Understanding the Shared Responsibility Model

March 2026 Infrastructure, Security Services & Risk Management

The decision to move a portion or all of your business into the cloud can be a big milestone in your organisation’s growth. Cloud operations can give your business more freedom and flexibility to scale and differentiate itself from its competitors.


Nazy Fouladirad, president and COO of Tevora.

However, while the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks that should be considered. You want to have a clear understanding of where your security duties end and where your cloud service provider’s (CSP) begin.

Before you assume that your CSP will take on the lion’s share of security management in the cloud, you will first want to understand the shared responsibility model (SRM) and how it should impact your security planning initiatives.

Shared Responsibility Model overview

Partnering with a qualified CSP can be a great way to help your business grow more sustainably. Taking this approach lets you offload a wide range of business tasks, including time-consuming and often cost-intensive infrastructure management tasks like provisioning physical servers and databases.

Taking this approach is an effective way to give your internal teams more time, while enabling you to scale your operations without focusing primarily on workforce size. It also allows teams to spend more time focused on strategic growth initiatives rather than primarily on maintenance-specific tasks.

That said, it is common for organisations to fall into the trap of assumptions about how security responsibilities shift in cloud-based environments. It is easy to think that, since you are paying for a cloud service, any and all responsibilities for cloud security rest with the CSP.

However, cloud security is a shared responsibility.” This is exactly why the SRM exists. It helps clear up misunderstandings about where security-focused tasks should be managed and how CSPs and their clients should coordinate on data privacy principles.

The SRM is essentially a functional map you can use for security planning and execution. It is designed to break down the different layers of security controls, including everything from the physical hardware used to provision cloud instances to the business data accessed and moved across on-premises and off-premises environments.

[subhead] Security "of" the cloud vs security "in" the cloud

One thing to keep in mind about the SRM is that it is designed to help differentiate different cloud responsibilities between a CSP and their clients. To help define these different accountabilities, the SRM references security “of” and security “in”.

Security "of" the cloud is meant to help define what a CSP is directly responsible for. One of the easiest ways to illustrate how this works is to consider the relationship between a landlord (the “CSP”) and a tenant (the “client”).

Landlords are responsible for making sure that the building where clients reside is secure. They are responsible for maintaining the building, installing necessary security measures such as locking gates and doors, and carrying out other essential tasks. In a cloud environment, CSPs follow similar accountabilities to those in physical data centres, installing and maintaining hardware, and ensuring the software in place is able to run their client’s cloud environments.

Security "in" the cloud is where the clients come in. Just as tenants are responsible for keeping their possessions secure by locking their doors and following best practices, clients also have their own duties to manage. In cloud settings, clients are responsible for what happens inside their specific environments. This means managing user permissions, encrypting sensitive files, and keeping data organised.

Why the Shared Responsibility Model matters

Creates clear accountability

When it comes to security, you cannot afford any "I thought you were doing that" moments. Whether your data is on your own local servers or in the cloud, someone needs to be the designated lead for every task.

Using the SRM removes that confusion. It allows you to set clear standards for your internal team and your cloud vendor. When everyone knows their role, you are much less likely to have a security gap that goes unnoticed. This helps you catch and fix potential risks before they turn into real problems.

Makes your security team more effective

Once your team knows exactly what the provider is handling, they can focus their efforts on the elements within their control.

Knowing what falls within their responsibility allows internal experts to focus on protecting your unique business. They can spend their time strengthening your custom software, improving how you manage user access, or looking for suspicious patterns in your data traffic. It puts your human talent where it is needed most.

Reiterates the importance of effective setup

In most cases, major cloud breaches are not just a result of being targeted by a highly skilled cybercriminal. While these individuals are skilled at capitalising on apparent vulnerabilities, those security gaps are often left by cloud administrators who did not enable the right cloud configurations.

By following SRM and aligning your operations with industry standards such as NIST or HITRUST, you can build a much stronger, more resilient cloud foundation from the very first day you migrate your systems.

A primary benefit of working with cloud providers is that they often build their systems from the ground up to meet high safety standards. You can leverage this security readiness and start using the built-in security tools and features. Taking this approach can give your business a significant advantage by protecting against major security threats, such as ransomware or DDoS attacks.

Promotes smarter workflows

The cloud is incredibly powerful, but its interconnected nature and complex architecture can also be a double-edged sword. It can be easier than organisations realise to expose sensitive data, especially when rushing to deliver new features.

The SRM encourages businesses to prioritise security over speed and can serve as a useful model for evaluating your cybersecurity protocols and initiatives. For example, working with penetration testing teams that reference the SRM as a guide can help them to simulate real-world attack scenarios to see how well your business can defend itself.

If certain security gaps remain, these research teams can provide actionable advice on addressing them, while building and executing smarter cloud security workflows going forward.

Keeping your cloud operations secure

As you continue to evolve your business operations and migrate into cloud environments, making the SRM a core part of your strategy is essential. By taking ownership of your specific duties in the cloud and working with your CSP to ensure they understand their own responsibilities, you can successfully close the door on risky security gaps, while feeling more confident in protecting your company’s future.

Author

Nazy Fouladirad is president and COO of Tevora, a cybersecurity consultancy. She has dedicated her career to creating a more secure business and online environment for organisations. She is passionate about serving her community and acts as a board member for a local non-profit organisation.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.