Skip to content

A few ways you leak data to your Guest VMs and how to combat them

Add more information about the data leaked to the Guest VM from the Host VM:

Here we will assess, categorize and mitigate potential exposure risks of virtualization (para virtualization) from a LINDDUN threat modeling perspective. First, we'll assess the risks. Then, we'll calculate the potential exposure. Then, we'll find strategies to combat or minimize those exposures where applicable.

Risk:

  • Assess any exposures using the LINDDUN threat modeling perspective
  • Note why information can be leaked through nested virtualization
  • Describe and explain what will already generally be leaked as a result of any virtualization

Exposure:

  • Organize and categorize according to potential threats and benign data

Mitigation:

  • Attempt to mitigate the risk of exposure in the certain types of information leaked

Primary issue - #252

Merge request reports