Understanding the shared responsibility model for security in the hybrid cloud

clock • 2 min read
Understanding the shared responsibility model for security in the hybrid cloud

If the responsibilities of CSP and customers are not well understood, the risks to security are obvious

One of the greatest draws of cloud computing is the promise of greater security. Cloud service providers typically have greater expertise and budget to dedicate to securing their services than customers.

However, contrary to the expectations of many, the burden of securing cloud environments does not lie solely with your cloud providers. Responsibility for the user access, data and application layers typically remain with the customer. The shared responsibilities model outlined in terms of service not only reveal the customer's obligation to share the load, but also reflect the modern cloud security strategy we should all be following.

The proliferation of remote working and the growth of cloud have meant the gradual and inevitable erosion of the traditional security perimeter. With that, we've had to pivot to more holistic approaches to securing our organisations - better cyber hygiene, cloud-based security tools, and MFA.

Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

However, one often neglected aspect of cloud security strategy is the shared responsibility model. To be effective, cyber security must be multi-layered, with each layer covering possible gaps in the others. If the shared responsibilities are not well understood, the potential consequences are obvious.

Join us for a Computing webinar on 27 January during which we will be considering research into the shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments. This includes the configuration of access permissions (at the user access, data, and application levels), cloud governance, and the use of automated administration and security. We will address all this within the complex and challenging security context organisations are operating under, including increasing IT workloads and tool sprawl hurdles.

Register today.



 

More on Threats and Risks

Partner Content: Exclusive Q&A: Rubrik's James Blake on cyber attack recovery, ransoms and threat hunting

Partner Content: Exclusive Q&A: Rubrik's James Blake on cyber attack recovery, ransoms and threat hunting

Rubrik
clock 13 May 2022 • 6 min read
Although patched, threat actors are able to exploit the flaw on vulnerable devices

Threat actors exploit F5 BIG-IP vulnerability to wipe devices

Threat actors are using a vulnerability to wipe endpoints' file systems and render them unusable.

clock 12 May 2022 • 3 min read
Attackers are increasingly using MSPs' own tools against them

Five Eyes agencies warn of rising attacks against MSPs

Intelligence services have issued a warning of rising attacks against managed service providers by nation-state actors and other threat groups.

clock 12 May 2022 • 2 min read