ChaptersCircleEventsBlog
Take the Cloud Security & AI Trends Survey for a chance to win a free CCSK token ($445 value) or a CCZT + CCSK training bundle ($1,250 value)!

Download Publication

Cloud Threat Modeling - Japanese Translation
Cloud Threat Modeling - Japanese Translation

Cloud Threat Modeling - Japanese Translation

Release Date: 11/01/2021

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.

Threat modeling serves to identify threats and preventive measures for a system or application. However, threat modeling is one security methodology that has not matched the general rate of cloud adoption, due to a gap in guidance, expertise, and applicability of the practice. Threat modeling for cloud systems expands on standard threat modeling to account for unique cloud services. It allows organizations to further security discussions and assess their security controls and mitigation decisions.

この出版物の翻訳版は、CSA日本支部とボランティアによって原本から作成されましたが、翻訳されたコンテンツはCSA Research Lifecycleの範囲外です。質問やフィードバックについては、research@cloudsecurityalliance.orgにお問い合わせください。

脅威モデリングは、システムまたはアプリケーションの脅威と予防策を特定するのに役立ちます。しかしながら、クラウドシステムにおける脅威モデリングが軽視されている主な要因は、ガイダンス、専門知識、プラクティスの適用性にギャップがあることです。クラウドシステムの脅威モデリングは、クラウドサービスを説明するために標準の脅威モデリングを拡張しています。 これにより、組織はセキュリティに関する議論をさらに進め、セキュリティ管理と緩和策の決定を評価できます。

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
State of SaaS Security Report 2025
State of SaaS Security Report 2025
Zero Trust Privacy Assessment and Guidance - Japanese Translation
Zero Trust Privacy Assessment and Guidance - Ja...
CSA Code of Conduct to EU Cloud Code of Conduct Mapping
CSA Code of Conduct to EU Cloud Code of Conduct...
Exploring the Complex Relationship Between Privacy and Cybersecurity
Exploring the Complex Relationship Between Privacy and Cybersecurity
Published: 05/23/2025
Taking the Pressure Off Employees When Protecting the Organization from Phishing Campaigns
Taking the Pressure Off Employees When Protecting the Organization ...
Published: 05/23/2025
The Rising Threat of Consent Phishing: How OAuth Abuse Bypasses MFA
The Rising Threat of Consent Phishing: How OAuth Abuse Bypasses MFA
Published: 05/20/2025
CISO's Guide for Defending against the Top 8 Cyber Threats in 2025
CISO's Guide for Defending against the Top 8 Cyber Threats in 2025
Published: 05/19/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training