您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。[CSA GCR]:2025-云威胁建模2.0 - 发现报告

2025-云威胁建模2.0

信息技术2025-11-26CSA GCRD***
AI智能总结
查看更多
2025-云威胁建模2.0

Acknowledgments Lead Authors Reviewers Srija Reddy AllamVictor ChinRob DoyonAnkit GuptaSachindra NarayanNikunj NagaliaNelson Augusto Pillajo Casillas Vic HargraveMichael RozaJon-Michael C. BrookAlexander Stone GetsinGustavo Arreaza Contributors Ann IzraChinaza Obidike CSA Global Staff Hillary BaronAlex Kaluza Graphic Design Stephen LumpeStephen Smith Table of Contents Acknowledgments...............................................................................................................................................3Table of Contents................................................................................................................................................4Introduction..........................................................................................................................................................6Purpose................................................................................................................................................................ 7Target Audience.................................................................................................................................................. 7Key Takeaways..................................................................................................................................................... 7Threat Modeling Frameworks............................................................................................................................8General-Purpose Frameworks................................................................................................................... 9AI-Specific Frameworks.............................................................................................................................. 9Examples of Frameworks........................................................................................................................... 10Framework Selection Guidance................................................................................................................12Integration with the Secure Development Lifecycle (SDL)................................................................. 12Compliance and Regulatory Alignment................................................................................................... 13Core Threat Modeling Activities......................................................................................................................14Cloud Threat Modeling.................................................................................................................................... 22Cloud Orientation...................................................................................................................................... 22Is the Purpose of Cloud Threat Modeling Different?........................................................................... 22Are the Model Components of Cloud Threat Modeling Different?................................................... 23 Appendix 1: Threat Modeling Reporting Guidance....................................................................................... 51Appendix 2: Metrics and Maturity Models for Cloud Threat Modeling.................................................... 52Key Performance Metrics (KPIs)..............................................................................................................52Cloud Threat Modeling Maturity Model................................................................................................. 53 Introduction Businesses everywhere embraced cloud technologies, paving the way for new business models andaccelerating innovation. Artificial intelligence (AI) innovation contributes to the challenges andopportunities of navigating evolving security threats while adopting diverse cloud offerings. At the same Securing system design early helps identify vulnerabilities and attack vectors before they can beexploited, enabling proactive risk management. This effort supports feature prioritization and targetedsecurity investments.Threat modelingis widely recognized as a cornerstone of secure software Threat modeling is a structured approach to identifying and evaluating potential security threats to asystem, application, or process. It enables organizations to proactively mitigate risks and strengthen their Security practices, including threat modeling, were primarily developed for static, on-premises systems.Yet the rapid adoption of cloud computing and AI has introduced architectural changes, dynamicbehaviors, and attack surfaces that these legacy approaches do not fully address. As a result, existing AI systems introduce new threat vectors, such as adversarial inputs, model theft, data poisoning, andinference leakage, that are not typically covered in conventional threat models. In cloud-hosted AIenvironments, these threats may arise through compromised storage feeding tra