Learning Library

← Back to Library

Shared Responsibility in Cloud Security

Key Points

  • Cloud security follows a shared‑responsibility model, where the provider secures the underlying platform (network, hypervisor, containers, SaaS applications) and the customer secures the workloads, applications, and data they run on it.
  • The specific responsibilities shift depending on the service model—PaaS (customer secures app and data, provider secures platform), IaaS (customer controls OS, VMs, and data, provider secures hypervisor and hardware), and SaaS (provider secures everything except the customer’s data).
  • Understanding which cloud service model you are adopting is essential for correctly assigning risk and compliance duties and for planning appropriate security controls.
  • Data classification (confidential, public, sensitive) should drive the design of a secure data architecture, including mandatory encryption of data at rest across databases, object stores, and block storage.
  • Robust key management—ideally using “bring your own keys” and hardware security modules—gives you professional‑level control over encryption keys and ensures you retain ownership and protection of sensitive data in the shared‑responsibility environment.

Full Transcript

# Shared Responsibility in Cloud Security **Source:** [https://www.youtube.com/watch?v=jI8IKpjiCSM](https://www.youtube.com/watch?v=jI8IKpjiCSM) **Duration:** 00:10:16 ## Summary - Cloud security follows a shared‑responsibility model, where the provider secures the underlying platform (network, hypervisor, containers, SaaS applications) and the customer secures the workloads, applications, and data they run on it. - The specific responsibilities shift depending on the service model—PaaS (customer secures app and data, provider secures platform), IaaS (customer controls OS, VMs, and data, provider secures hypervisor and hardware), and SaaS (provider secures everything except the customer’s data). - Understanding which cloud service model you are adopting is essential for correctly assigning risk and compliance duties and for planning appropriate security controls. - Data classification (confidential, public, sensitive) should drive the design of a secure data architecture, including mandatory encryption of data at rest across databases, object stores, and block storage. - Robust key management—ideally using “bring your own keys” and hardware security modules—gives you professional‑level control over encryption keys and ensures you retain ownership and protection of sensitive data in the shared‑responsibility environment. ## Sections - [00:00:00](https://www.youtube.com/watch?v=jI8IKpjiCSM&t=0s) **Understanding Cloud Shared Responsibility** - The speaker outlines how security responsibilities shift between the customer and IBM Cloud across PaaS, IaaS, and SaaS models. - [00:04:27](https://www.youtube.com/watch?v=jI8IKpjiCSM&t=267s) **Least‑Privilege App & Container Security** - Emphasizes restricting data access to only required applications, continuously scanning applications and container images for vulnerabilities, and enforcing identity‑based access controls throughout cloud‑native deployments. - [00:08:15](https://www.youtube.com/watch?v=jI8IKpjiCSM&t=495s) **SecDevOps: Integrating Security Early** - The speaker stresses that security must be a forethought, not an after‑thought, by adopting a SecDevOps model that shifts left to embed secure design, encryption, data classification, and controls throughout the entire application lifecycle. ## Full Transcript
0:00Hi, I'm Nataraj Nagaratnam 0:02and I'm from IBM Cloud. 0:04Traditionally when you deploy an application 0:06you have the entire data center, the servers that you run - you're responsible for all of it. 0:11In the cloud model that's a shared responsibility 0:14between you and the cloud provider. 0:23In a shared responsibility model you need to rethink security 0:26on what your responsibility is and what the cloud provider's responsibility is. 0:30Let's take platform-as-a-service (PaaS) as an example. 0:34When you look at PaaS, you're building applications, 0:37migrating data to the cloud 0:39and building applications running them on the cloud. 0:42So, you're responsible for securing the applications, the workload and the data 0:46while the cloud provider is responsible for managing the security of the platform. 0:51So that it's compliant, it's secured from the perspective of network, 0:56the platform on down in terms of managing the containers and the runtime and isolation, 1:03so that you have your own space within the platform. 1:07Whereas if you are adopting and migrating workloads to the cloud 1:11and you're using infrastructure-as-a-service (IaaS), 1:14then the cloud provider manages hypervisor on down if you are using virtual servers 1:20or, if you are using bare metal, then you can completely control everything on up 1:25from the operating system, the virtual servers that you run, 1:29and the data you bring it on. 1:31So it's very important to understand the adoption model whether you're 1:34consuming IaaS or PaaS, or if you're consuming SaaS where the cloud provider 1:44manages all the applications and the security offered and you worry about the 1:48data that you bring in and plan accordingly. 1:51So that's a very important thing because it's part of understanding your 1:56responsibility in ultimately managing the risk and compliance of the workloads 2:01of the data that you bring to cloud. 2:03Now let's talk about architecture. 2:05When you build applications and migrate applications and modernize your apps 2:09- let's start with data. 2:10With all the risk that you deal with, and the kind of data matters. Is it confidential data, is it public data, or 2:19sensitive data that may deal with private information. 