什么是共同责任模式? 

The shared responsibility model (SRM) is an underst和ing between the cloud service provider (CSP) 和 an end-user of its services. This agreement says that a CSP will be responsible for securing the platform infrastructure of its cloud operations while an end-user is responsible for securing the workloads running on the cloud platform.

的确, Gartner下划线 csp的客户需要彻底理解协议, stating that CSPs cannot offer complete security 和 security leaders must underst和 the scope of their responsibilities for security in the cloud. This is especially true for an organization in the process of migrating all or a portion of their workloads to the cloud.

因此, it would be most ideal for the architects building a cloud to take into 账户 the specific security implications of the environment in which they want to operate. This will help all stakeholders to get a more complete picture of the risks 和 responsibilities the business is taking on in 迁移到云. A lack of underst和ing in the concept of SRM as it relates to a specific organization 和 their CSP could result in the misconception that the CSP is responsible for security of a certain area – which could then lead to misconfigurations 和/or improperly secured cloud assets.

Underst和ing your role in the SRM can help you both uphold your responsibilities with regard to your CSP as well as implement 和 enforce 云安全 最佳实践,如定期漏洞扫描.

云服务提供商的责任共享模型

让我们看一下一些顶级csp是如何为其环境定义srm的. 毕竟, this information will be key in finding the best-fitting provider for your organization's unique needs. 

AWS责任共享模型

This model states that AWS is responsible for the security of the cloud while customers are responsible for security in the cloud. While AWS works to keep its infrastructure safe, customers are in charge of IT controls such as 加密身份和访问管理(IAM), patching guest operating systems, configuring 数据库, employee cybersecurity training.

微软Azure共享责任模型

该模型表明,在本地数据中心中,客户拥有整个堆栈. 随着客户迁移到云,一些责任转移到微软. 这些职责将根据栈部署的类型而有所不同.

对于所有的云部署类型,客户拥有自己的数据和身份. 他们有责任保护这些数据和身份的安全, 本地资源, 以及它们控制的云组件. 无论部署类型如何, 客户将始终保留以下数据, 端点, 账户, 以及访问管理职责.

谷歌云平台(GCP)责任共享模型

This model states that an in-depth underst和ing is required for each service a customer uses, along with the configuration options each service provides 和 what Google Cloud does to secure the service. 每个服务都有不同的配置文件, 而且很难确定最佳的安全配置.

The customer is the expert in knowing the security 和 regulatory requirements for their business 和 knowing the requirements for protecting confidential data 和 resources. GCP 还引入了“共命运”的概念,” which enables a customer to essentially purchase the right to pass a responsibility on to GCP.

云交付模型的责任共享模型

现在,让我们看看SRM是如何基于 云模式的类型 商业运作的基础. Under each heading below are listed the components a CSP is responsible for 和 those for which a customer is responsible. 

要记住的是,当我们从上到下移动每个区域时, CSP管理着越来越多的组件. 因此, 客户获得了越来越多的便利和安心, 但定制能力较差. 

基础设施即服务(IaaS)

CSP负责: 

  • 虚拟化
  • 固件
  • 硬件

客户负责: 

  • 用户访问
  • Data
  • 功能
  • 运行时/应用程序
  • 容器
  • 操作系统

平台即服务(PaaS)

CSP负责: 

  • 容器
  • 操作系统
  • 虚拟化
  • 固件
  • 硬件
  • 运行时/应用程序(部分)

客户负责: 

  • 用户访问
  • Data
  • 功能
  • 运行时/应用程序(部分)

功能即服务(FaaS)

CSP负责: 

  • 容器
  • 操作系统
  • 虚拟化
  • 固件
  • 硬件
  • 运行时/应用程序

客户负责: 

  • 用户访问
  • Data
  • 功能

在完全定制的本地基础设施中,用户可以, 当然, 负责上面列出的所有方面. 

实践中的责任分担模式

对SRM通常包含的内容进行更技术性的总结, many experts would say that the customer is responsible for anything they can change/add/remove/reconfigure in their cloud environment. 如果他们没有能力修改某些东西, odds are the oversight responsibility for that aspect of cloud operations falls to the CSP.

然而,如上所述,可能存在重叠的领域. 这些灰色地带也被称为共享控制区, need to be intricately known by both CSPs 和 their customers for operations to run as smoothly as possible. 例如,就AWS而言,共享控制区域将包括以下方面 补丁管理、配置管理 基础设施即代码(IaC), 安全意识培训. 为什么这些区域是共享的?

具体地说, AWS将负责修补和修复其基础设施中的缺陷, while customers are responsible for patching their guest operating system 和应用程序. 类似的, AWS维护其基础设施的配置, 但是客户要负责配置自己的操作系统, 数据库, 和应用程序.

最后, it is incumbent upon both AWS 和 its cloud customers to provide 安全意识培训 to their respective employee organizations. These shared control areas only help to strengthen the abilities of both CSPs 和 their customers to secure the areas for which they are solely responsible.

共同责任模式的好处是什么?

SRM的好处是按照下面的好处来定义的 迁移到云 能产生. As a customer, you're engaging with a partner – just make sure it’s one you can trust.

  • 可伸缩性:在CSP生态系统的平台内, a customer can expand security capabilities as much or a little as is needed at a given time. Major cloud providers like those we talked about above will have the innate ability to expand as your business’ operational needs dem和. CSP的安全体系结构将始终按照SRM进行定义. 因此, customers can feel confident in expanding their own data security protocols as needed.
  • 协作如上所述, SRM鼓励在安全方面明确责任. 因此,客户业务的利益来自于该部门. There is less of a security burden in the cloud operations SRM than would exist when a customer builds on-prem operational capabilities from the ground up.
  • 建筑的力量: Working with a trusted 和 well-reputed CSP can provide great peace of mind to a customer worried about data security on a provider’s cloud. Fully taking advantage of a CSP’s security data analytics technologies 和 strong architecture is a fantastic benefit of the SRM.

共同责任模式最佳实践

最佳实践显然取决于您的组织的独特需求. 因此,让我们看一下可靠SRM的一些更通用的最佳实践. 

  • 是否有适当的服务水平协议(SLA): An SLA will help you thoroughly underst和 the nature of the CSP's security operations 和 expectations of themselves 和 their clients. SLA还将为CSP阐明他们对您的组织的期望.
  • 将职责委派给CSP: If you’ve done your homework in shopping for a cloud provider, hopefully you can trust them. It’s still ideal for your organization to not get stuck with a security responsibility that should clearly lie under the CSP’s purview.
  • 确保遵从性当涉及到……的时候,灰色地带是不好的 保持合规 with federal or territory-m和ated regulations or your organization’s own compliance goals. 因此, 仅仅通过确保SRM中责任的明确性, you 和 a potential CSP will be able to maintain good hygiene when it comes to internal 和 external compliance policies.

阅读更多

云安全:最新的Rapid7博客文章

电子书:使用AWS上的Rapid7加强您的容器化应用程序