For the model, the security boundary may be defined for thevendor to include the software framework and middleware layer. A. saas B. paas C. iaas D. all of the mentioned
For the model, the security boundary may be defined for thevendor to include the software framework and middleware layer. A. saas B. paas C. iaas D. all of the mentioned
Share