What Is Windows Hosting? Features, Use Cases, and How to Choose the Right Provider

What Is Windows Hosting? Features, Use Cases, and How to Choose the Right Provider
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Table of Contents

    Market overview: Gartner forecasts worldwide end-user spending on public cloud services to total $675.4 billion in 2024, and that scale matters because even “traditional hosting” buyers now compare every server decision against cloud-like expectations for resilience, security, and operational polish.

    At Techtide Solutions, we still see Windows hosting win real budgets when the workload is unmistakably Microsoft-native—especially when identity, databases, and legacy integrations are the hard requirements rather than a preference. Instead of treating it as “just another OS,” we think of Windows hosting as a deployment substrate that changes how applications authenticate users, schedule work, manage services, and connect to enterprise tooling.

    What Is Windows Hosting and How Does It Work?

    What Is Windows Hosting and How Does It Work?

    Windows hosting is web hosting delivered on servers running Microsoft Windows Server, typically optimized for IIS and Microsoft-centric application stacks. From our delivery experience, the biggest practical difference is not the login screen—it’s the operational model: Windows services, integrated authentication options, and database tooling tend to shape architecture decisions early.

    1. Windows Server OS as the foundation for web hosting

    Under the hood, Windows hosting is built on Windows Server delivers comprehensive capabilities that hosting providers package into shared accounts, virtual machines, or dedicated servers. Instead of thinking “one server equals one site,” we treat the OS as a multi-tenant platform: file permissions, service accounts, and isolated worker processes become the boundaries that keep customers from tripping over each other. Because Windows Server is also an enterprise OS, it tends to slot neatly into organizations that already standardize on Microsoft administration patterns and compliance workflows.

    2. Core Microsoft web components: IIS, ASP.NET/.NET Core, and Microsoft SQL Server

    Most Windows hosting environments revolve around IIS as the web server, ASP.NET (and modern .NET) as the application runtime, and SQL Server as the data layer, so the stack is cohesive by design. When we architect on Windows hosting, we lean on a completely modular architecture to reduce attack surface by turning off what we don’t need, then layer application code and middleware on top. For data-heavy systems, the “default good choice” is often Microsoft SQL Server is a relational database management system, especially when reporting, transactional integrity, and mature tooling matter more than minimal resource usage.

    Why This Stack Often Feels “Enterprise-Native”

    Architecturally, Windows hosting shines when identity and data are first-class concerns rather than afterthoughts. Rather than bolting on authentication later, teams can design around domain identities, Windows-integrated access patterns, and policy-driven administration that already exists inside the business.

    3. How Windows hosting is typically managed: Plesk control panel vs direct server administration

    Operationally, Windows hosting splits into two styles: control-panel-led management and direct server administration. With a panel, teams get a hosted UI for domains, mailboxes, databases, and deployment tasks, and Plesk is the common choice because Plesk tools for performing server and account management tasks are divided between three web interfaces that map cleanly to the roles inside many organizations. Without a panel, administrators rely on Remote Desktop, PowerShell automation, and tools like Windows Admin Center is a remote management tool to manage roles, services, and security baselines more directly.

    Key Features of Windows Web Hosting Environments

    Key Features of Windows Web Hosting Environments

    Windows hosting is less about novelty and more about predictability: predictable deployment models, predictable security patch cadence, and predictable compatibility with Microsoft workloads. In practice, that predictability is what lets businesses keep older systems alive while modernizing safely around them.

    1. Microsoft technology support for ASP.NET and MS SQL compatibility

    Compatibility is the headline feature: Windows hosting is often chosen because it supports the Microsoft stack without awkward workarounds. In our projects, that most commonly means hosting internal portals built on ASP.NET, then pairing them with SQL Server where stored procedures, careful indexing, and query tuning are part of the long-term plan. When a team needs integrated Windows authentication for intranet scenarios, you can use Windows authentication when your IIS server runs on a corporate network, which can be a decisive simplifier for line-of-business applications that should not reinvent identity.

    2. Plesk control panel for simplified website management, deployment, and monitoring

    Control panels reduce operational friction by turning server chores into repeatable workflows: provisioning sites, issuing certificates, rotating credentials, and backing up content becomes standardized instead of tribal knowledge. From our perspective, the real value is governance—non-root users can manage what they own while the platform team keeps global settings consistent. Because the panel centralizes configuration, it also reduces “snowflake server” risk, where each environment drifts into a unique, un-documentable mess that only one administrator understands.

