FeaturedOpinion

Strengthening Cloud Defense: The Shared Responsibility Model

4 Mins read

Above: Illustration by itchaznong/123rf.com

Deciding to migrate to the cloud is a big step forward for businesses. For most organizations, the benefits are obvious – they get the ability to scale their resources whenever they need while keeping their operations more agile to stay competitive.

But there is a catch to benefiting from this flexibility. The rapid pace of cloud adoption and the digital footprint it creates can create many grey areas for security.

Often, businesses struggle to determine where their security responsibilities end and their cloud service provider’s (CSP) begin. This can cause confusion and missed opportunities to harden both cloud-based and on-premises systems effectively.

One of the worst assumptions you can make when starting your own cloud migration is that any security accountabilities you currently have in your business automatically transfer to your CSP. This is where the Shared Responsibility Model (SRM) comes in.

What is SRM, how does it work, and how you can use it to help strengthen your cloud defenses as you scale.

Understanding the Shared Responsibility Model

Working with CSPs can be really beneficial to growing businesses. It allows you to hand off many of the time-consuming tasks associated with infrastructure management and application provisioning.

This helps avoid unnecessary administrative burden on internal teams, lowers operational costs, and frees up bandwidth for more critical tasks.

However, what many businesses fail to realize is that even though you may be offloading many data management tasks over to a CSP, this doesn’t necessarily mean you’re offloading security and data privacy risks as well. The SRM exists to help remove this assumption and clarify where accountabilities rest between your business and the cloud providers you use.

The SRM serves as a roadmap for splitting security obligations between the CSP and you, the customer. It maps out specific control planes and assigns responsibility for deploying and managing the privacy protocols and security configurations.

Distinguishing security “Of” versus security “In” the Cloud

One of the things that the SRM does really well is to help break down where and how cloud security accountabilities rest. To do this, the model is built around two key concepts: Security “of” the cloud and Security “in” the cloud.

Security “OF” the cloud references a CSP’s obligations. An easy way to think about this is to consider a property management company for an apartment complex. The management team is responsible for ensuring the building’s safety and structural integrity. This might include installing security gates at the perimeter, ensuring plumbing and electrical systems are in good order, and ensuring tenants have access to utilities.

This applies to CSPs’ positioning in the SRM. They are responsible for physical data centers and the networking hardware. They also manage the host operating systems and the virtualization layer required to run different cloud deployments.

Security “in” the cloud references your responsibilities as a cloud customer. Going back to that apartment analogy – if a tenant leaves their front door wide open and their television gets stolen, the property manager isn’t at fault. The manager still secured the building, but you failed to follow best practices to help keep your assets safe.

In the cloud, this means you are responsible for managing user access, data encryption, and  security best practices.

How Shared Responsibility enhances security posture

Clarifies ownership and accountability

Clarity is essential in security planning. Every business process, whether it’s managed in-house or hosted in the cloud, still needs to have dedicated ownership to keep accountability where it belongs.

Adopting an SRM helps eliminate confusion about who is responsible for specific controls. It allows you to set up strict governance policies both internally and in your relationship with the CSP. Taking this approach ensures that no vulnerabilities are missed and that security gaps are addressed as needed.

Optimizes security resource allocation

When your internal teams know exactly what responsibilities your CSP handles, they can stop wasting cycles on problems that aren’t theirs to solve.

You can then delegate the heavy lifting of physical security and infrastructure stability to the provider, where it belongs. This frees up your security engineers to focus on high-value tasks that are unique to your business.

They can spend their time securing proprietary code, refining identity management controls, and monitoring network traffic for potential anomalies that need to be addressed.

Reduces configuration vulnerabilities

When your business aligns with SRM principles and adheres to compliance frameworks such as HITRUST and NIST, it builds a foundation that is inherently more secure. CSPs design their services to meet their side of the agreement, and you’re able to leverage advanced protections that are often baked right into the platforms you use.

Leveraging this type of integration is a major advantage to your business. It lowers the threat of major cyber attacks disrupting your business, such as Distributed Denial of Service (DDoS) or ransomware attacks. It also ensures your network architecture includes built-in disaster recovery and failover capabilities.

