diff --git a/opsec/cloud_provider_adversary/index.html b/opsec/cloud_provider_adversary/index.html index f167992..d4da2d0 100644 --- a/opsec/cloud_provider_adversary/index.html +++ b/opsec/cloud_provider_adversary/index.html @@ -261,7 +261,10 @@ in this post we are going to do a threat modelling exercise:

Conclusion

- Following her analysis, Alice understands that having a VPS gives her no privacy from her cloud provider. That all of her traffic and data can easily be seen, copied or moved. She updates her risk analysis and changes her organization's SOPS so her team can have an appropriate behavior when using the services she hosts on this platform.

+ Following her analysis, Alice understands that having a VPS gives her no privacy from her cloud provider. That all of her traffic and data can easily be seen, copied or moved. +

+ + A bare-metal server would give her more privacy and better protection from a malicious cloud provider. She can still put in place mitigations measures through her SOPS (standard operating procedures).

Organizational mitigations