this could also be accompanied by increasing the nature and scope of artifacts presented inside of a equipment-readable format, together with control inheritance artifacts. this method for evaluating and documenting the security of cloud computing solutions and services is actually a shared accountability concerning the company as well as CSP. La