Threat modelling serves to identify threats & preventive measures for a system or application. However, threat modelling is one security methodology that has not matched the general rate of cloud adoption, due to a gap in guidance, expertise, & applicability of the practice. Threat modelling for cloud systems expands on standard threat modelling to account for unique cloud services. It allows organizations to further security discussions & assess their security controls and mitigation decisions. The CSA Cloud Threat Modelling best practice attempts to bridge the gap between threat modelling & the cloud. To that end, this publication provides crucial guidance to help identify threat modelling security objectives, set the scope of assessments, decompose systems, identify threats, identify design vulnerabilities, develop mitigations & controls, and communicate a call-to-action. Central lessons include the benefits of threat modelling, the unique knowledge & considerations required when threat modelling in the cloud, & how to create a cloud threat model. Example threat modelling cards are provided and can be used by your team for a more gamified approach. The presentation on "Cloud Threat Modelling" was given by Alexander Stone GETSIN (CISO, RiseUp & Co-chair, Top Threats WG, CSA).A recording of his speech can be viewed at https://www.csaapac.org/csavietnamvsummit2022.html.
------------------------------
Hing-Yan Lee
EVP APAC
Cloud Security Alliance
------------------------------