Skip to content

Chapter 2 — Shared Responsibility Model

Cloud providers are responsible for the security of the cloud:

  • Data center security: Physical access controls, surveillance, guards
  • Environmental controls: Power redundancy, cooling systems, fire suppression
  • Network infrastructure: Fiber optic cables, routers, switches
  • Hardware maintenance: Server replacement, component upgrades
  • Hypervisor security: Isolation between tenant environments
  • Storage virtualization: Multi-tenant storage systems
  • Network virtualization: Software-defined networking components
  • Compute virtualization: VM isolation and resource allocation
  • Global infrastructure: Region and availability zone design
  • Edge locations: Content delivery networks, edge computing
  • Service mesh: Internal service communication security
  • Platform hardening: Default secure configurations
Service TypeProvider ResponsibilityCustomer Responsibility
IaaS (EC2, VMs)Physical infrastructure, hypervisorOS, applications, data, network
PaaS (RDS, Lambda)Physical + runtime platformData, application code, access
SaaS (Office 365, Salesforce)Full stackUser access, data classification

Customers are responsible for security in the cloud:

  • User authentication: Password policies, MFA configuration
  • Authorization: IAM policies, role assignments
  • Service identities: Service accounts, managed identities
  • Access reviews: Regular permission audits
  • Data classification: Sensitivity labeling and handling
  • Encryption at rest: Customer-managed keys, key rotation
  • Encryption in transit: TLS configuration, certificate management, Post Quantum
  • Data lifecycle: Retention policies, secure deletion
  • Secure coding practices: Input validation, output encoding
  • Dependency management: Vulnerability scanning, patch management
  • API security: Authentication, authorization, rate limiting
  • Runtime protection: WAF, RASP, application monitoring
  • VPC configuration: Subnet design, routing tables
  • Security groups/firewalls: Network access controls
  • Network segmentation: Application tier isolation
  • Connectivity: VPN, Direct Connect, peering configuration
  • Audit logging: CloudTrail, Activity Logs, audit trails
  • Security monitoring: Threat detection, anomaly detection
  • Log analysis: SIEM integration, correlation rules
  • Metrics and alerting: Performance and security KPIs
  • Policy implementation: Organizational security policies
  • Compliance frameworks: SOC 2, ISO 27001, PCI DSS, HIPAA
  • Risk management: Risk assessments, treatment plans
  • Documentation: Architecture diagrams, runbooks, procedures

“If we move to the cloud, security is handled for us.”

This dangerous assumption leads to:

  • Neglected IAM configurations
  • Unsecured application deployments
  • Missing monitoring and logging
  • Inadequate incident response planning

Shared responsibility varies by service type:

ScenarioMisunderstandingReality
Managed databases”AWS handles all security”You secure data, access, backups
Serverless functions”No servers means no security”You secure code, permissions, data
Kubernetes clusters”GKE handles everything”You secure nodes, pods, networking
SaaS applications”Vendor handles compliance”You handle user access, data classification

Often-overlooked customer responsibilities:

  • Service mesh configuration: Istio, Linkerd policies
  • Container registry security: Image scanning, access controls
  • Secrets management: Parameter Store, Key Vault usage
  • Backup verification: Restore testing, retention policies
  • Cost allocation: Security spend tracking, optimization

The provider secures the platform — you secure what you build on it.

This perspective leads to:

  • Clear ownership boundaries
  • Proper security investments
  • Effective compliance programs
  • Successful cloud adoption

Use this decision tree to determine responsibilities:

  1. Is it physical infrastructure? → Provider
  2. Is it the cloud service itself? → Provider
  3. Is it how you use the service? → Customer
  4. Is it data you put in the service? → Customer
  5. Is it who can access the service? → Customer
DomainPrimary OwnerShared Responsibilities
Physical SecurityProviderPhysical access reporting
Network InfrastructureProviderNetwork configuration
Identity ManagementCustomerIdentity federation
Data EncryptionCustomerKey management with provider
Application SecurityCustomerRuntime protection with provider
ComplianceCustomerProvider certification support

Understanding these boundaries is crucial for building a comprehensive cloud security program.