process of reducing or eliminating the impact and likelihood of a security threat or vulnerability, which helps improve the security resilience and performance of a system or a process. Common security mitigation strategies for cloud-based system deployment include security hardening, such as applying security configurations and patches to a system or component to minimize its attack surface and exposure, disabling unnecessary services and features, enforcing strong passwords and encryption, and updating software and firmware. Security monitoring involves collecting, analyzing, and reporting security data and events from a system or process to detect and respond to potential incidents and anomalies by using security tools and systems like firewalls, antivirus, intrusion detection/prevention, and log management. Lastly, security backup and recovery entails creating and restoring copies of data and applications from a system or process to ensure their availability and integrity in case of a disaster or compromise. This includes using backup tools and services such as cloud storage, snapshots, and replication.