You have created a Cloud system to host applications of various users. While releasing the cloud system, you also released the document specifying the consequences of attempts to breach the security system of the cloud to the public.
Which type of security control has been shown in the above example?
- Preventive control
- Deterrent Control
- Corrective Control
- Detective Control