Course contentsShow
Cloud and Infrastructure
Lesson 7 of 2,9891. Cloud Computing FundamentalsFree lesson

Shared Responsibility Model

Learn how security and operational responsibilities are divided between cloud provider and customer.

Shared Responsibility Model

What you'll learn: How security and operational responsibilities are split between you and your cloud provider.

What Is the Shared Responsibility Model?

When you use cloud computing, you're not alone in managing everything. The Shared Responsibility Model is a framework that defines which security and operational tasks belong to the cloud provider and which belong to you (the customer). Think of it like renting an apartment: the landlord maintains the building's structure and plumbing, while you're responsible for locking your door and keeping your belongings safe.

How Responsibilities Are Divided

The Cloud Provider's Responsibilities ("Security OF the Cloud")

The provider manages the underlying infrastructure:

  • Physical data centers and servers
  • Network hardware and connectivity
  • Virtualization software
  • Power, cooling, and physical security

Your Responsibilities ("Security IN the Cloud")

As the customer, you control what you put in the cloud:

  • Your data and how it's encrypted
  • User access and permissions
  • Application configurations
  • Operating system updates (depending on service type)

Why This Matters

Understanding this division prevents dangerous assumptions. You might think your cloud provider automatically secures everything, but you're still responsible for setting strong passwords, managing who can access your data, and configuring security settings properly. Similarly, you don't need to worry about the physical security of data centers—that's the provider's job.

The exact split varies based on the service type you use, but the principle remains: the cloud provider secures the foundation, while you secure what you build on top of it.

Key Takeaway: In cloud computing, security is a partnership—the provider protects the infrastructure, while you protect your data, access, and configurations.