Shared Security Responsibility Model for IaaS | Customer Responsibility for Cloud Security | Exam Question Answer

Customer Responsibility for IaaS Security

Question

In a shared security responsibility model for IaaS, which two layers of the stack does the customer share responsibility for? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

CD.

In an IaaS (Infrastructure as a Service) environment, the cloud service provider and the customer share security responsibilities according to a shared security responsibility model. This model defines which security tasks are the responsibility of the cloud service provider and which ones are the responsibility of the customer.

The IaaS stack can be divided into several layers, including hardware, virtualization, network, storage, and applications.

In this context, the customer is typically responsible for securing the higher layers of the stack, including the following:

  1. Access Policies: The customer is responsible for managing access control to their cloud resources, including user authentication, authorization, and identity management.

  2. Network Security: The customer is responsible for securing the network layer of their IaaS environment, including the configuration of firewalls, load balancers, and network access controls.

The cloud service provider is typically responsible for securing the lower layers of the stack, including the following:

  1. Hardware: The cloud service provider is responsible for the physical security of the data centers and the hardware infrastructure that hosts the customer's virtual machines.

  2. Storage Encryption: The cloud service provider is responsible for encrypting data at rest on the storage devices that are used by the customer's virtual machines.

  3. Boot: The cloud service provider is responsible for securing the boot process of the virtual machines.

It's important to note that the specific responsibilities of the cloud service provider and the customer may vary depending on the IaaS provider and the service level agreement (SLA) that governs the relationship between the two parties. Therefore, it's important to carefully review the SLA and the shared security responsibility model before deploying any workloads in an IaaS environment.