Cloud Security Threat Review

Project/System Name Date Reviewer(s)

1. Overview

Description

2. Identified Threats

Threat Name Description Likelihood Impact

3. Risk Assessment

Summary

4. Mitigation Strategies

Threat Mitigation Measures Status

5. Additional Notes