ChaptersCircleEventsBlog
Align cybersecurity controls with evolving regulations and make a real impact in the industry. Join CSA's Regulatory Analysis and Compliance Engineering Working Group!

Download Publication

Agile Data Lake Threat Modeling
Agile Data Lake Threat Modeling

Agile Data Lake Threat Modeling

Release Date: 03/28/2023

As cloud platforms expand further and further into business uses, the need to understand the attack surface to your data becomes much more apparent. With the help from NTT Data and Marymount University, CSA has released our Data Lake threat modeling exercise spreadsheet. In this document, numerous elements of data lakes have been taken into consideration and have been applied a specific threat scenario. Each one of these scenarios has been applied to the STRIDE framework, as well as been provided countermeasures for possible corrections and controls. Lastly, you will be able to see the mapping of each threat scenario to its specific attack library framework.
Download this Resource

Bookmark
Share
Related resources
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
State of SaaS Security Report 2025
State of SaaS Security Report 2025
6 Cloud Security Trends Reshaping Risk and Resilience Strategies
6 Cloud Security Trends Reshaping Risk and Resilience Strategies
Published: 06/20/2025
How to Keep IAM Running in a Multi-Cloud World
How to Keep IAM Running in a Multi-Cloud World
Published: 06/18/2025
ISO 27001 Certification: How to Determine Your Scope
ISO 27001 Certification: How to Determine Your Scope
Published: 06/18/2025
Implementing CCM: Interoperability & Portability Controls
Implementing CCM: Interoperability & Portability Controls
Published: 06/13/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training