diff --git a/opsec/cloud_provider_adversary/diagram.png b/opsec/cloud_provider_adversary/diagram.png
new file mode 100644
index 0000000..ed811bd
Binary files /dev/null and b/opsec/cloud_provider_adversary/diagram.png differ
diff --git a/opsec/cloud_provider_adversary/index.html b/opsec/cloud_provider_adversary/index.html
index 4ddbb6c..251e0d4 100644
--- a/opsec/cloud_provider_adversary/index.html
+++ b/opsec/cloud_provider_adversary/index.html
@@ -85,8 +85,10 @@ in this post we are going to do a threat modelling exercise:
Let's start with an image to visualize exactly what the trust and security boundaries are in such a setup
+
+
-
+