Understanding the shared responsibility model for security in the hybrid cloud

clock • 2 min read

If the responsibilities of CSP and customers are not well understood, the risks to security are obvious

One of the greatest draws of cloud computing is the promise of greater security. Cloud service providers typically have greater expertise and budget to dedicate to securing their services than customers.

However, contrary to the expectations of many, the burden of securing cloud environments does not lie solely with your cloud providers. Responsibility for the user access, data and application layers typically remain with the customer. The shared responsibilities model outlined in terms of service not only reveal the customer's obligation to share the load, but also reflect the modern cloud security strategy we should all be following.

The proliferation of remote working and the growth of cloud have meant the gradual and inevitable erosion of the traditional security perimeter. With that, we've had to pivot to more holistic approaches to securing our organisations - better cyber hygiene, cloud-based security tools, and MFA.

Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

However, one often neglected aspect of cloud security strategy is the shared responsibility model. To be effective, cyber security must be multi-layered, with each layer covering possible gaps in the others. If the shared responsibilities are not well understood, the potential consequences are obvious.

Join us for a Computing webinar on 27 January during which we will be considering research into the shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments. This includes the configuration of access permissions (at the user access, data, and application levels), cloud governance, and the use of automated administration and security. We will address all this within the complex and challenging security context organisations are operating under, including increasing IT workloads and tool sprawl hurdles.

Register today.



 

You may also like
Oracle promises AI everywhere at Cloudworld 2024

Business Software

Integrated across the Fusion Suite

clock 19 March 2024 • 6 min read
US House passes bill paving the way for TikTok ban

Social Networking

Rumble reveals intention to purchase TikTok, but Oracle remains absent from the fray

clock 14 March 2024 • 3 min read
Oracle's controversial stewardship of Java: The good and the bad

Open Source

Oracle is doing a good job in keeping Java relevant. But that's pretty much where it ends, says Azul CTO

clock 15 February 2024 • 5 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Cloud and Infrastructure

Announcing the shortlist for the Cloud Excellence Awards 2024

Announcing the shortlist for the Cloud Excellence Awards 2024

Congratulations to our finalists

clock 16 July 2024 • 4 min read
How DTLA finalist The AA is driving to digital

How DTLA finalist The AA is driving to digital

'We are now leading the market with digital convenience'

James Stenhouse
clock 26 June 2024 • 3 min read
Microsoft quietly shelved underwater datacentre project

Microsoft quietly shelved underwater datacentre project

Lessons have been learned from Project Natick, says Microsoft’s Noelle Walsh

Graeme Burton
clock 25 June 2024 • 2 min read