Drives a security-centric operational approach

Cloud platforms are powerful, but they are also incredibly complex. If you don’t understand how to set them up properly, you can easily end up with misconfigurations that leave data exposed.

The SRM forces organizations to put secure configuration ahead of rapid deployment. It encourages a culture where compliance standards dictate how fast you innovate.

It also gives you clear guidelines you can follow to help get more value from your security auditing. For example, penetration testers can simulate attacks on your cloud environments, using the SRM to verify that your Identity and Access Management (IAM) policies or data handling procedures are actually working and compliant.

Make cloud security a critical focus for your business

As your business scales into the cloud, integrating the Shared Responsibility Model into your operational DNA is vital for long-term success.

By acknowledging and accepting your specific duties within the cloud ecosystem, you get rid of dangerous blind spots. This perspective helps empower you to move from passively relying on your vendors to taking a proactive, hands-on role in defending your digital assets.

Nazy Fouladirad

About the author

Nazy Fouladirad is President and COO of Tevora, a global leading cybersecurity consultancy. She has dedicated her career to creating a more secure business and online environment for organizations across the country and world. She is passionate about serving her community and acts as a board member for a local nonprofit organization.

 

 

Ransomware report notes fourth quarter 2025 attack surge

Ransomware report notes fourth quarter 2025 attack surge

"The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches."
Read More
Hands-on with Apple’s Creator Studio as a non-subscriber

Hands-on with Apple’s Creator Studio as a non-subscriber

It’s not hard to imagine someone in a hurry clicking madly along only to find themselves a subscriber through haste.
Read More
Apple flirts with subscription software

Apple flirts with subscription software

Are we all being coaxed and tranquilized into accepting as a norm, the idea that the computing tools we pay for are not things we own anymore?
Read More
So long, and thanks for all the fish

So long, and thanks for all the fish

The only way forward for journalism is immersion in the unfamiliar by both journalists and their managers.
Read More
Cyberedge reports on cybersecurity trends

Cyberedge reports on cybersecurity trends

Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern.
Read More
Samsung’s ZFlip 7 shows steady improvement

Samsung’s ZFlip 7 shows steady improvement

Being able to use a powerful wide-angle lens in what is essentially a next level selfie mode is a big step up for the phone's target market.
Read More
Digital New Year’s resolutions

Digital New Year’s resolutions

Every computer and smartphone has a digital calendar system, which means that you have a live appointment book capable of giving you reminders.
Read More
WiPay announces new strategy for services, payments

WiPay announces new strategy for services, payments

Are there enough bread and butter customers who need new options for travel, phone service and loan services to make those add-on businesses worth the time of WiPay.
Read More
Old Mac, new OS

Old Mac, new OS

The best OS versions to target are Sonoma and Sequoia because these systems are still receiving minor security and improvement updates.
Read More
Regional cybersecurity faces fire

Regional cybersecurity faces fire

Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Read More
Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
Ransomware report notes fourth quarter 2025 attack surge Ransomware report notes fourth quarter 2025...
Hands-on with Apple’s Creator Studio as a non-subscriber Hands-on with Apple’s Creator Studio as...
Apple flirts with subscription software Apple flirts with subscription software
So long, and thanks for all the fish So long, and thanks for all...
Cyberedge reports on cybersecurity trends Cyberedge reports on cybersecurity trends
Samsung’s ZFlip 7 shows steady improvement Samsung’s ZFlip 7 shows steady improvement
Digital New Year’s resolutions Digital New Year’s resolutions
WiPay announces new strategy for services, payments WiPay announces new strategy for services,...
Old Mac, new OS Old Mac, new OS
Regional cybersecurity faces fire Regional cybersecurity faces fire
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Ransomware report notes fourth quarter 2025 attack surge

4 Mins read
“The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches.”
BitDepthFeatured

Cyberedge reports on cybersecurity trends

3 Mins read
Mobile and web application vulnerabilities affect 90.9 per cent of respondents in the 2025 report and these weaknesses are contributing to the areas of greatest cybersecurity concern.
BitDepthFeatured

Regional cybersecurity faces fire

4 Mins read
Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
Press Releases

Flexxon introduces upgrade to its cybersecurity hardware system

0
Share your perspective in the comments!x
()
x