    3. Windows Server OS hosting environment designed for Windows-based workloads

    Windows workloads behave differently from Linux workloads, and Windows hosting leans into that reality rather than fighting it. Services, scheduled tasks, and application pools become the natural primitives for background work, while Event Viewer-style logging can support root-cause analysis when incidents span multiple subsystems. In regulated organizations, we also see Windows-based baselines and hardening standards already exist, so hosting on Windows aligns with internal audit vocabulary instead of creating a parallel security regime that must be justified and maintained.

    4. IIS web server for reliable request processing in Microsoft stacks

    IIS is not just “a web server”; it’s a request-processing pipeline designed to integrate with Windows services, authentication, and process isolation. When we tune IIS for production, we care about how requests traverse the kernel driver and process activation model; in particular, these components include protocol listeners, such as HTTP.sys, and services, such as the World Wide Web Publishing Service and Windows Process Activation Service, which helps explain why some performance and stability issues are configuration problems rather than code problems. Done well, IIS becomes an operational advantage: you get structured isolation boundaries and a well-understood surface for automation and policy.

    What We Watch in Real Operations

    In production, we pay attention to application pool identity, recycling behavior, and request queueing as much as we watch CPU and memory. Because IIS is modular, teams can keep installs lean, which reduces both runtime overhead and the number of components that need patching.

    5. Security features designed for protection and threat prevention

    Security in Windows hosting starts with layered defaults that can be strengthened rather than invented. On the endpoint side, Microsoft Defender Antivirus is installed and functional in many Windows Server deployments, and that baseline matters because it reduces the chance that “no antivirus” becomes the accidental default. On the network side, Windows Firewall is a security feature that helps to protect your device by filtering network traffic, which is crucial when teams need host-based rules that remain meaningful even if perimeter assumptions change.

    Where Providers Make or Break Security

    Provider posture matters: patch management discipline, backup integrity checks, and logging retention often separate “Windows hosting” from “Windows hosting done responsibly.” In our audits, missing update processes and unclear incident response are bigger risks than the OS choice itself.

    Types of Windows Hosting: Shared, VPS, and Dedicated Servers

    Types of Windows Hosting: Shared, VPS, and Dedicated Servers

    Windows hosting is sold in familiar shapes, but the operational consequences differ sharply. Choosing between shared, VPS, and dedicated is really choosing your isolation model, your blast radius, and how much customization you can safely carry.

    1. Shared Windows hosting for smaller sites and entry-level needs

    Shared Windows hosting is best understood as “account-level isolation”: multiple customers share the same OS instance while the provider enforces boundaries using permissions, process isolation, and quotas. For lightweight workloads—marketing sites, basic CMS deployments, or small ASP.NET apps with modest traffic—this can be a rational choice because operations are largely standardized. From our angle, shared plans become risky when applications need background processing, custom server modules, or deeper database tuning, since those needs often imply configuration changes that shared environments cannot safely allow.

    2. Windows VPS hosting for dedicated resources, customization, and scalability

    A Windows VPS provides a dedicated virtual machine with its own OS instance, which unlocks meaningful customization without the cost of physical isolation. In practice, this is where many serious business apps land: teams can install required runtimes, tune IIS and SQL Server settings, and integrate with corporate networking more flexibly. Operationally, the VPS tier is also where good DevOps hygiene starts to matter—configuration-as-code, patch windows, and repeatable deployments become the difference between a stable service and an expensive hobby.

    3. Dedicated Windows hosting for maximum performance, security, and control

    Dedicated Windows hosting provides a full physical server for one customer, which can be the right answer when compliance, performance isolation, or specialized hardware requirements are non-negotiable. From a systems perspective, dedicated hardware reduces “noisy neighbor” uncertainty and can simplify certain audits because the infrastructure boundary is easier to explain. On the other hand, dedicated servers increase operational responsibility: if a team does not have a mature patching and monitoring regimen, dedicated can amplify risk rather than reduce it.

    Who Should Consider Windows Hosting?

    Who Should Consider Windows Hosting?

    Windows hosting is rarely the “default best” for every project, but it is often the cleanest solution when the stack is already committed to Microsoft technologies. In our consulting, the strongest signal is not preference—it’s integration gravity: identity, database, and tooling dependencies that are costly to replace.

