Slide 12
Slide 12 text
© 2014 Nebula, Inc. All rights reserved.
Cloud
A/ack
Vectors
MiFgaFon
Strategies
API
Endpoints
Service
hardening,
mandatory
access
controls,
code
audits
Web
Dashboard
CSP,
expected
domains,
HTTPS,
HSTS,
allowed
referrers
InformaMon
Leakage
SSL/TLS,
disable
memory
dedup,
randomize
resource
assign
VM
Breakout
Service
hardening,
mandatory
access
controls,
code
audits
Hardware
Sharing
Avoid
bare
metal
instances,
avoid
device
pass-‐through
Default
Images
Secure
and
maintain
default
images
Secondary
AYacks
Least
priv,
mandatory
access
controls,
SSL/TLS,
strong
auth