From 02a0d6b3c0250bda20499a27ee61a9038847fe23 Mon Sep 17 00:00:00 2001 From: midas Date: Wed, 29 Jan 2025 18:31:18 +0100 Subject: [PATCH] formatting fixes --- opsec/cloud_provider_adversary/index.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/opsec/cloud_provider_adversary/index.html b/opsec/cloud_provider_adversary/index.html index 251e0d4..8a8c3cf 100644 --- a/opsec/cloud_provider_adversary/index.html +++ b/opsec/cloud_provider_adversary/index.html @@ -60,7 +60,7 @@
- Previous Page

Mulligan Security - 21 / 01 / 2025

+ Previous Page

Mulligan Security - 21 / 01 / 2025

How safe am I from my cloud provider?

@@ -140,7 +140,7 @@ in this post we are going to do a threat modelling exercise:

-

Alice's threat model

+

Alice's threat model

Alice is very happy with her new deployment. The platform runs great and her team has started using it in earnest. Still, the bond of implicit trust that now exists between her and Bob bothers here. She decides to do a quick threat modelling exercise to calm her mind: instead of wondering about whatifs, she is going to identify the risks associated with her current setup and find ways to mitigate them.

Threats to Confidentiality