Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Cloud Threat Modeling
Cloud Threat Modeling
Who it's for:
  • Cloud security practitioners who analyze threats, assess system preparedness, or design cloud systems and services
  • CIOs, CISOs, and senior managers
  • Developers and architects

Cloud Threat Modeling

Release Date: 07/29/2021

Working Groups: Top Threats Data Security

Threat modeling serves to identify threats and preventive measures for a system or application. However, threat modeling is one security methodology that has not matched the general rate of cloud adoption, due to a gap in guidance, expertise, and applicability of the practice. Threat modeling for cloud systems expands on standard threat modeling to account for unique cloud services. It allows organizations to further security discussions and assess their security controls and mitigation decisions.

This document from the Top Threats Working Group attempts to bridge the gap between threat modeling and the cloud. To that end, this publication provides crucial guidance to help identify threat modeling security objectives, set the scope of assessments, decompose systems, identify threats, identify design vulnerabilities, develop mitigations and controls, and communicate a call-to-action. Central lessons include the benefits of threat modeling, the unique knowledge and considerations required when threat modeling in the cloud, and how to create a cloud threat model. Example threat modeling cards are provided and can be used by your team for a more gamified approach.

Key Takeaways:
  • The baseline threat modeling processes taken from various standards and best practices 
  • The differences between standard threat modeling and cloud threat modeling
  • How to create a cloud threat model from scratch
  • A basic cloud threat model reference
  • What should be included in a detailed security design report
  • Example cloud threat modeling cards
Download this Resource

Bookmark
Share
View translations
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
How to Audit Your Outdated Security Processes
How to Audit Your Outdated Security Processes
Published: 04/16/2024
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Sealing Pandora's Box - The Urgent Need for Responsible AI Governance
Published: 04/12/2024
Securing Non-Human Identities: Lessons from the Cloudflare Breach
Securing Non-Human Identities: Lessons from the Cloudflare Breach
Published: 04/10/2024
Why Cyber Defenders Should Embrace a Hacker Mindset
Why Cyber Defenders Should Embrace a Hacker Mindset
Published: 04/10/2024

Acknowledgements

Vani Murthy
Vani Murthy
Sr. Information Security Compliance Advisor, Akamai Technologies

Vani Murthy

Sr. Information Security Compliance Advisor, Akamai Technologies

Vani has 20+ years of IT experience in the areas such as Security, Risk, Compliance, Cloud services (IaaS/PaaS/SaaS) architecture

Read more

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

This person does not have a biography listed with CSA.

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook, Principal at Guide Holdings, LLC, has 20 years of experience in Information Security with such organizations as Raytheon, Northrop Grumman, Booz Allen Hamilton, Optiv Security and Symantec. Mr. Brook's work traverses the government, financial, healthcare, gaming, oil and gas and pharmaceutical industries. Mr. Brook obtained a number of industry certifications, including CISSP and CCSK, has patents and trade secrets in...

Read more

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...

Read more

Randall Brooks Headshot Missing
Randall Brooks

Randall Brooks

This person does not have a biography listed with CSA.

Adalberto Valle Headshot Missing
Adalberto Valle

Adalberto Valle

This person does not have a biography listed with CSA.

Nirenj George Headshot Missing
Nirenj George

Nirenj George

This person does not have a biography listed with CSA.

Ken Dunham Headshot Missing
Ken Dunham

Ken Dunham

This person does not have a biography listed with CSA.

Ebudo Osime Headshot Missing
Ebudo Osime

Ebudo Osime

This person does not have a biography listed with CSA.

Fadi Sodah Headshot Missing
Fadi Sodah

Fadi Sodah

This person does not have a biography listed with CSA.

James Bore Headshot Missing
James Bore

James Bore

This person does not have a biography listed with CSA.

Vladi Sandler Headshot Missing
Vladi Sandler

Vladi Sandler

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training