ChaptersEventsBlog
Register now for the December 10 session on redefining cloud security in the era of AI and automation.

Download Publication

Cloud Threat Modeling
Cloud Threat Modeling
Who it's for:
  • Cloud security practitioners who analyze threats, assess system preparedness, or design cloud systems and services
  • CIOs, CISOs, and senior managers
  • Developers and architects

Cloud Threat Modeling

Release Date: 07/29/2021

Working Group: Top Threats

Threat modeling serves to identify threats and preventive measures for a system or application. However, threat modeling is one security methodology that has not matched the general rate of cloud adoption, due to a gap in guidance, expertise, and applicability of the practice. Threat modeling for cloud systems expands on standard threat modeling to account for unique cloud services. It allows organizations to further security discussions and assess their security controls and mitigation decisions.

This document from the Top Threats Working Group attempts to bridge the gap between threat modeling and the cloud. To that end, this publication provides crucial guidance to help identify threat modeling security objectives, set the scope of assessments, decompose systems, identify threats, identify design vulnerabilities, develop mitigations and controls, and communicate a call-to-action. Central lessons include the benefits of threat modeling, the unique knowledge and considerations required when threat modeling in the cloud, and how to create a cloud threat model. Example threat modeling cards are provided and can be used by your team for a more gamified approach.

Key Takeaways:
  • The baseline threat modeling processes taken from various standards and best practices 
  • The differences between standard threat modeling and cloud threat modeling
  • How to create a cloud threat model from scratch
  • A basic cloud threat model reference
  • What should be included in a detailed security design report
  • Example cloud threat modeling cards
Download this Resource

Bookmark
Share
View translations
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
RansomHub Is Gone—But Their ESXi Ransomware Tactics Still Threaten Virtual Infrastructure
RansomHub Is Gone—But Their ESXi Ransomware Tactics Still Threaten ...
Published: 12/09/2025
Microsoft Entra ID Vulnerability: The Discovery That Shook Identity Security
Microsoft Entra ID Vulnerability: The Discovery That Shook Identity...
Published: 12/08/2025
It's Time to Rethink Cloud Investigations
It's Time to Rethink Cloud Investigations
Published: 12/02/2025
The Layoff Aftershock No One Talks About: The NHIs Left Behind
The Layoff Aftershock No One Talks About: The NHIs Left Behind
Published: 11/26/2025

Interested in helping develop research with CSA?

Related Certificates & Training