1. Threat Modeling Approaches for Securing Cloud Computin
2. Cloud, A. W. S., & Whitepaper, A. W. S. (2021). Web Application Hosting in the AWS Cloud. AWS Whitepaper. https://docs.aws.amazon.com/whitepapers/latest/web-application-hosting-best-practices/an-aws-cloud-architecture-for-web-hosting.html
3. Cloud Security Alliance – Top Threats Working Group. (2022). Top Threats to Cloud Computing. Cloud Security Alliance. https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-pandemic-eleven/
4. Hewko Alex. (2021). STRIDE Threat Modeling: What You Need to Know. Software Secured. https://www.softwaresecured.com/stride-threat-modeling/
5. Security Compass. (2022). How to Best Threat Model Cloud-Native Applications. Security Compass. https://www.securitycompass.com/blog/threat-modeling-cloud-native-applications/