Dark Arts
  • index
  • BUY ME A BOOK
  • 🪄Dark Magic
    • Pentesting
      • Industry Methodologies
    • Scopes of Testing
    • Reconnaissance
      • Passive
        • WHOIS
        • DNS
          • nslookup
          • dig
        • WAF
        • Subdomain
        • Google Dork
        • Misc. Techniques
        • Leaked Passwords
      • Active
        • Browser & Plugins
        • ping & traceroute
        • fping
        • telnet & netcat
        • DNS
          • Zone Transfer
          • DNS Amplification DDoS Attack Breakdown
        • Misc. Techniques
    • Vulnerability Assessment
    • Attack Types
  • 🕷️Aragoogs Nest
    • Web Application Overview & Security
      • Security Testing
      • Common Threats & Risks
    • Web Application Architecture
      • Technologies
    • HTTP/S
      • Message
      • Request
      • Response
        • Status Code
    • Crawling/Spidering
  • 🧪Potions
    • Web Browsers
    • Computer Networking
      • Network Protocol
      • Packets
      • OSI Layer
        • Layer 3: Network
        • Layer 4: Transport
      • DNS
        • Primary-Secondary
        • Local Name Resolution
        • Domain Hierarchy
        • FQDN
        • Lookups
        • DNS Resolution
        • DNS Records
        • Security: Attack-Defense (Default)
  • 🎆Spells
    • 📜Linux Scroll
    • 📜WebShell Scroll
    • git
      • Attacks + Vulnerabilities
  • 🖼️Flaws w/ Magical Frameworks
    • Windows
      • In a Nutshell
      • CVE-2019-0708: BlueKeep
      • CVE-2017-0144: EternalBlue: MS17-010
      • Attacking Services
        • MS IIS - WebDAV
        • SMB
        • HTTP File Server (HFS)
        • Apache Tomcat Web Server
        • RDP
        • WinRM
      • File System Vulnerabilities
      • Credential Dumping
        • Password Search in Windows Configuration Files
        • Mimikatz
        • Pass-the-Hash Attack
    • Linux
      • In a Nutshell
      • CVE-2014-6271: Shellshock
      • Attacking Services
        • FTP
        • SSH
        • SAMBA
        • SMTP
        • RSYNC
      • Dumping Hashes
  • 🌼Marauder's Boost
    • Privilege Escalation
    • Windows PrivEsc
      • Windows Kernel Exploit
      • Bypassing UAC
      • Access Token Impersonation
    • Linux PrivEsc
      • Linux Kernel Exploit
      • Misconfigured Cron Jobs
      • Exploiting SUID Binaries
      • shells
      • File Permissions
  • ☠️Death Eaters
    • Post Exploitation
      • Windows
      • Linux
  • 🪄OLLIVANDERS
    • nmap
      • Host Discovery
      • Port Scan
      • Service & OS
      • NSE
      • Firewall/IDS Evasion
      • Scan Optimization
      • Misc. Methods
    • ffuf
    • Hydra
    • Metasploit Framework
      • Architecture
      • Must to Know
      • msfvenom
      • Auxiliary Modules
      • Service Enumeration
      • Vulnerability Scanning
      • Imports
      • Automating
    • Vulnerability Scanners
    • Wireshark
  • 🚂Platform 9(3/4)
    • Auth-Auth
      • Authentication
        • Password-based Authentication
        • Basic Authentication
        • Multi-factor Authentication
        • Access Token
        • Token-based Authentication
          • JWT
          • OAuth 2.0
    • Secure Headers
      • Content-Security-Policy (CSP)
    • Cryptography
      • Caesar Cipher
  • ⛲Port Pensieve
    • Enumeration
      • SMB & NetBIOS
      • SNMP
    • Wordlists
  • 🔆DUELS
    • Pivoting
    • SMB Relay Attack
  • 🗺️Marauder's Map
    • Web Application Pentesting
    • API Pentesting
      • GraphQL
        • Primer
    • Mobile Application Pentesting
  • 🎧SIDE CHANNEL
    • Side Channel Analysis
    • Timing Side-Channel Attacks
      • Vulnerable Login
  • 🥃Sky
    • Cloud Basics
    • Cloud Management
      • Shared Responsibility Model
    • Using Cloud Resources
      • Monitoring & Alerts
      • Identity & Access Management
      • Scalability & Availability
      • Solution Design
    • Cloud Providers
    • Cloud Security & Regulatory Compliance
      • Resource Protection
      • ICCA: Cloud Security & Regulatory Compliance
    • ICCA Preparation
      • Knowledge Tests
      • Lab
  • 🔷Obsidian
    • Pentest Engagement
      • Scoping
    • Pentest Ethics
      • Rules of Engagement
    • Auditing Fundamentals
      • Process/Lifecycle
      • Pentest & Security Auditing
      • GRC
      • Standards, Frameworks & Guidelines
      • From Audit to Pentest
  • 💢Threat Modeling
    • Why Threat Model?
  • 📡THREAT INTEL
    • Threat Intelligence
    • Tool Dump
  • 📱Anything-Mobile-IoT
    • Firmware
    • Firmware Analysis
      • Example: CVE-2016-1555
    • Firmware Installation/Flashing
  • 🎉Mischeif
    • Social Engineering
    • Phishing
      • GoPhish
    • Pretexting
Powered by GitBook
On this page
  • Management Responsibility
  • Responsibility Breakdown by Service Model
  • Security Responsibility
  • Resiliency Responsibility
  • Workload Responsibility
  1. Sky
  2. Cloud Management

Shared Responsibility Model

PreviousCloud ManagementNextUsing Cloud Resources

Last updated 9 months ago

Understanding the security and compliance structure in cloud environments can be challenging. In a cloud model, there is a shared responsibility for security:

  • Shared Responsibility Model: Security is divided between the cloud provider and the customer.

