Published Projects

Threat-Informed Defense for Cloud Security

Project Summary

Use our latest mappings to replace assumption-driven cloud defense with evidence-based decisions to stop cloud adversaries in their tracks. With this latest research, you will turn cloud security from a checklist exercise into a threat-informed discipline grounded in real attacks.

The CSA CCM mappings are part of our Mappings Explorer program. Use the Mappings Explorer website to navigate, explore, search, and download our mappings of security capabilities to MITRE ATT&CK®.

Problem

Threats to cloud computing span multiple security domains, objectives, and layers of cloud technology, making it difficult for organizations to implement effective security controls

Solution

Establish a threat-informed technical foundation that connects cloud-native security capabilities to the adversary behaviors they are designed to mitigate

Impact

Defenders apply threat-based approaches to cloud security, control implementation, and security assessments, making defensible decisions grounded in real-world attacks


Funding Research Participants



Non-Profit Participants


Explore More of Our Work:

Threat-Informed Defense for Cloud Security

Use our latest mappings to replace assumption-driven cloud defense with evidence-based decisions to stop cloud adversaries in their tracks. With …

Continue reading

INFORM Your Defense

MITRE INFORM is a program-level assessment designed to show how threat-informed your organization is and where to improve next across cyber …

Continue reading

Attack Flow v3

With Attack Flow, you will capture the entire attack and communicate what matters!

Continue reading

Stay Informed

Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.