A cloud security architect has been tasked with finding a solution for hardening VMs. The solution must meet the following requirements:
• Data needs to be stored outside of the VMs.
• No unauthorized modifications to the VMs are allowed.
• If a change needs to be done, a new VM needs to be deployed.
Which of the following is the best solution?