This document discusses threats and risks associated with cloud computing. It begins by defining cloud computing models and architectures. It then provides a detailed threat model identifying over 50 specific risks in areas such as resource exhaustion, data leakage, encryption issues, network attacks, hypervisor vulnerabilities, lack of access control and more. It emphasizes that cloud computing introduces new security challenges due to reduced control, shared infrastructure vulnerabilities and the immaturity of cloud security practices. The document provides resources for further information on cloud security standards and best practices.