Figure 2From: Handling compromised components in an IaaS cloud installationOpenStack Compute basic architecture [[6]].Back to article page