    1. Websites and applications built with ASP.NET, .NET Core, classic ASP, or VBScript

    Teams building on ASP.NET and related Microsoft web technologies should consider Windows hosting because it removes the friction of emulation and compatibility layers. When a codebase includes classic ASP or VBScript-era patterns, the hosting decision is often already made by history, and the real question becomes how to stabilize and modernize without breaking production. In our own migrations, we often wrap legacy endpoints behind reverse proxies, add observability, and slowly carve out new services in modern .NET—yet Windows hosting remains the pragmatic foundation while the transformation happens.

    2. Projects that require Microsoft SQL Server or Microsoft Access databases

    Database requirements frequently force the hosting choice, especially when teams need SQL Server-specific features, tooling, or operational familiarity. For small departmental apps, we still run into Microsoft Access dependencies, and Microsoft positions Microsoft Access as a way to create business database apps quickly, which explains why it persists in the wild. In those cases, Windows hosting becomes less about “web hosting” and more about running an ecosystem that includes file-based databases, ODBC connections, and legacy reporting workflows.

    3. Businesses that depend on Microsoft tools like Exchange, SharePoint, and Active Directory

    When an organization’s operational backbone is Microsoft infrastructure, Windows hosting can reduce integration complexity. For identity, Active Directory Domain Services provides the methods for storing directory data and making this data available, and that identity layer often dictates how intranet apps should authenticate and authorize. For collaboration and messaging, Exchange documentation and SharePoint guidance shape how internal tools are governed, archived, and secured, so Windows-hosted apps can align more naturally with existing administration patterns.

    4. Legacy applications and hybrid environments that need Windows-specific compatibility

    Legacy compatibility is the quiet reason Windows hosting stays relevant: a surprising amount of business value still lives inside old COM components, Windows-auth intranet apps, and workflows that assume Windows semantics. Hybrid environments amplify this because not everything can move to cloud-native patterns at once; the “bridge period” can last years, not months. In that reality, the goal becomes controlled coexistence: keep Windows-specific dependencies stable while you modernize interfaces, automate deployments, and gradually reduce the unique surface area that makes legacy systems hard to maintain.

    Benefits and Drawbacks of Windows Hosting

    Benefits and Drawbacks of Windows Hosting

    Windows hosting has real advantages, but it also has costs—financial, operational, and sometimes performance-related. At Techtide Solutions, we try to treat the decision as a total-cost-of-ownership question rather than a brand loyalty question.

    1. Ease of use and familiarity with the Windows interface and workflows

    Familiarity is a legitimate business benefit because it shortens time-to-competence for administrators and reduces operational mistakes. For teams already staffed with Windows administrators, the learning curve can be gentler, especially when troubleshooting involves Windows-native logs, service control, and well-known management tools. Still, we caution clients not to confuse “familiar” with “simple”: production hosting requires disciplined patching, monitoring, backups, and incident response no matter how friendly the UI feels.

    2. Strong compatibility with Microsoft products and enterprise tooling

    Compatibility is where Windows hosting earns its keep, particularly in enterprises where Microsoft tooling is already standardized. For example, a line-of-business portal that must use Windows authentication and query SQL Server can often be deployed faster on Windows because the integration points are first-class. From our delivery experience, that speed shows up in fewer deployment hacks, fewer “almost supported” plugins, and fewer edge cases where updates break brittle compatibility layers.

    3. Cost considerations: licensing fees and higher plan pricing compared with Linux hosting

    Licensing is the obvious trade-off: Windows hosting can cost more because the OS and some Microsoft components carry licensing obligations that many Linux stacks simply do not. In real procurement cycles, this means the cheapest Windows plan is often not competing with the cheapest Linux plan; it’s competing with the cost of rewriting or replatforming the application. Our rule of thumb is blunt: if Windows dependencies are core to the business process, paying for licensing can be cheaper than paying engineers to remove those dependencies under deadline pressure.

    4. Security considerations: assessing vulnerabilities and choosing providers with strong protections

    Security is not “better” or “worse” because of Windows; it is better or worse because of how the platform is operated. Providers differ wildly in how fast they patch, how transparently they communicate incidents, and how well they support modern cryptography and secure defaults. In our risk reviews, we look for layered controls—endpoint protection, firewalling, least-privilege access, log retention, and tested backups—because attackers rarely need exotic exploits when basic hygiene is missing.

