Add more information about the data leaked to the Guest VM from the Host VM:
Here we will assess, categorize and mitigate potential exposure risks of virtualization (para virtualization) from a LINDDUN threat modeling perspective. First, we'll assess the risks. Then, we'll calculate the potential exposure. Then, we'll find strategies to combat or minimize those exposures where applicable.
Risk:
[ ] Assess any exposures using the LINDDUN threat modeling perspective
[ ] Note why information can be leaked through nested virtualization
[ ] Describe and explain what will already generally be leaked as a result of any virtualization
Exposure:
[ ] Organize and categorize according to potential threats and benign data
Mitigation:
[ ] Attempt to mitigate the risk of exposure in the certain types of information leaked
Add more information about the data leaked to the Guest VM from the Host VM:
Here we will assess, categorize and mitigate potential exposure risks of virtualization (para virtualization) from a LINDDUN threat modeling perspective. First, we'll assess the risks. Then, we'll calculate the potential exposure. Then, we'll find strategies to combat or minimize those exposures where applicable.
Risk:
Exposure:
Mitigation:
Primary issue - #252