ComputerWeekly.com

https://www.computerweekly.com/opinion/SLA-promises-security-realities-Navigating-the-shared-responsibility-gap

SLA promises, security realities: Navigating the shared responsibility gap

By Aditya K Sood, Aryaka

The shared responsibility model (SRM) plays a central role in defining how security and operational duties are split between cloud providers and their customers. However, when this model intersects with service level agreements (SLAs), it introduces layers of complexity.

SLAs typically cover metrics like uptime, support response times and service performance, but often overlook critical elements such as data protection, breach response and regulatory compliance. This creates a responsibility gap, where assumptions about who is accountable can lead to serious blind spots. For instance, a customer might assume that the cloud provider's SLA guarantees data protection, only to realise that their own misconfigurations or weak identity management practices have led to a data breach.

Organisations may mistakenly believe their provider handles more than it does, increasing the risk of non-compliance, security incidents and operational disruptions. Understanding the nuances between SLA commitments and shared security responsibilities is vital to safely leveraging cloud services without undermining resilience or regulatory obligations.

The reality of the SRM and SLAs

The SRM fundamentally shapes the scope and impact of SLAs in cloud environments. Let’s quickly understand the reality of cloud providers’ SRM.

While an SLA guarantees the cloud provider's commitment to “the security of the cloud”, ensuring the underlying infrastructure's uptime, resilience and core security, it explicitly does not cover the customer's responsibilities for "security in the cloud." This means that even if a provider's SLA promises 99.99% uptime for their infrastructure, a customer's misconfigurations, weak identity management or unpatched applications (all part of their responsibility) can still lead to data breaches or service outages, effectively nullifying the perceived security and uptime benefits of the provider's SLA. Therefore, the SRM directly impacts the adequate security and availability experienced by the enterprise, making diligent customer-side security practices crucial for realising the full value of any cloud SLA.

Read more about cloud risk

  • Geopolitics, data sovereignty and rising costs are driving a change in cloud thinking, but it’s slow progress.
  • Familiar cloud concerns are being overshadowed by geopolitical volatility, pushing IT strategy into the boardroom. Organisations must now assess the full spectrum of cross-border dependencies to build true resilience.
  • Opportunity exists for the channel to help customers struggling to manage their cloud and hosted environments.

Several controls should be a part of a comprehensive approach to gaining access to innovative cloud technology while safeguarding your enterprise:

By adopting these strategies, IT and IT security leaders can confidently embrace innovative cloud technologies, minimising inherent risks and ensuring a strong compliance posture, even when faced with SLAs that don't initially meet every desired criterion.

The Computer Weekly Security Think Tank on cloud risk

John Bruce, Quorum Cyber: Bridging the SLA gap: A guide to managing cloud provider risk.

The bottom line

Make sure to follow the principle “own your security posture” by implementing customised security policies and not relying solely on your cloud provider. Treat security as a core component of your infrastructure and not an add-on.  Adopt and deploy unified controls to align security strategies across all environments to strengthen defences against the expanding threat landscape, thereby reducing risk and boosting resilience. Shared responsibility doesn’t mean shared blame, it means shared diligence.

Aditya K Sood is vice president of security engineering and AI strategy at Aryaka.

05 Sep 2025

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement