Figure 6From: Handling compromised components in an IaaS cloud installation Stopping the compute service at the compromised host. Back to article page