Shared Security

Taking a Closer Look at the All-New

Shared Security Responsibility Model

Taking a Closer Look at the Shared Security Responsibility Model

According to Gartner most organizations will use multiple public and private cloud services as well as traditional applications and infrastructure.

We have asked more than 300 C-level and IT decision makers also confirms the following:

  • Cloud management strategy remains a priority and a challenge
  • The hybrid approach is popular strategy for tackling the cloud.

Traditional Perimeters are Disappearing

The rise of both multi-cloud and hybrid environments means that enterprise workloads and the data that goes with them are increasingly becoming distributed among varying environments in order to improve business agility and reduce costs.

The traditional perimeters are disappearing and attack surfaces are growing as organizations use a combination of public and private cloud services.


Who’s responsible for what?

Working out who’s responsible for what across these various environments as well as managing how security teams stay on top of securing their cloud environments in the shared responsibilities model, is a growing business problem.

We’ll broach the consequences of this situation in the second part of our series, “The Impact of Cloud Security Gaps and How Managed Security Services can help”.

Microsoft, one of the largest cloud providers in the business environment, has laid out the responsibilities between the customer and the cloud provider as they see it. In the shared responsibility model, the cloud provider is responsible for “security of the cloud” and the customer is responsible for “security in the cloud”.

Shared responsibility
Fig. 1: Shared Responsibility in the Cloud, source: Microsoft

Below is another example of how AWS views responsibility in the cloud. AWS has actually written their Shared Responsibility Model on their web site and the graphic below summarizes how they categorize who is responsible for which aspects of cloud security.

amazon securtiy
Fig. 2: Amazon Security Model

What should the cloud customer know?

From a customer perspective, the cloud customer needs to protect their company’s data, applications, identities, hosts, endpoints, devices and parts of network infrastructure. The cloud customer is adding protection on top of the built-in security controls the cloud provider has already provided. In the shared security model, the customer needs to prioritize and implement security controls above the secure foundation provided by the cloud provider.

As organizations continue to shift their workloads to the cloud, they need to keep pace with scale and ensure security and compliance of their cloud environments.

What does the shared security model mean for you?

The shared security model means that the cloud provider has built-in security controls, you are building on that security foundation by implementing security controls to protect your cloud environments in the cloud.

Choose a security vendor that addresses multiple aspects of your security controls and choose a partner that can help you address the priorities for security and compliance and close the skills gaps by helping augment your internal security teams.

Be sure to visit back for Part 2 of Shared Responsibility in the Cloud series covering why organizations are adopting managed security services to close the skills gaps.

Looking for Support on Cloud Security?

Visit SoftwareONE Security Services for more information.

Get all facts about our security services

Прокомментировать статью

Напишите, пожалуйста, ваше мнение по поводу данной статьи!

Комментировать

Автор

Команда редакции блога

Трендовые скауты

ИТ-тренды и актуальные новинки

Related Articles

Cyber Security Update August / September 2020

Cyber Security Update - August/September 2020

Data breaches like these show that one single breach can not only irreparably damage the firm’s brand, but also jeopardize clients’ names and operations. Read more about recent attacks.

securing-your-workforce-with-microsoft-atp-and-a-soc
  • 01 сентября 2020
  • Bala Sethunathan
  • Управляемые сервисы по безопасности

Securing Workforces with ATP & SOC

Microsoft ATP promises cutting-edge security to remote workforces – but your workforce should still invest in a SOC to stay secure. Here’s why.

bridging-the-it-skills-gap

Bridging the IT Skills Gap: How to Keep Up with the Market and Stay Efficient

The IT skills gap is widening and your organization must know how to keep up. Learn more about how to stay efficient while bridging the IT skills gap.