  • Customer's Responsibility (Security "in" the Cloud): Customers are responsible for securing what they put on the cloud, including data, applications, and operating systems. The level of responsibility varies depending on the cloud services used; more control over configuration requires more security management from the customer.

  • Provider's Responsibility (Security "of" the Cloud): The cloud provider is responsible for securing the underlying infrastructure, which includes the hardware, software, networking, and facilities that run the cloud services.

Think of it like building a house. The builder ensures the structure is sound and safe (the cloud provider's role), but what you put inside and how you arrange it (your data and applications) is up to you to secure and manage.

Management Responsibility

Provider Responsibilities:

  • Physical Facility: Managing the physical data centers, including the space, power, and physical security.

  • Infrastructure: Handling the hardware, networking, and storage.

  • Virtualization: Managing the virtualized resources and infrastructure components.

  • Cloud Management Plane: Overseeing the management and orchestration of cloud services.

Customer Responsibilities:

  • Identities and Subscription Access: Managing user identities, permissions, and access to their cloud resources.

Responsibility Breakdown by Service Model

Infrastructure as a Service (IaaS):

  • Customer Responsibilities:

    • Virtual Machine (O.S.): Managing the operating system on virtual machines.

    • Services: Configuring and maintaining software and services running on VMs.

    • Workload: Managing applications, data, and service configurations.

Platform as a Service (PaaS):

  • Customer Responsibilities:

    • Workload: Managing applications, data, and service configurations deployed on the platform.

Software as a Service (SaaS):

  • Customer Responsibilities:

    • Customizations: Handling data customizations, service configurations, and usage.

    • Identity and Access: Managing user identities and access within the application.

    • Good Practices & Compliance: Ensuring adherence to best practices and compliance within the application’s usage.

Security Responsibility

Cloud Service Provider (CSP) is Responsible For

  • Physical Security: Protecting the physical data centers and hardware.

  • Infrastructure Security: Securing the underlying hardware, networking, and storage.

  • Platform Security: Managing the security of the virtualized environment and cloud management plane.

  • Standards Compliance: Ensuring the cloud infrastructure meets relevant compliance standards and regulations.

Customer is Responsible For

  • Identity Security: Managing and securing user identities and access controls.

  • Data Security: Protecting data at rest and in transit, and ensuring data privacy.

  • Application Security: Implementing good security practices for applications and services.

  • Standards Compliance: Ensuring their use of the cloud services adheres to relevant compliance standards and regulations.

Resiliency Responsibility

Cloud Service Provider (CSP) Responsibility

  • Infrastructure Resiliency: Ensuring the underlying infrastructure is designed to handle failures and maintain service continuity.

  • Uptime Service Level Agreement (SLAs): Providing guarantees regarding the availability and uptime of the cloud services.

  • Service Availability: Maintaining the availability of cloud services across the infrastructure.

  • Disaster Recovery: Implementing measures and processes for recovering services in the event of a disaster.

Customer Responsibility

  • Build Resilient Applications: Designing and developing applications that can handle failures and integrate with the CSP’s built-in availability and resiliency features.

  • Implement Data Backup and Replication: Ensuring data is regularly backed up and replicated to prevent loss and facilitate recovery.

  • Business Continuity Planning: Developing and maintaining plans to ensure business operations continue in the event of disruptions or failures.

Workload Responsibility

Cloud Service Provider (CSP) Responsibility

  • SaaS Out-of-the-Box Workload Failures: Handling issues related to default configurations and failures in SaaS applications that are used as-is, without any customization.

  • Effective Software Lifecycle Management: Ensuring that lifecycle management practices are in place to maintain and update the SaaS application effectively.

Customer Responsibility

  • Workload Configuration: Customizing and configuring the applications, services, and data within the workload.

  • Application and Data Security: Securing the applications and data managed within the workload, including access controls and encryption.

  • Monitoring and Performance: Overseeing the performance and health of the applications and services, and implementing monitoring tools to track and manage workload efficiency.

🥃
Navid Fazle Rabbi on LinkedIn: #security #cloud #aws #awssecuritylinkedin
Shared responsibility in the cloud - Microsoft AzureMicrosoftLearn
Logo
What is the Shared Responsibility Model? - CrowdStrikecrowdstrike.com
Shared Responsibility Model for Resiliency - Disaster Recovery of Workloads on AWS: Recovery in the CloudDisaster Recovery of Workloads on AWS: Recovery in the Cloud
Logo
Cloud Workload SecurityCyberArk
Logo
Logo
Logo