Cloud Security Threat Review
Project/System Name
Date
Reviewer(s)
1. Overview
Description
2. Identified Threats
Threat Name
Description
Likelihood
Impact
3. Risk Assessment
Summary
4. Mitigation Strategies
Threat
Mitigation Measures
Status
5. Additional Notes