Threat modeling

Threat modeling seek to identify, communicate, document, and understand threats and mitigations within the context of protecting the business assets. Part of threat modeling therefore would involve discovering potential security vulnerabilities. Security vulnerabilities are normally identified by performing security vulnerability scans in the target environment (s). 
 Compare and contrast  the process/steps of threat modeling/vulnerability scanning in the following cloud service providers’ environments: