The Shared Responsibility Model for Security in The Cloud (IaaS, PaaS & SaaS)

Cloud security incidents are skyrocketing. In fact, nearly half (45%) of all security incidents target cloud-based services. Another angle: 80% of business organizations experienced at least one cloud security breach incident last year. (Arguably the worst part here is that, when a system is breached, the average dwell time is 9 weeks.)

Still, over 72% of businesses plan to continue investing in the cloud. So how do you make cloud computing a secure environment for sensitive business information?

The answer is the shared responsibility model. Its name makes it clear: in the shared responsibility model, the customer and the vendor share responsibilities. But which ones belong to who? And how did we get to this spot?

Let’s look at both sides of cloud computing and we’ll see where the shared responsibility model lands.

Opposition: The security of cloud computing

Critics of cloud computing believe that sensitive business information should never leave the IT networks operated and controlled within your own in-house data centers. And compliance regulations mandate similar security measures in some cases — restricting the use of public cloud services running on data centers that run in another country, for instance.

This makes sense as any data transmitted over public networks is subject to cybersecurity risks. Any security vulnerability within the network of the cloud vendor can expose your information to security risks. Plus, you no longer control how the underlying systems are maintained, managed, upgraded and improved for security.

In favor of cloud security

Proponents of cloud computing present a compelling argument against this concern: multi-billion cloud vendors are better suited to handle sensitive business information for two main reasons:

An average SMB firm may not face a similar magnitude of cybersecurity risks, but they also cannot rival established tech giants in securing information within large cloud-based data center systems.

So which perspective is more compelling?

(Read our full cloud security explainer.)

The shared responsibility model: meeting in the middle

In practice, the cloud computing industry meets in the middle: it offers limited visibility and control into the infrastructure systems, which are managed and operated by the vendor. However, they offer the necessary security tooling and capabilities that give a user control over the security of their own data.

As such, they follow a shared security responsibility model, where both the cloud vendor and customer are expected to adopt certain security controls depending on the type of service.

Security controls in a shared responsibility model

These security controls usually run along these lines:

What the cloud vendor is responsible for

The cloud vendor manages, operates and controls the infrastructure operations from the virtualization layer all the way to the hardware device security. These include:

There are plenty of cloud vendors out there, and of course you’ll recognize the Big 3 of AWS, Azure and GCP.

What the customer is responsible for

The cloud customer — you, or your organization — is responsible for managing the security of data and the guest operating system, including:

Customers must encrypt the data and adopt authentication systems to ensure security of their workloads based on the necessary security policies.

Are any functions shared?

Depending on the cloud vendor, some security functions may be shared. These include security training and awareness, patch management and configuration management — both the cloud vendor and customer share the security responsibilities for resources they control.

Shared responsibilities vary in SaaS, PaaS & IaaS

So, that’s a brief rundown of shared responsibility, but when it comes to security, there is some variation. Security responsibilities vary between different cloud service classifications: IaaS, PaaS and SaaS. Here’s the general rule of thumb:

Yet, these responsibilities can vary depending on the vendor, service offering and contract with the cloud vendor. So, whichever vendor(s) you’re investigating, be sure to ask for their breakdowns of shared responsibilities.

Above is Splunk Protects, our overall portal for data privacy, security and compliance. We especially like TechTarget’s graphic breakdown:

Shared responsibility best practices

It’s therefore best to follow standard practice when it comes to cloud security responsibility:

You can, however, shift and modify responsibilities to the cloud by:

The latter corresponds to adopting a cloud-native approach to software development, using microservices and PaaS instead of using in-house private cloud deployments, for instance.

It’s also important to understand that delegating security responsibility to the vendor — such as by avoiding an IaaS service in favor of a more managed PaaS or even SaaS service — can also potentially lead to vendor lock-in.

Related Articles

Top LLMs To Use in 2026: Our Best Picks
Learn
11 Minute Read

Top LLMs To Use in 2026: Our Best Picks

Discover the best large language models (LLMs) of 2026, their features, use cases, and how they’re transforming industries with cutting-edge AI capabilities.
Data Lake vs. Data Warehouse: Definitions, Key Differences, and How to Integrate Data Storage Solutions
Learn
10 Minute Read

Data Lake vs. Data Warehouse: Definitions, Key Differences, and How to Integrate Data Storage Solutions

Data Lake vs Data Warehouse, in this post, we are going to discuss what they are, their differences, some use cases, and more.
What Is Adaptive AI? Definition & Use Cases
Learn
7 Minute Read

What Is Adaptive AI? Definition & Use Cases

Adaptive artificial intelligence (AI) is the next generation of AI systems. It can adjust its code for real-world changes.