This document provides a cheat sheet of best practices for hardening sandboxes against detection by malware. It lists techniques used by malware to detect sandbox environments, such as checking registry keys, processes, files, and assembly instructions. It also discusses methods used to avoid detection like masking analysis tools, reproducing normal user behavior, and dealing with timing attacks. A number of open source tools are recommended for testing a sandbox's defenses.