    5. Stability and performance trade-offs: uptime expectations and resource overhead

    Performance trade-offs often come down to overhead and tuning discipline. Windows servers can be extremely stable, but the platform includes services and background activity that must be understood and managed, especially on smaller VPS footprints. From our perspective, the bigger stability risk is configuration drift: when teams hand-configure servers without automation, small changes accumulate until debugging becomes archaeology, and uptime becomes luck rather than engineering.

    Windows vs Linux Hosting: Differences in OS, Tools, Performance, and Cost

    Windows vs Linux Hosting: Differences in OS, Tools, Performance, and Cost

    Windows vs Linux is not a culture war; it’s a constraints analysis. When we advise clients, we focus on what the application needs to run safely and what the business needs to operate it sustainably.

    1. Supported technologies and languages: Microsoft stack vs open-source ecosystems

    Windows hosting naturally supports Microsoft technologies like IIS-hosted applications, Windows-integrated identity, and SQL Server-centric data layers. Linux hosting, by contrast, tends to be the default for open-source ecosystems: common web servers, language runtimes, and tooling that assume POSIX semantics. Practically speaking, this means that Windows is often chosen for “Microsoft-first” applications, while Linux is often chosen for polyglot stacks where the team wants maximum flexibility and the broadest ecosystem of packages and community patterns.

    2. Performance and resource efficiency: stable-but-heavier vs lightweight-and-efficient hosting

    Linux hosting is frequently perceived as more resource-efficient, especially for small instances, because many Linux distributions can run very lean. Windows hosting can still perform extremely well, but it often expects more from the baseline environment, and administrators must understand how services, logging, and background tasks affect workloads. In our performance engineering work, the deciding factor is rarely the OS alone; far more often, application architecture, database design, caching strategy, and deployment correctness dominate the outcome.

    3. Security approach: Microsoft updates and patches vs community-driven patching models

    Windows security tends to be shaped by Microsoft’s update cadence, integrated security products, and enterprise governance models. Linux security is often shaped by distribution repositories, community patching, and a culture of minimal installs and composable tooling. From an operational lens, both models can be excellent, but they require different muscles: Windows teams need strong update orchestration and policy control, while Linux teams often need package governance discipline and careful service hardening across a diverse toolchain.

    4. Management experience: GUI vs CLI and common control panels like Plesk and cPanel

    Management experience influences staffing and response time during incidents. Windows environments often lean on GUI-based administration and integrated management tools, while Linux environments often lean on CLI workflows and shell-driven automation. Control panels exist on both sides, but the cultural default differs, and that affects how teams document systems and train new operators. In our view, the winning approach is whichever makes operational behavior more repeatable: fewer one-off fixes, more scripted changes, and clearer audit trails.

    5. Community perspective for simple React/static sites: when Linux hosting is typically enough

    For simple static sites—React builds, landing pages, documentation portals—Linux hosting is typically enough because the runtime needs are minimal and the delivery model is mostly files plus caching. In those scenarios, Windows hosting can be overkill unless there is a broader Microsoft requirement, such as internal authentication or Windows-only tooling. From our side, we tell clients to avoid buying complexity they won’t use: a static site benefits more from a clean deployment pipeline and strong caching than from any specific operating system.

    How to Choose a Windows Hosting Provider and Top Providers in 2025

    How to Choose a Windows Hosting Provider and Top Providers in 2025

    Provider selection is where Windows hosting succeeds or fails, because the OS is only the beginning. In our experience, the best provider is the one whose operational model matches your risk tolerance: patching, backups, monitoring, and support responsiveness are the real product.

    1. Windows Server version selection: prioritizing modern versions like 2019 or 2022

    Version choice is not cosmetic; it shapes security posture, compatibility, and how long the platform remains supportable. We generally push teams toward modern Windows Server releases because older versions can trap you in outdated cryptography defaults, older management tooling, and shrinking vendor support. Rather than picking based on habit, we recommend mapping your requirements—framework compatibility, database needs, and third-party vendor support—then selecting the newest release that satisfies those constraints with a comfortable lifecycle runway.

