Fig. 10From: Security governance as a service on the cloudRequirement for validating action has been performedBack to article page