CSA’s Top Threats Working Group works to identify the most significant cloud security threats, vulnerabilities, and weaknesses; analyze major incidents; and evaluate and propose the means to mitigate the root causes of those threats. After their Cloud Threat Modeling publication, this guide is the working group’s next step to deepen the guidance on cloud security gamification.
Use this document as your template to conduct a cybersecurity tabletop exercise that familiarizes all participants with the cloud incident response process. Included in the download are instructions on how to play the game, tips and tricks for getting the most out of your tabletop exercise, and game cards to print out.
Key Takeaways:
- Understand how to build and secure basic cloud architectures
- Understand basic security team roles when building a cybersecurity program
- Identify and protect key assets with cloud security controls and countermeasures
- Protect, detect, and respond to cloud threats and threat indicators
Download this Resource
Best For:
- Cloud security architects, engineers, analysts, and decision-makers
- Developers
- Infrastructure professionals
- Consultants





