Download Publication
Who it's for:
- Cloud security practitioners who analyze threats, assess system preparedness, or design cloud systems and services
- CIOs, CISOs, and senior managers
- Developers and architects
Cloud Threat Modeling
Release Date: 07/29/2021
Working Groups: Top Threats Data Security
- The baseline threat modeling processes taken from various standards and best practices
- The differences between standard threat modeling and cloud threat modeling
- How to create a cloud threat model from scratch
- A basic cloud threat model reference
- What should be included in a detailed security design report
- Example cloud threat modeling cards
Download this Resource
Acknowledgements
Michael Roza
Head of Risk, Audit, Control and Compliance
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
Vani Murthy
Sr. Information Security Compliance Advisor, Akamai Technologies
Vani has 20+ years of IT experience in the areas such as Security, Risk, Compliance, Cloud services (IaaS/PaaS/SaaS) architecture
Sean Heide
Technical Research Director, CSA
This person does not have a biography listed with CSA.
Jon-Michael Brook
Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...
Vic Hargrave
Senior Cyber Analyst/Engineer
Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...
Randall Brooks
This person does not have a biography listed with CSA.
Adalberto Valle
This person does not have a biography listed with CSA.
Nirenj George
This person does not have a biography listed with CSA.
Ken Dunham
This person does not have a biography listed with CSA.
Ebudo Osime
This person does not have a biography listed with CSA.
Fadi Sodah
This person does not have a biography listed with CSA.
James Bore
This person does not have a biography listed with CSA.
Vladi Sandler
This person does not have a biography listed with CSA.
John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...