2:22Consider all those factors and make a secure design around what your data security architecture should be. 2:29Make sure you have data at rest encryption so that the data is 2:35always encrypted whether you use a database as a service, object store as a 2:39service, or other ways to store data like block storage. Encryption is for 2:44amateurs, and we think about key management for professionals. So having more 2:49control of your keys provide you the ability in the context of shared 2:54responsibility model that you own your data you have complete control of your 2:58data. So as you think about key management make sure you have an 3:04approach to think about if you are bringing confidential data you want to 3:07bring your own keys may be sensitive data you want to keep your own keys. So 3:12that how much control of the keys you have and the hardware security module in 3:18which the key processing the encryption decryption operations happen more 3:22control you have more responsibility that you can take on. So encryption at 3:28data at rest, data in motion, as it comes from services to data stores or 3:36applications so that as you think about data coming out of the way your requests 3:42and API requests coming all the way data in motion. And in the new world we need 3:49to start thinking about when the application is actually processing the 3:53data that is going to be data in its memory. So you can actually start to 3:58protect data using hardware based technologies where you can protect 4:02in-memory data as well. So that when it is in use and in memory by the 4:10applications you can protect it. So take a holistic approach to data protection 4:14at rest, in motion, in use with full control of your keys. It can be bring 4:19your own keys, or even better push the boundary with keep your own keys. 4:27The application that serves the data it's not only about which application 4:34needs to have access make sure the data access is on an only by need basis. Do 4:40not open up your data services to the whole world, be it network access or 4:44everybody to access the data, make sure you exactly know which applications need 4:49to access or which users need to access the data to run your cloud applications. 4:54From an application viewpoint make sure there are no vulnerabilities in your 4:59application so scan your applications, so I have an App SEC application security 5:06approach so that you can do dynamic scanning or static scanning of your 5:10application before you deploy it into the production, and in the cloud-native 5:14environment you're deploying container images so you can scan your images, you 5:19can scan it for vulnerabilities before you deploy and set your policies so that 5:24you only have secured images in production any time and if there is any 5:30vulnerability in the new world you don't need to patch these systems you just 5:34spin up a new container and off you go. So that's the beauty of a cloud-native 5:38approach that you have security built in in every step. So at a container level 5:44and the applications that serves the business logic you can start to protect 5:50it. Then when you look at the users coming in you want to manage access in 5:57terms of who the user is and what from there they are coming from. So identity 6:05you need to make sure who the user is or which service it is based on the 6:09identity of those services or users so that you can manage access control to your 6:14application or data and also from the perspective of network access you want 6:21to make sure only authorized users can get in and if there are intruders out 6:28there you can make sure you can set it up so that they are prevented from 6:33accessing your application and your data in the cloud, be it through Web 6:40Application Firewall-ing, network access control or 6:43denial-of-service distributed, denial-of-service protection and have 6:47intelligence built into these network protection as well. So both identity and 6:53network. In essence, you are protecting your data, you need to manage access to 7:04your apps and the workload on the data that you have deployed on the cloud. You 7:08need to have a continuous security monitoring so that you know at any point 7:13whether you're compliant to your policies, you can watch out for threats 7:18that you need to manage, having an approach and set of tools to manage 7:22security and complaints posture is very important. So gaining insights about your 7:28posture, compliance, and threats. So from your deployment environment you can 7:37garner information, it can be security events, audit logs, flow logs from network 7:45or system that can be fed in so that you can figure out what your posture and 7:51complaints and threats are, and that is not only important for you to gain insight 7:54you need to have actionable intelligence so that you can start to remediate. You 7:59may figure out there's a vulnerability, a container image that you have deployed 8:02is vulnerable so you can re-spin the container so you can remediate and spin 8:06up a new container. There may be a particular access from a network that 8:10seems to be coming in from a suspicious network IP address so we can block that. 8:15So the ability to gain visibility and insights and having that insights and 8:20turn it into actionable intelligence and remediate is very important. So let's 8:25talk about DevOps. DevOps is about development and operations. Traditionally 8:30we think about okay, there's an application team that is doing the 8:33design and architecture, who are building code, and then you throw it over the wall 8:38for the enterprise security team to secure it and manage it. That should be 8:43rethought, fundamentally it's not just about Dev and Ops, but security need 8:50to be a forethought not an afterthought. So it should become 8:55SecDevOps approach to the way you build, manage, and run your applications. 9:01So you need to embed security into the entire lifecycle, what we call shift left, 9:05not only you manage security but shift left through the entire process you need 9:09to have a secure design, so as you plan as you design and say what kind of data 9:15am I going to put what level of classification what kind of applications 9:18am I building, is it container based, is it a workload that I'm migrating, take 9:23that into account and what integrations you need to do so that you can plan it 9:27and architect it. Then as you build it embed security as part of that process. 9:33So you have security aware applications, for example you may want to 9:36encrypt data of your sensitive data, you may want to encrypt the data from your 9:40applications before you even you store into a data store. So secure build and 9:46you manage security as part of SecDevops as you have secure design and 9:51architecture you pass on that and build secure applications and deploy and 9:57manage security in a continuous fashion and then you have a closed loop 10:00so that whatever you find you may need to remediate or rearchitect your 10:04application or implement certain things as threats landscape evolve. 10:08Thanks for watching this video. 10:09If you want to see more videos like it 10:11please leave a comment below, "like", and subscribe. 10:15Thank you.