Circle
Events
Blog

Download Publication

Cloud Threat Modeling
Cloud Threat Modeling
Who it's for:
  • Cloud security practitioners who analyze threats, assess system preparedness, or design cloud systems and services
  • CIOs, CISOs, and senior managers
  • Developers and architects

Cloud Threat Modeling

Release Date: 07/29/2021

Working Group: Top Threats

Threat modeling serves to identify threats and preventive measures for a system or application. However, threat modeling is one security methodology that has not matched the general rate of cloud adoption, due to a gap in guidance, expertise, and applicability of the practice. Threat modeling for cloud systems expands on standard threat modeling to account for unique cloud services. It allows organizations to further security discussions and assess their security controls and mitigation decisions.

This document from the Top Threats Working Group attempts to bridge the gap between threat modeling and the cloud. To that end, this publication provides crucial guidance to help identify threat modeling security objectives, set the scope of assessments, decompose systems, identify threats, identify design vulnerabilities, develop mitigations and controls, and communicate a call-to-action. Central lessons include the benefits of threat modeling, the unique knowledge and considerations required when threat modeling in the cloud, and how to create a cloud threat model. Example threat modeling cards are provided and can be used by your team for a more gamified approach.

Key Takeaways:
  • The baseline threat modeling processes taken from various standards and best practices 
  • The differences between standard threat modeling and cloud threat modeling
  • How to create a cloud threat model from scratch
  • A basic cloud threat model reference
  • What should be included in a detailed security design report
  • Example cloud threat modeling cards

Download this Resource

LoginCreate Account

Prefer to access this resource without an account? Download it now.

Acknowledgements

Vani Murthy Headshot
Vani Murthy
Senior advisor Security & Compliance at Akamai Technologies

Vani Murthy

Senior advisor Security & Compliance at Akamai Technologies

Vani has 20+ years of IT experience in the areas such as Security, Risk, Compliance, Cloud services (IaaS/PaaS/SaaS) architecture

Read more

Michael Roza Headshot
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 85 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud Key M...

Read more

John Yeoh Headshot
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Sean Heide Headshot
Sean Heide
Research Analyst, CSA

Sean Heide

Research Analyst, CSA

This person does not have a biography listed with CSA.

Jon-Michael Brook Headshot
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook, Principal at Guide Holdings, LLC, has 20 years of experience in Information Security with such organizations as Raytheon, Northrop Grumman, Booz Allen Hamilton, Optiv Security and Symantec. Mr. Brook's work traverses the government, financial, healthcare, gaming, oil and gas and pharmaceutical industries. Mr. Brook obtained a number of industry certifications, including CISSP and CCSK, has patents and trade secrets in...

Read more

Vic Hargrave Headshot
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

This person does not have a biography listed with CSA.

Randall Brooks Headshot Missing
Randall Brooks

Randall Brooks

This person does not have a biography listed with CSA.

Adalberto Valle Headshot Missing
Adalberto Valle

Adalberto Valle

This person does not have a biography listed with CSA.

Nirenj George Headshot Missing
Nirenj George

Nirenj George

This person does not have a biography listed with CSA.

Ken Dunham Headshot Missing
Ken Dunham

Ken Dunham

This person does not have a biography listed with CSA.

Ebudo Osime Headshot Missing
Ebudo Osime

Ebudo Osime

This person does not have a biography listed with CSA.

Fadi Sodah Headshot Missing
Fadi Sodah

Fadi Sodah

This person does not have a biography listed with CSA.

James Bore Headshot Missing
James Bore

James Bore

This person does not have a biography listed with CSA.

Vladi Sandler Headshot Missing
Vladi Sandler

Vladi Sandler

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?