. . "In the case of the Cloud-enabled applications, techniques such as encryption and overlay tools are available to meet significant security accreditation when implemented correctly." . .