Shared Security

Taking a Closer Look at the All-New

Shared Security Responsibility Model

Taking a Closer Look at the Shared Security Responsibility Model

According to Gartner most organizations will use multiple public and private cloud services as well as traditional applications and infrastructure.

We have asked more than 300 C-level and IT decision makers also confirms the following:

  • Cloud management strategy remains a priority and a challenge
  • The hybrid approach is popular strategy for tackling the cloud.

Traditional Perimeters are Disappearing

The rise of both multi-cloud and hybrid environments means that enterprise workloads and the data that goes with them are increasingly becoming distributed among varying environments in order to improve business agility and reduce costs.

The traditional perimeters are disappearing and attack surfaces are growing as organizations use a combination of public and private cloud services.


Who’s responsible for what?

Working out who’s responsible for what across these various environments as well as managing how security teams stay on top of securing their cloud environments in the shared responsibilities model, is a growing business problem.

We’ll broach the consequences of this situation in the second part of our series, “The Impact of Cloud Security Gaps and How Managed Security Services can help”.

Microsoft, one of the largest cloud providers in the business environment, has laid out the responsibilities between the customer and the cloud provider as they see it. In the shared responsibility model, the cloud provider is responsible for “security of the cloud” and the customer is responsible for “security in the cloud”.

Shared responsibility
Fig. 1: Shared Responsibility in the Cloud, source: Microsoft

Below is another example of how AWS views responsibility in the cloud. AWS has actually written their Shared Responsibility Model on their web site and the graphic below summarizes how they categorize who is responsible for which aspects of cloud security.

amazon securtiy
Fig. 2: Amazon Security Model

What should the cloud customer know?

From a customer perspective, the cloud customer needs to protect their company’s data, applications, identities, hosts, endpoints, devices and parts of network infrastructure. The cloud customer is adding protection on top of the built-in security controls the cloud provider has already provided. In the shared security model, the customer needs to prioritize and implement security controls above the secure foundation provided by the cloud provider.

As organizations continue to shift their workloads to the cloud, they need to keep pace with scale and ensure security and compliance of their cloud environments.

What does the shared security model mean for you?

The shared security model means that the cloud provider has built-in security controls, you are building on that security foundation by implementing security controls to protect your cloud environments in the cloud.

Choose a security vendor that addresses multiple aspects of your security controls and choose a partner that can help you address the priorities for security and compliance and close the skills gaps by helping augment your internal security teams.

Be sure to visit back for Part 2 of Shared Responsibility in the Cloud series covering why organizations are adopting managed security services to close the skills gaps.

Looking for Support on Cloud Security?

Visit SoftwareONE Security Services for more information.

Get all facts about our security services

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Blog Editorial Team

Trend Scouts

IT Trends and industry-relevant novelties

Related Articles

windows-7-extended-support

Windows 7 Extended Support: Now Is the Time to Take Action!

Microsoft ended support for Windows 7. Find out which far-reaching impact this will have on your environment.

how-to-improve-consistency-with-devops-and-automated-patch-management

How to Improve Consistency with DevOps & Automated Patch Management

IT teams face compliance and budget challenges when handling access and user rights. DevOps services can help them rise to those challenges with better overall efficiency.

Be Prepared: Security Trends To Watch Out for in 2020

5 Key Strategies for Creating a Cyber Awareness Program

A strong cyber-security posture goes well beyond the security team. Let’s take a closer look at the five key strategies for creating a cyber awareness program.