Publication Coming Soon

Cloud Threat Modeling
Cloud Threat Modeling

Cloud Threat Modeling

The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security decisions. To that end, this resource provides crucial guidance to help identify threat modeling security objectives, set the scope of assessments, decompose systems/applications, identify & rate threats, identify vulnerabilities in the system design, design and prioritize mitigations & controls, communicate/report and call-to-action. 

Coming Soon!

This research document is still being finalized. Fill out the following form and we’ll send you the final document once it is released.

CSA is a community driven organization. We would like to send you updates about our ongoing initiatives and opportunities to participate.

By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).