Loading content...
In 2019, Capital One experienced one of the most significant cloud security breaches in history. Over 100 million customer records were exposed—not because AWS's infrastructure was compromised, but because the bank misconfigured a Web Application Firewall. The attacker exploited Capital One's configuration, not Amazon's cloud platform. This distinction is crucial: the cloud provider's security and the customer's security are not the same thing.
This fundamental reality is formalized in what cloud providers call the Shared Responsibility Model—the cornerstone of all cloud security architecture. Without a deep understanding of this model, organizations invariably make one of two costly mistakes: they either assume the cloud provider handles all security (leaving critical gaps), or they attempt to secure everything themselves (wasting resources on areas the provider already secures).
Mastering this model is the first step toward building genuinely secure cloud architectures.
By the end of this page, you will understand exactly where cloud provider responsibility ends and customer responsibility begins. You'll learn how this division varies across IaaS, PaaS, and SaaS, and you'll gain the analytical framework to evaluate security posture for any cloud deployment model.
The Shared Responsibility Model is a security and compliance framework that explicitly delineates which security obligations belong to the cloud service provider (CSP) and which belong to the customer. It exists because cloud computing fundamentally changes the security paradigm—you're no longer in full control of the entire stack, but you're still fully accountable for your data and applications.
The fundamental principle is simple:
This seemingly simple division has profound implications. The provider guarantees that their data centers are physically secure, that hypervisors isolate workloads properly, and that the underlying network infrastructure is protected. But they have no control over—and therefore no responsibility for—how you configure your S3 bucket permissions, whether your application validates input properly, or if your employees use weak passwords.
Many organizations assume that moving to 'a secure cloud' means their data is secure. This is dangerously incorrect. The cloud infrastructure may be highly secure, but if you expose a database to the public internet or store credentials in plain text, you have created vulnerabilities that no amount of provider security can protect against.
The philosophical foundation:
The model is rooted in a fundamental truth about security: you cannot secure what you cannot control. The cloud provider controls the hardware, the hypervisors, and the physical facilities—so they secure those. You control your data, your applications, and your configurations—so you must secure those.
This isn't a limitation of cloud computing; it's a feature. By clearly separating responsibilities, both parties can focus their security efforts on their areas of expertise and control. AWS knows more about securing hypervisors than you do; you know more about your application's security requirements than AWS does.
Cloud providers invest billions of dollars in securing their infrastructure. Understanding exactly what they protect helps you avoid both gaps (assuming they secure something they don't) and redundancy (trying to secure something they already handle).
Physical Security:
Major cloud providers maintain data centers with security measures that would be economically impossible for most organizations to replicate:
Compliance and Certifications:
Cloud providers undergo rigorous third-party audits and maintain certifications that would be prohibitively expensive for individual organizations to obtain:
| Certification | What It Covers | Why It Matters |
|---|---|---|
| SOC 1/2/3 | Internal controls, security, availability | Independent verification of security practices |
| ISO 27001 | Information security management | Global standard for security management systems |
| PCI DSS | Payment card data protection | Required for handling credit card transactions |
| FedRAMP | US federal government requirements | Mandatory for government cloud deployments |
| HIPAA | Healthcare data protection | Enables deployment of healthcare applications |
| GDPR | European data protection | Legal basis for processing EU data |
These certifications cover the provider's infrastructure. They do not automatically extend to what you build on that infrastructure—a crucial distinction we'll explore in the customer responsibility section.
While cloud providers secure the foundation, customers are responsible for everything they build on that foundation. This is where the majority of cloud security breaches occur—not because the provider failed, but because the customer misconfigured, neglected, or misunderstood their responsibilities.
Customer responsibility spans several critical domains:
Analysis of cloud breaches reveals recurring customer failures: S3 buckets exposed to public access, overly permissive IAM policies, unpatched operating systems, hardcoded credentials in code repositories, and security groups allowing access from 0.0.0.0/0. These are all customer responsibilities that were neglected.
The "Shared" in Shared Responsibility:
Some areas involve overlapping responsibilities where both provider and customer must act:
Encryption — The provider offers encryption capabilities and may manage key infrastructure (like AWS KMS), but you must enable encryption and may need to manage keys depending on your requirements.
Patch Management — For managed services, the provider patches the underlying infrastructure. For IaaS, you patch the OS. For PaaS, the division depends on the service.
Network Security — The provider secures the physical network and offers tools like VPCs and security groups. You must configure those tools to implement your security requirements.
Logging and Monitoring — The provider offers logging services (CloudTrail, CloudWatch, etc.). You must enable them, configure appropriate alerts, and actually review the logs.
These shared areas are often where confusion arises and breaches occur—organizations assume the provider is handling something that actually requires customer action.
The shared responsibility model isn't static—it shifts dramatically depending on the cloud service model you're using. As you move from IaaS to PaaS to SaaS, more responsibility transfers to the provider, but you never escape all customer responsibilities.
