diff --git a/opsec/cloud_provider_adversary/diagram.png b/opsec/cloud_provider_adversary/diagram.png new file mode 100644 index 0000000..ed811bd Binary files /dev/null and b/opsec/cloud_provider_adversary/diagram.png differ diff --git a/opsec/cloud_provider_adversary/index.html b/opsec/cloud_provider_adversary/index.html index 4ddbb6c..251e0d4 100644 --- a/opsec/cloud_provider_adversary/index.html +++ b/opsec/cloud_provider_adversary/index.html @@ -85,8 +85,10 @@ in this post we are going to do a threat modelling exercise:



Let's start with an image to visualize exactly what the trust and security boundaries are in such a setup +
+
- +