SlideShare a Scribd company logo
Shared responsibility - a
model for good cloud security
Andy Powell, Jisc
Shared responsibility - a
model for good cloud security
Andy Powell, Jisc
Mohamed Hammady, CTO
Sky
3 Shared responsibility - a model for good cloud security
“We have decided to build our data lake on
Google Cloud Platform. This is a key component
of our internal data factory transformation
programme. One of the deliverables of this
programme, which is very ambitious, is to join up
all available data in a customer-centric way. This
will allow us to progressively personalise every
customer interaction to make it quicker and more
relevant to the individual customer need.”
David Rogers, Head of Architecture and Security
Ministry of Justice
4 Shared responsibility - a model for good cloud security
“As we started to create more and more digital services AWS
became a platform for us. We started to automate the way
we were delivering these services into the cloud. We started
to consolidate the way we were working with the cloud, such
as thru our deployment pipeline and thru monitoring and
logging. What emerged was the use of that platform very
consistently across digital services for around 19 or 20
services.”
“We now have a unified API as a basis for designing, testing, and
deploying the next generation of machine learning and digital
services in the hospital for our young patients. This will also enable
rapid and easier collaboration with our international paediatric
hospital partners to share specialised tools to improve patient
outcomes and experience.”
“Partnering with Microsoft on the Azure API for Fast Healthcare
Interoperability Resources (FHIR) allows us to scale out and
accelerate our customers’ use of [data]. The managed service is a
great additional component […] bringing research and innovation
closer to clinical impact.”
Professor Neil Sebire, Chief Research Information Officer
Great Ormond Street Hospital
Rodrigo Barnes, CTO
Aridhia
5 Shared responsibility - a model for good cloud security
Darryl West, Group CIO
HSBC
6 Shared responsibility - a model for good cloud security
“HSBC is no different to most other global
enterprises. We tried for many years to build data
centres, to provision infrastructure, to buy products
and to run it all ourselves. But we decided about 18
months ago that we ought to focus on what we are
great at, which is customer experience and
focusing on our customers and partnering with
people like Google to do all the heavy lifting on
infrastructure.”
Scene setting
• Three big players in the market (yes, there are others as
well!)
• All with similar directions of travel
• Global presence (10s or 100s of data centres)
• Typically organised into Regions, Availability Zones and
Edge locations
• Service portfolio that extends well beyond traditional IaaS
• … including big data, container platforms, serverless,
database as a service, IoT, ML, AI, …
• All three talk about a shared responsibility model for
security
7 Shared responsibility - a model for good cloud security
Threat, what threat?
1. Data breaches
2. Data loss
3. Account / service compromise
4. Insecure API
5. Denial of service
6. Insider threat
7. Abuse of cloud services
8. Insufficient due diligence
9. Shared tech vulnerabilities
8 Shared responsibility - a model for good cloud security
Shared responsibility
9 Shared responsibility - a model for good cloud security
Application design, identity & access management
Operating system, network & firewall configuration
Data at rest (on-prem) Data at rest (in cloud) Data in transit
Software
Hardware / global infrastructure
Regions Availability zones Edge locations
Compute Database NetworkingStorage
Security in the
cloud (your
responsibility)
Security of the
cloud (cloud
provider’s
responsibility)
Confidentiality, Integrity, Availability
• Is access to my data restricted to the people I want to see it?
• Can I tell if my data has been tampered with?
• Can the right people get access if they need to?
10 Shared responsibility - a model for good cloud security
Confidentiality
• Access control
• Encryption
• Firewalling
Integrity
• Encryption
• Audit logs
Availability
• Global scale
• Account/subscription
config
• DDoS protection
Basic building blocks
• Regions and availability zones
• Virtual Private Clouds (VPCs) and subnets
• Security groups & Network Access Control Lists (firewalls)
• Identity and access management (cloud platform level and operating system)
• Logging of all API access
• Encryption of data at rest (option to bring your own keys and use HSM in the
cloud) including for database as a service options
• Encryption of data in transit
• DDoS protection at platform level (and WAF and DDoS available as extras,
usually bundled into edge-based CDN)
11 Shared responsibility - a model for good cloud security
Connectivity
• Most of your cloud usage is going
to be hybrid
• Connectivity will be critical, as will
securing your data in transit
• All the cloud providers provide
dedicated private connectivity
options
• However, Janet has extremely good peering arrangements
• For connectivity requirements up to 1.5Gbps bandwidth, just use Janet
• For hybrid requirements, secure data in transit using a site-to-site VPN
irrespective of whether you use Janet or not
12 Shared responsibility - a model for good cloud security
Infrastructure as Code
• All the major cloud suppliers support
infrastructure as code (IaC)
• CloudFormation, ARM Templates, Cloud
Deployment Manager
• And you can also use third-party tooling such
as Terraform
• Repeatable and re-usable deployments
• Manage your infrastructure in a code repository
• Helps to prevent accidental deployments of
insecure infrastructure
13 Shared responsibility - a model for good cloud security
Security Information and Event Management (SIEM)
14 Shared responsibility - a model for good cloud security
• Native SIEM tooling is emerging from the major cloud vendors (e.g. Sentinel on
Azure)
• However, your SIEM requirements are likely to be hybrid (and may be multi-
cloud)
• All the major SIEM vendors will
provide integration with cloud
platform logging
• Note that Jisc is partnered with
Splunk in order to provide a
hosted Splunk platform
Auto-remediation
• All cloud vendors now support serverless
• Small software ‘functions’ run on demand, typically
triggered by an API event or by a timer
• Use this approach to auto-run remediation code
• E.g. to automatically (and instantly) close down a
security group that allows world access to SSH or
RDP or to take a copy of a compromised VM, prior
to deletion, so that it can be spun up in an isolated
environment for later analysis
• Also look at Security Orchestration, Automation and
Response (SOAR) tools, e.g. CloudCustodian
15 Shared responsibility - a model for good cloud security
Third-party tooling
• Our experience is that some native tooling can be limited, especially with early
releases
• Your existing security approaches can almost always be stretched into the cloud
• Either by buying them from the marketplace
• … or by layering them in-front of cloud services
• For example, we often use Imperva Cloud WAF as an alternative to the native
WAF solutions provided by the cloud vendors
• We also use CloudCheckr for billing recommendations, security posture analysis,
and compliance status
16 Shared responsibility - a model for good cloud security
Compliance
17 Shared responsibility - a model for good cloud security
Are you well architected?
18 Shared responsibility - a model for good cloud security
Summary – 5 take-aways
1. Understand the shared responsibility model. Where does the cloud provider’s
responsibility end and yours start? How does this apply to IaaS, PaaS and
SaaS? How does this affect your compliance?
2. Use the basic building blocks to create highly resilient and secure solutions -
don’t forget the basics… firewalls, anti-malware and backups
3. It’s your data - secure it at rest (on-prem and in the cloud) and in transit -
encryption is your friend
4. If necessary, use existing security tooling to complement
what the cloud provider gives you
5. Defend in depth - follow best-practice guidance including
the NCSC 14 cloud security principles
19 Shared responsibility - a model for good cloud security
Arguably, AWS, Microsoft and Google
are now the biggest security companies
in the world
Questions?
Andy Powell, Jisc
@andypowe11
andy.powell@jisc.ac.uk
Additional reading
• AWS Compliance Programs
• Azure Compliance
• Google Compliance Resource Center
• AWS Well-Architected
• Pillars of a great Azure architecture
• Google Infrastructure Security Design Overview
• Azure Security and Compliance UK OFFICIAL Blueprint
• Standardized Architecture for UK-OFFICIAL on AWS
• NCSC Cloud security guidance
21 Shared responsibility - a model for good cloud security

