Lack of isolation methods
Description
The system do not use isolation methods for running applications.
Impact
Allow the construction of covert communication channel.
Recommendation
- Use dedicated cloud servers rather than VMs or cloud-based containers. - Implement specific isolation strategies, particularly between hosts and the network.
Threat
External attacker with access to the application.
Expected Remediation Time
⏱️ 120 minutes.