    2. Microsoft technology support: ASP.NET, .NET Core, and MS SQL Server compatibility checks

    Before buying anything, we validate support at the exact layer your application uses: runtime hosting model, database edition requirements, and authentication approach. When hosting ASP.NET apps behind IIS, it matters whether the environment supports the deployment style you expect, and an ASP.NET Core app runs in the same process as its IIS worker process in an in-process model, which changes performance and troubleshooting characteristics. Compatibility checks should also include SQL Server connectivity, backup strategy, and how the provider handles patching windows that might affect application behavior.

    3. Control panel evaluation: Plesk expectations and alternatives (custom panels and other options)

    Control panel evaluation is really an operational maturity check: does the panel help you standardize, or does it hide important details until an incident forces you to learn them in panic? If you use Plesk, verify how it handles certificates, database provisioning, and role separation between administrators and customers, because those details determine whether governance is easy or constant friction. When a provider uses a custom panel, we insist on clarity: documented APIs, predictable permission models, and a clean path to export or migrate if you outgrow the platform.

    4. Security and reliability checklist: SSL, firewalling, updates, backups, and uptime guarantees

    A good checklist prevents the most expensive kind of outage: the one you could have avoided with basic diligence. For Windows hosting, we typically ask for five concrete operational answers, then insist they be verifiable rather than marketing claims.

    • Identity: confirm how administrative access is protected and how privileges are separated.
    • Network: verify firewall defaults, segmentation options, and DDoS posture.
    • Updates: ask who patches what, how often, and how maintenance windows are communicated.
    • Backups: require a restore process that has been tested, not merely promised.
    • Observability: ensure logging and monitoring are available to you, not just to the provider.

    5. Customer support expectations: 24/7 availability, channels, and documentation depth

    Support quality is part of architecture, because production incidents are inevitable and response time becomes a business variable. When we evaluate providers, we want multiple channels—tickets for traceability, live chat or phone for urgency, and deep documentation for self-service operations. Equally important, we want Windows-literate support: teams that understand IIS, Windows eventing, and SQL Server operations tend to fix root causes faster than teams that only know generic hosting scripts.

    6. Reputation signals: using third-party feedback to validate reliability and service quality

    Reputation research should go beyond star ratings and focus on failure patterns. We look for recurring complaints about billing surprises, chronic outages, or weak incident communication, because those indicate systemic issues. Healthy signals include transparent status communication, clear SLAs, and documentation that reads like it was written by people who actually run the platform. When possible, we also ask peers in similar industries, since regulated businesses tend to stress providers in ways hobby sites never will.

    7. HostGator: beginner-friendly Windows hosting with Plesk, SSL, and backups

    For teams that want a recognizable brand and a relatively straightforward on-ramp, HostGator’s positioning is often “get running without overthinking the infrastructure.” In its dedicated lineup, HostGator explicitly offers Windows Server (Plesk control panel), which aligns with Windows-first administration habits. From the day-to-day operations angle, we like that HostGator documents how to handle certificates via a free SSL certificate and also walks customers through backups in Backup Manager workflows that match what many small teams can realistically maintain.

    8. Liquid Web: enterprise-grade managed Windows hosting with specialized Microsoft options

    Liquid Web tends to appeal to organizations that want “managed” to mean something tangible: knowledgeable support, stronger operational defaults, and a platform designed for business workloads rather than hobby sites. From our perspective, it fits best when you need Windows but don’t want to staff a full internal infrastructure team to handle routine administration and incident triage. On the product side, Liquid Web’s Windows VPS Hosting framing is a reminder that Windows hosting is often chosen for operational confidence as much as raw compute.

    9. IONOS: budget-oriented Windows hosting with modern Windows Server support and MS SQL options

    IONOS is often shortlisted when cost sensitivity is high but Microsoft stack requirements remain real. In our evaluation approach, the question becomes whether the budget tier still provides the operational basics: patching clarity, backups, and usable tooling for deployment. IONOS highlights features like Daily Backup, which is exactly the sort of operational detail we expect teams to validate early, because backup posture is not something you want to discover during an incident. For Windows applications that need straightforward hosting without bespoke infrastructure, IONOS can be a pragmatic starting point.

