Publication Peer Review

Cloud Threat Modeling 2025
Open Until: 09/19/2025
The purpose of this document is to enable and encourage effective threat modeling for cloud applications, services, and security decisions. It offers practical guidance to help define security objectives, scope assessments, decompose systems and applications, identify and rate threats and vulnerabilities, prioritize mitigations and controls, and communicate findings. This resource supports embedding threat modeling into the SDLC and fosters a culture of proactive, cloud-native risk management.
Contribute to Peer Review
Peer Review AgreementBy participating in this peer review, you acknowledge and agree to the following:
- Your name will be included as a reviewer only if you provide substantive feedback (e.g., content, clarity, accuracy). Feedback limited to grammar, syntax, or formatting will not qualify for acknowledgement.
- CSA's authors will have final descretion over which suggestions are incorporated into the document. Not all feedback will be implemented.
- You will not plagiarize or submit unmodified AI-generated text. If using AI-generated content, you must apply your expertise to refine, reformat, or integrate it meaningfully into the document.
Open Until: 09/19/2025