Download Publication

Who it's for:
- Cloud security architects, engineers, analysts, and decision-makers
- Developers
- Infrastructure professionals
- Consultants
Cloud and Compromise (C&C): Gamifying of Cloud Security
Release Date: 07/10/2023
Working Group: Top Threats
CSA’s Top Threats Working Group works to identify the most significant cloud security threats, vulnerabilities, and weaknesses; analyze major incidents; and evaluate and propose the means to mitigate the root causes of those threats. After their Cloud Threat Modeling publication, this guide is the working group’s next step to deepen the guidance on cloud security gamification.
Use this document as your template to conduct a cybersecurity tabletop exercise that familiarizes all participants with the cloud incident response process. Included in the download are instructions on how to play the game, tips and tricks for getting the most out of your tabletop exercise, and game cards to print out.
Key Takeaways:
- Understand how to build and secure basic cloud architectures
- Understand basic security team roles when building a cybersecurity program
- Identify and protect key assets with cloud security controls and countermeasures
- Protect, detect, and respond to cloud threats and threat indicators
Download this Resource
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training

CSA's Cloud Infrastructure Security training provides a high-level introduction to the most critical cloud security topics through virtual self-paced courses. Each Cloud Infrastructure Security training focuses on a specific area of cloud computing, and is design to be succinct, taking one-hour to complete.
Learn more
Learn more


.jpeg)
.jpeg)
