Figure 1From: Handling compromised components in an IaaS cloud installation Lab setup. Back to article page