ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud Security
Who it's for:
  • Cloud security architects, engineers, analysts, and decision-makers
  • Developers
  • Infrastructure professionals
  • Consultants

Cloud and Compromise (C&C): Gamifying of Cloud Security

Release Date: 07/10/2023

Working Group: Top Threats

CSA’s Top Threats Working Group works to identify the most significant cloud security threats, vulnerabilities, and weaknesses; analyze major incidents; and evaluate and propose the means to mitigate the root causes of those threats. After their Cloud Threat Modeling publication, this guide is the working group’s next step to deepen the guidance on cloud security gamification.

Use this document as your template to conduct a cybersecurity tabletop exercise that familiarizes all participants with the cloud incident response process. Included in the download are instructions on how to play the game, tips and tricks for getting the most out of your tabletop exercise, and game cards to print out.

Key Takeaways:
  • Understand how to build and secure basic cloud architectures 
  • Understand basic security team roles when building a cybersecurity program 
  • Identify and protect key assets with cloud security controls and countermeasures 
  • Protect, detect, and respond to cloud threats and threat indicators
Download this Resource

Bookmark
Share
Related resources
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Implementing CCM: Threat & Vulnerability Management Controls
Implementing CCM: Threat & Vulnerability Management Controls
Published: 11/21/2025
Red Teaming Voice AI: Securing the Next Generation of Conversational Systems
Red Teaming Voice AI: Securing the Next Generation of Conversationa...
Published: 11/20/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025
Reflecting on the 2024 Microsoft Breach
Reflecting on the 2024 Microsoft Breach
Published: 09/15/2025

Interested in helping develop research with CSA?

Related Certificates & Training