Cloud security incidents are skyrocketing. In fact, nearly half (45%) of all security incidents target cloud-based services. Another angle: 80% of business organizations experienced at least one cloud security breach incident last year. (Arguably the worst part here is that, when a system is breached, the average dwell time is 9 weeks.)
Still, over 72% of businesses plan to continue investing in the cloud. So how do you make cloud computing a secure environment for sensitive business information?
The answer is the shared responsibility model. Its name makes it clear: in the shared responsibility model, the customer and the vendor share responsibilities. But which ones belong to who? And how did we get to this spot?
Let’s look at both sides of cloud computing and we’ll see where the shared responsibility model lands.
Critics of cloud computing believe that sensitive business information should never leave the IT networks operated and controlled within your own in-house data centers. And compliance regulations mandate similar security measures in some cases — restricting the use of public cloud services running on data centers that run in another country, for instance.
This makes sense as any data transmitted over public networks is subject to cybersecurity risks. Any security vulnerability within the network of the cloud vendor can expose your information to security risks. Plus, you no longer control how the underlying systems are maintained, managed, upgraded and improved for security.
Proponents of cloud computing present a compelling argument against this concern: multi-billion cloud vendors are better suited to handle sensitive business information for two main reasons:
An average SMB firm may not face a similar magnitude of cybersecurity risks, but they also cannot rival established tech giants in securing information within large cloud-based data center systems.
So which perspective is more compelling?
In practice, the cloud computing industry meets in the middle: it offers limited visibility and control into the infrastructure systems, which are managed and operated by the vendor. However, they offer the necessary security tooling and capabilities that give a user control over the security of their own data.
As such, they follow a shared security responsibility model, where both the cloud vendor and customer are expected to adopt certain security controls depending on the type of service.
These security controls usually run along these lines:
The cloud vendor manages, operates and controls the infrastructure operations from the virtualization layer all the way to the hardware device security. These include:
There are plenty of cloud vendors out there, and of course you’ll recognize the Big 3 of AWS, Azure and GCP.
The cloud customer — you, or your organization — is responsible for managing the security of data and the guest operating system, including:
Customers must encrypt the data and adopt authentication systems to ensure security of their workloads based on the necessary security policies.
Depending on the cloud vendor, some security functions may be shared. These include security training and awareness, patch management and configuration management — both the cloud vendor and customer share the security responsibilities for resources they control.
So, that’s a brief rundown of shared responsibility, but when it comes to security, there is some variation. Security responsibilities vary between different cloud service classifications: IaaS, PaaS and SaaS. Here’s the general rule of thumb:
Yet, these responsibilities can vary depending on the vendor, service offering and contract with the cloud vendor. So, whichever vendor(s) you’re investigating, be sure to ask for their breakdowns of shared responsibilities.
Above is Splunk Protects, our overall portal for data privacy, security and compliance. We especially like TechTarget’s graphic breakdown:
It’s therefore best to follow standard practice when it comes to cloud security responsibility:
You can, however, shift and modify responsibilities to the cloud by:
The latter corresponds to adopting a cloud-native approach to software development, using microservices and PaaS instead of using in-house private cloud deployments, for instance.
It’s also important to understand that delegating security responsibility to the vendor — such as by avoiding an IaaS service in favor of a more managed PaaS or even SaaS service — can also potentially lead to vendor lock-in.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.