If you are only using host-based security controls, and not using native controls for each cloud provider, you are vulnerable to attacks.
Legacy, Host-Based Security Controls in Operating Systems reside in the middle of the attack zone and ignore Cloud-Native Controls, effectively opening the doors of your workloads to potential threats.
Cloud-native Security Controls (CSP)
Cloud-Native Controls are separate from the attack zone and effectively build a moat around your workloads
Host-based Security Controls (Legacy)
Host-based security opens cloud hypervisor controls, effectively opening the doors of your workloads to potential threats