diff --git a/opsec/cloud_provider_adversary/index.html b/opsec/cloud_provider_adversary/index.html index 306efba..2cc9e43 100644 --- a/opsec/cloud_provider_adversary/index.html +++ b/opsec/cloud_provider_adversary/index.html @@ -82,6 +82,11 @@ in this post we are going to do a threat modelling exercise:

  • Attack Scenarii: a quick list of possible attacks
  • Mitigation measures: what we can do to make those attack uneconomical, harder
  • + +

    + Let's start with an image to visualize exactly what the trust and security boundaries are in such a setup + +