From 07eddeb04fa2b1cf786da322591a582ea97e4430 Mon Sep 17 00:00:00 2001 From: midas Date: Thu, 23 Jan 2025 17:30:58 +0100 Subject: [PATCH] add image entry --- opsec/cloud_provider_adversary/index.html | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/opsec/cloud_provider_adversary/index.html b/opsec/cloud_provider_adversary/index.html index 306efba..2cc9e43 100644 --- a/opsec/cloud_provider_adversary/index.html +++ b/opsec/cloud_provider_adversary/index.html @@ -82,6 +82,11 @@ in this post we are going to do a threat modelling exercise:

  • Attack Scenarii: a quick list of possible attacks
  • Mitigation measures: what we can do to make those attack uneconomical, harder
  • + +

    + Let's start with an image to visualize exactly what the trust and security boundaries are in such a setup + +