ChaptersEventsBlog
Register now for NHIcon 2026, a half-day online event, to learn what the future of AI security requires.

Download Publication

Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Who it's for:
  • Cloud Architects
  • AI/ML Engineers
  • Security Engineers
  • Threat Analysts and Risk Assessors
  • DevSecOps and Software Developers
  • CISOs, CIOs, and Compliance Leaders

Cloud Threat Modeling 2025

Release Date: 11/17/2025

This publication provides an updated methodology for identifying and mitigating risks in today’s cloud-first, AI-enabled landscape. Building on the original 2021 edition, this version expands the guidance on threat modeling frameworks. It also introduces AI security principles and modern automation tools. Learn how to integrate secure-by-design principles into your development lifecycle.

This threat modeling guidance aligns with frameworks such as the NIST Secure Software Development Framework and EU AI Act. Get detailed examples and visual tools, including step-by-step threat modeling cards and a full cloud threat model case study. Learn how to build continuous, adaptive models that reflect real-time system changes, enhance resilience, and enable proactive security decisions across complex, distributed environments.

Whether starting from scratch or optimizing mature programs, organizations navigating the evolving intersection of cloud architecture, AI governance, and cyber resilience will find this to be an essential guide.

Key Takeaways:
  • A practical methodology for modern cloud threat modeling
  • The integration of AI risk and automation in security design
  • Framework comparison and selection guidance
  • Step-by-step examples and maturity metrics for continuous improvement
Download this Resource

Bookmark
Share
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud ...
RansomHub Is Gone—But Their ESXi Ransomware Tactics Still Threaten Virtual Infrastructure
RansomHub Is Gone—But Their ESXi Ransomware Tactics Still Threaten ...
Published: 12/09/2025
Microsoft Entra ID Vulnerability: The Discovery That Shook Identity Security
Microsoft Entra ID Vulnerability: The Discovery That Shook Identity...
Published: 12/08/2025
It's Time to Rethink Cloud Investigations
It's Time to Rethink Cloud Investigations
Published: 12/02/2025
The Layoff Aftershock No One Talks About: The NHIs Left Behind
The Layoff Aftershock No One Talks About: The NHIs Left Behind
Published: 11/26/2025

Interested in helping develop research with CSA?

Related Certificates & Training