diff --git a/opsec/cloud_provider_adversary/index.html b/opsec/cloud_provider_adversary/index.html index 70caa34..2da35c5 100644 --- a/opsec/cloud_provider_adversary/index.html +++ b/opsec/cloud_provider_adversary/index.html @@ -217,16 +217,17 @@ in this post we are going to do a threat modelling exercise:

- -
-
-
- -
-
-
-
+

Conclusion

+ Following her analysis, Alice understands that having a VPS gives her no privacy from her cloud provider. That all of her traffic and data can easily be seen, copied or moved. She updates her risk analysis and changes her organization's SOPS so her team can have an appropriate behavior when using the services she hosts on this platform.

+ +

Organizational mitigations

+ +
    +
  • Use of codewords when discussing operations and people
  • +
  • Use of onion services to protect the anonymity of her teammates when accessing her services
  • +
  • Use of a separate server with higher security requirements for critical data
  • +