The fundamental principle holds: the more the provider manages, the less you manage, but you always remain responsible for your data and how you configure access to it.
| Layer | IaaS (e.g., EC2) | PaaS (e.g., Lambda) | SaaS (e.g., Salesforce) |
|---|---|---|---|
| Data Classification | Customer | Customer | Customer |
| Data Encryption | Customer | Customer/Shared | Shared |
| Identity & Access | Customer | Customer | Customer |
| Application Code | Customer | Customer | Provider |
| Runtime Environment | Customer | Provider | Provider |
| Operating System | Customer | Provider | Provider |
| Virtualization | Provider | Provider | Provider |
| Physical Security | Provider | Provider | Provider |
IaaS: Maximum Control, Maximum Responsibility
With Infrastructure as a Service (EC2, Azure VMs, GCE), you get virtual machines and networking. Everything above the hypervisor is your responsibility:
This model offers maximum flexibility but requires the most security expertise. You're essentially running a traditional data center, just on rented hardware.
PaaS: Reduced Scope, Shifted Responsibility
With Platform as a Service (Lambda, App Engine, Azure Functions), the provider manages the runtime:
PaaS reduces your attack surface but doesn't eliminate security concerns. Your code can still have vulnerabilities, your IAM can still be misconfigured, and your data can still be exposed through application logic errors.
SaaS: Minimal Infrastructure, Persistent Data Responsibility
With Software as a Service (Salesforce, Workday, Slack), the provider manages nearly everything:
Even with SaaS, you can't outsource accountability. If you give an intern admin access, or export sensitive data to insecure locations, or fail to offboard terminated employees, those are your failures.
No matter what service model you use, you are always responsible for: (1) your data, (2) who can access it, (3) how it's classified, and (4) compliance with regulations that apply to you. These customer responsibilities never transfer to the provider.
While the fundamental concept is universal, each major cloud provider articulates the shared responsibility model with slightly different emphasis and terminology. Understanding these nuances is essential when working in multi-cloud or hybrid environments.
Google Cloud Platform (GCP):
GCP frames shared responsibility with additional emphasis on Google's infrastructure investments and Fate Sharing—the concept that Google's business depends on customer security, so they actively invest in tools that help customers secure their workloads:
Key Differences to Note:
| Aspect | AWS | Azure | GCP |
|---|---|---|---|
| Default encryption | Opt-in for most services | Enabled for many services | Enabled for data at rest |
| IAM model | Policy-based | RBAC-focused | Policy + Roles hybrid |
| VPC isolation | Strict by default | Virtual networks | VPC with private Google access |
| Compliance tools | Artifact, Config | Compliance Manager | Security Command Center |
| Security center | Security Hub | Defender for Cloud | Security Command Center |
While these differences exist, the core model remains consistent: providers secure the infrastructure, customers secure their workloads. Any differences are in implementation details, not the fundamental division of responsibility.
Understanding the model conceptually isn't enough—you must operationalize it within your organization. This requires systematic processes, clear ownership, and continuous validation.
Step 1: Create a Responsibility Matrix
For every cloud service you use, document exactly which security controls are provider responsibilities and which are yours. This matrix becomes your source of truth:
Service: Amazon S3
| Control | Provider | Customer | Notes |
|---------------------|----------|----------|------------------------------------|
| Physical disk security | ✓ | | Provider manages hardware |
| Encryption at rest | | ✓ | Customer must enable SSE |
| Bucket policies | | ✓ | Customer defines access rules |
| Access logging | | ✓ | Customer enables CloudTrail |
| Object tagging | | ✓ | Customer classifies data |
| SSL/TLS in transit | ✓ | ✓ | Provider offers, customer uses |
| Versioning | | ✓ | Customer enables for recovery |
Create this matrix for every service in your architecture. It forces you to explicitly address each security dimension.
Operationalizing shared responsibility is fundamentally a governance challenge. Technical controls matter, but without clear accountability, regular audits, and organizational commitment, technical controls decay over time. Build shared responsibility into your cloud governance framework, not just your security documentation.
Even organizations that understand the shared responsibility model often fall into predictable traps. Awareness of these pitfalls can prevent your organization from becoming another breach statistic.
The Abstraction Trap:
Higher abstraction levels (PaaS, serverless) can create false confidence. When you can't see the operating system, it's easy to forget that security still requires attention. Consider a Lambda function:
The attack surface shrinks with abstraction, but it never disappears entirely. Your responsibilities change form but don't vanish.
Most cloud breaches involve human error, not sophisticated attacks: overly permissive policies, public buckets, exposed credentials, unrotated access keys. Technical controls help, but security culture and training are equally critical customer responsibilities.
The Shared Responsibility Model is the conceptual foundation upon which all cloud security architecture is built. Without internalizing this model, organizations cannot effectively secure their cloud deployments.
What's Next:
With the shared responsibility model as our foundation, we'll explore the first major customer responsibility in detail: Identity and Access Management (IAM). IAM is where most cloud security implementations begin, and where many security failures originate. Understanding IAM deeply is essential for fulfilling your side of the shared responsibility bargain.
You now understand the Shared Responsibility Model—the foundational concept that defines cloud security. This mental model should inform every cloud architecture decision you make, from service selection to configuration choices to compliance planning.