Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

New Resources Define Cloud Security and Privacy Responsibilities

Data protection and compliance solutions provider HITRUST has announced the release of new Shared Responsibility Matrices for Amazon Web Services (AWS) and Microsoft Azure.

Data protection and compliance solutions provider HITRUST has announced the release of new Shared Responsibility Matrices for Amazon Web Services (AWS) and Microsoft Azure.

Best known for the HITRUST CSF (Common Security Framework), the Texas-based company has worked with healthcare, technology and information security organizations to help organizations safeguard sensitive information and manage information risk.

Meant to define the security and privacy responsibilities that both cloud service providers and customers have, each HITRUST Shared Responsibility Matrix is specifically tailored for the cloud service provider’s unique solution offering and should help streamline processes for risk management programs.

Shared responsibility models mean that the cloud provider is responsible for the security of hosting applications and systems, while the customers assume responsibility for other apps and systems, but such models are loosely defined, and variations based on solution represent a challenge.

Thus, organizations looking to deploy solutions in the cloud face additional complexity when seeking to achieve risk management objectives, HITRUST notes.

HITRUST says that the freely available Shared Responsibility Matrices, which it developed in collaboration with Microsoft and AWS, are meant to “address the many misunderstandings, risks, and complexities involved when organizations leverage cloud service providers.”

Each HITRUST Shared Responsibility Matrix is built based on the HITRUST CSF framework that integrates over 40 authoritative sources. The framework includes more than 2,000 controls (activities to mitigate risks), and the Matrix shows if they are the responsibility of cloud service providers or their customers.

“HITRUST launched this Program with the goal of providing greater clarity regarding the ownership and operation of security controls between organizations and their cloud service providers,” said Becky Swain, director of standards development at HITRUST.

Advertisement. Scroll to continue reading.

The HITRUST Shared Responsibility Matrices for AWS and Microsoft Azure are available in the form of spreadsheets.

Related: Cloud Service SLA Security Tips – What Should You Be Asking Your Provider?

Related: VMware Cloud Director Vulnerability Has Major Impact for Cloud Providers

Related: Securing Data-in-Use With Confidential Computing

Related: Google Patches Privilege Escalation Vulnerability in Cloud Service

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.