ChaptersEventsBlog

Download Publication

Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Who it's for:
  • Cloud Architects
  • AI/ML Engineers
  • Security Engineers
  • Threat Analysts and Risk Assessors
  • DevSecOps and Software Developers
  • CISOs, CIOs, and Compliance Leaders

Cloud Threat Modeling 2025

Release Date: 11/17/2025

This publication provides an updated methodology for identifying and mitigating risks in today’s cloud-first, AI-enabled landscape. Building on the original 2021 edition, this version expands the guidance on threat modeling frameworks. It also introduces AI security principles and modern automation tools. Learn how to integrate secure-by-design principles into your development lifecycle.

This threat modeling guidance aligns with frameworks such as the NIST Secure Software Development Framework and EU AI Act. Get detailed examples and visual tools, including step-by-step threat modeling cards and a full cloud threat model case study. Learn how to build continuous, adaptive models that reflect real-time system changes, enhance resilience, and enable proactive security decisions across complex, distributed environments.

Whether starting from scratch or optimizing mature programs, organizations navigating the evolving intersection of cloud architecture, AI governance, and cyber resilience will find this to be an essential guide.

Key Takeaways:
  • A practical methodology for modern cloud threat modeling
  • The integration of AI risk and automation in security design
  • Framework comparison and selection guidance
  • Step-by-step examples and maturity metrics for continuous improvement
Download this Resource

Bookmark
Share
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud ...
How Generative AI is Reshaping Zero Trust Security
How Generative AI is Reshaping Zero Trust Security
Published: 01/09/2026
Introducing the AI Maturity Model for Cybersecurity
Introducing the AI Maturity Model for Cybersecurity
Published: 01/08/2026
AWS Ends SSE-C Encryption, and a Ransomware Vector
AWS Ends SSE-C Encryption, and a Ransomware Vector
Published: 01/05/2026
Closing the Cloud Forensics and Incident Response Skills Gap
Closing the Cloud Forensics and Incident Response Skills Gap
Published: 12/16/2025

Interested in helping develop research with CSA?

Related Certificates & Training