A few ways you leak data to your Guest VMs and how to combat them
Add more information about the data leaked to the Guest VM from the Host VM:
Here we will assess, categorize and mitigate potential exposure risks of virtualization (para virtualization) from a LINDDUN threat modeling perspective. First, we'll assess the risks. Then, we'll calculate the potential exposure. Then, we'll find strategies to combat or minimize those exposures where applicable.
Risk:
-
Assess any exposures using the LINDDUN threat modeling perspective -
Note why information can be leaked through nested virtualization -
Describe and explain what will already generally be leaked as a result of any virtualization
Exposure:
-
Organize and categorize according to potential threats and benign data
Mitigation:
-
Attempt to mitigate the risk of exposure in the certain types of information leaked
Primary issue - #252