ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Who it's for:
  • Cloud Architects
  • AI/ML Engineers
  • Security Engineers
  • Threat Analysts and Risk Assessors
  • DevSecOps and Software Developers
  • CISOs, CIOs, and Compliance Leaders

Cloud Threat Modeling 2025

Release Date: 11/17/2025

This publication provides an updated methodology for identifying and mitigating risks in today’s cloud-first, AI-enabled landscape. Building on the original 2021 edition, this version expands the guidance on threat modeling frameworks. It also introduces AI security principles and modern automation tools. Learn how to integrate secure-by-design principles into your development lifecycle.

This threat modeling guidance aligns with frameworks such as the NIST Secure Software Development Framework and EU AI Act. Get detailed examples and visual tools, including step-by-step threat modeling cards and a full cloud threat model case study. Learn how to build continuous, adaptive models that reflect real-time system changes, enhance resilience, and enable proactive security decisions across complex, distributed environments.

Whether starting from scratch or optimizing mature programs, organizations navigating the evolving intersection of cloud architecture, AI governance, and cyber resilience will find this to be an essential guide.

Key Takeaways:
  • A practical methodology for modern cloud threat modeling
  • The integration of AI risk and automation in security design
  • Framework comparison and selection guidance
  • Step-by-step examples and maturity metrics for continuous improvement
Download this Resource

Bookmark
Share
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud ...
Implementing CCM: Threat & Vulnerability Management Controls
Implementing CCM: Threat & Vulnerability Management Controls
Published: 11/21/2025
Red Teaming Voice AI: Securing the Next Generation of Conversational Systems
Red Teaming Voice AI: Securing the Next Generation of Conversationa...
Published: 11/20/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025
The 99% Solution: MFA for Hypervisor Security
The 99% Solution: MFA for Hypervisor Security
Published: 11/18/2025

Interested in helping develop research with CSA?

Related Certificates & Training