    10. Hostwinds: configurable Windows VPS plans with migrations, SSD storage, and uptime guarantees

    Hostwinds is interesting when you want VPS flexibility and a provider that documents operational commitments in a way teams can audit. On the platform side, Hostwinds emphasizes storage and performance primitives like Solid State Drives, which typically matters more for database-backed apps than most teams initially assume. Operationally, migration help reduces switching cost, and Hostwinds describes free migration assistance for managed services in a way that sets expectations about what is included. For risk management, it’s also worth reading any provider’s uptime guarantee carefully, since SLA definitions often differ from what business stakeholders imagine.

    11. AccuWeb Hosting: Windows shared hosting with Plesk, daily backups, and multi-domain support

    AccuWeb Hosting positions its Windows plans around managed operations and platform features that reduce administrator burden. In practice, we see it fit well for small businesses that need Windows hosting features without wanting to build an internal ops playbook from scratch. Backup posture is one of the strongest practical differentiators, and AccuWeb highlights Free Daily Backup as an included feature, which is the kind of promise we recommend validating via a restore drill early in the relationship. For multi-site scenarios, control-panel workflows can also simplify routine tasks like certificates, DNS, and mailbox administration.

    TechTide Solutions: Custom Software Built to Match Your Windows Hosting Requirements

    TechTide Solutions: Custom Software Built to Match Your Windows Hosting Requirements

    At Techtide Solutions, we treat hosting as part of the software design, not an afterthought that starts after development ends. When Windows hosting is the destination, we architect for IIS behavior, SQL Server operational realities, and enterprise identity constraints from the first technical design session.

    1. Building custom web applications aligned with ASP.NET/.NET and Microsoft SQL Server needs

    Custom Windows-hosted applications succeed when the codebase respects the platform’s strengths: structured configuration, predictable process management, and mature data tooling. In our builds, we design for clean separation between web concerns, background work, and database access so that IIS configuration changes do not become code changes. Because SQL Server is often the long-term system of record, we also invest early in schema design, indexing strategy, and migration discipline so that “it works today” does not become “it’s unmaintainable tomorrow.”

    2. Creating tailored integrations with Microsoft services like Active Directory, Exchange, and SharePoint

    Integration is where many Windows-hosted applications either become a seamless part of the organization or remain a disconnected tool nobody trusts. In our projects, we design identity flows that align with corporate policy, then add integration points that reduce duplication—directory-driven user provisioning, mailbox-driven notifications, and content workflows that align with SharePoint governance rather than bypassing it. When those integrations are treated as core architecture, adoption tends to follow naturally because the software behaves like it “belongs” in the environment.

    3. Modernizing legacy Windows-based systems to improve deployment, stability, and maintainability

    Legacy modernization is rarely a single rewrite; it’s usually a sequence of safe, testable moves that reduce risk while improving operations. Our modernization playbook often starts with deployment automation and observability, because you cannot safely change what you cannot reliably release or monitor. Once stability improves, we incrementally refactor: isolating legacy modules, introducing modern APIs, and gradually replacing brittle components until the system becomes easier to maintain without business disruption.

    Conclusion: Matching Windows Hosting to Your Tech Stack, Budget, and Long-Term Goals

    Conclusion: Matching Windows Hosting to Your Tech Stack, Budget, and Long-Term Goals

    Windows hosting is at its best when it is chosen for real requirements—Microsoft runtimes, Microsoft databases, and Microsoft enterprise integrations—not because it feels familiar. From our viewpoint at Techtide Solutions, the “right” provider is the one whose operational discipline matches the business importance of the workload.

    1. Choosing Windows hosting based on real requirements: frameworks, databases, and integrations

    Requirement-driven selection keeps teams honest. If the app depends on IIS behavior, Windows authentication, SQL Server operations, or Microsoft-centric integration patterns, Windows hosting can reduce complexity and accelerate delivery. When those requirements are absent, a simpler hosting model often wins because it reduces cost, reduces operational surface area, and broadens platform portability.

    2. Final checklist: compatibility, security, uptime, support, and the right hosting model for growth

    Before committing, we recommend validating compatibility end-to-end, confirming security responsibilities in writing, and ensuring you can restore from backups under pressure. Next, align your hosting model with growth expectations: shared for modest workloads, VPS for controlled customization, and dedicated when isolation and governance justify the overhead. If you want a practical next step, consider documenting your application’s hard dependencies and asking providers to map exactly how they support them—what would your shortlist look like if every claim had to survive a real incident?