logo

Database

Description

The system do not use isolation methods for running applications.

Impact

Allow the construction of covert communication channel.

Recommendation

- Use dedicated cloud servers rather than VMs or cloud-based containers. - Implement specific isolation strategies, particularly between hosts and the network.

Threat

External attacker with access to the application.

Expected Remediation Time

⏱️ 120 minutes.