Implementation -> Infrastructure Hardening: Virtual environments are limited
Risk and Opportunity
Risk: Denial of service (internally by an attacker or unintentionally by a bug) on one service effects other services
Opportunity: All virtual environments are using resource limits on hard disks, memory and CPU
Exploit details
Usefullness: Medium
Required knowledge: Low (one discipline)
Required time: Low
Required resources (systems): Medium
Additional Information
Dependencies: Applications are running in virtualized environments
OWASP SAMM 2 Mapping: o-environment-management|A|1
ISO27001:2017 Controls Mapping:
- virtual environments are not explicitly covered by ISO 27001 - too specific
- 12.1.3
- 13.1.3
- 17.2.1