ChaptersEventsBlog

Download Publication

Cloud Threat Modeling
Cloud Threat Modeling
Who it's for:
  • Cloud security practitioners who analyze threats, assess system preparedness, or design cloud systems and services
  • CIOs, CISOs, and senior managers
  • Developers and architects

Cloud Threat Modeling

Release Date: 07/29/2021

Working Group: Top Threats

Threat modeling serves to identify threats and preventive measures for a system or application. However, threat modeling is one security methodology that has not matched the general rate of cloud adoption, due to a gap in guidance, expertise, and applicability of the practice. Threat modeling for cloud systems expands on standard threat modeling to account for unique cloud services. It allows organizations to further security discussions and assess their security controls and mitigation decisions.

This document from the Top Threats Working Group attempts to bridge the gap between threat modeling and the cloud. To that end, this publication provides crucial guidance to help identify threat modeling security objectives, set the scope of assessments, decompose systems, identify threats, identify design vulnerabilities, develop mitigations and controls, and communicate a call-to-action. Central lessons include the benefits of threat modeling, the unique knowledge and considerations required when threat modeling in the cloud, and how to create a cloud threat model. Example threat modeling cards are provided and can be used by your team for a more gamified approach.

Key Takeaways:
  • The baseline threat modeling processes taken from various standards and best practices 
  • The differences between standard threat modeling and cloud threat modeling
  • How to create a cloud threat model from scratch
  • A basic cloud threat model reference
  • What should be included in a detailed security design report
  • Example cloud threat modeling cards
Download this Resource

Bookmark
Share
View translations
Related resources
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
The 99% Solution: MFA for Hypervisor Security
The 99% Solution: MFA for Hypervisor Security
Published: 11/18/2025
SecretPoint: How OneDrive Auto-Sync Turns SharePoint into a Hidden Secrets Vault
SecretPoint: How OneDrive Auto-Sync Turns SharePoint into a Hidden ...
Published: 11/14/2025
How CISOs Can Strengthen AI Threat Prevention: A Strategic Checklist
How CISOs Can Strengthen AI Threat Prevention: A Strategic Checklist
Published: 11/12/2025
Introducing Cognitive Degradation Resilience (CDR): A Framework for Safeguarding Agentic AI Systems from Systemic Collapse
Introducing Cognitive Degradation Resilience (CDR): A Framework for...
Published: 11/10/2025

Interested in helping develop research with CSA?

Related Certificates & Training