More Related Content

PPTX
(ISC)2 CCSP - Certified Cloud Security Professional
PPTX
The adversary playbook - the tools, techniques and procedures used by threat ...
PPTX
Shared responsibility - a model for good cloud security
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
PDF
Extending Your Network Cloud Security to AWS
PPTX
Cloud security (domain11 14)
PDF
Secure Your Data with Fidelis Network® for DLP
PDF
Cloud Security - Emerging Facets and Frontiers
(ISC)2 CCSP - Certified Cloud Security Professional
The adversary playbook - the tools, techniques and procedures used by threat ...
Shared responsibility - a model for good cloud security
Data Security Essentials for Cloud Computing - JavaOne 2013
Extending Your Network Cloud Security to AWS
Cloud security (domain11 14)
Secure Your Data with Fidelis Network® for DLP
Cloud Security - Emerging Facets and Frontiers

What's hot (20)

PDF
Cloud Security - Kloudlearn
PDF
Cloud Security Architecture - a different approach
PDF
Cloud Cryptography
PPTX
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
PDF
Extend Network Visibility and Secure Applications and Data in Azure
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PPTX
Managing Cloud Security Risks in Your Organization
PDF
IT_RFO10-14-ITS_AppendixA_20100513
PPTX
Cloud computing security from single to multiple
PPTX
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
PDF
Fidelis Endpoint® - Live Demonstration
PPT
Brighttalk Challenges In Cloud Security
PPTX
cloud computing encrypted
PDF
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
PPT
Data security in the cloud
PDF
Cloud computing security
PDF
PRISMACLOUD Cloud Security and Privacy by Design
PDF
You can't detect what you can't see illuminating the entire kill chain
PPTX
Cloud security (domain6 10)
PPTX
Security on Cloud Computing
Cloud Security - Kloudlearn
Cloud Security Architecture - a different approach
Cloud Cryptography
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
Extend Network Visibility and Secure Applications and Data in Azure
Ensuring data security in cloud computing. - Anusha Tuke
Managing Cloud Security Risks in Your Organization
IT_RFO10-14-ITS_AppendixA_20100513
Cloud computing security from single to multiple
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Fidelis Endpoint® - Live Demonstration
Brighttalk Challenges In Cloud Security
cloud computing encrypted
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
Data security in the cloud
Cloud computing security
PRISMACLOUD Cloud Security and Privacy by Design
You can't detect what you can't see illuminating the entire kill chain
Cloud security (domain6 10)
Security on Cloud Computing
Ad

Similar to Shared responsibility - a model for good cloud security (20)

PDF
Cloud_security_v2_chpater_9_s_version.pdf
PDF
The 3 Recommendations for Cloud Security
PPTX
ShareResponsibilityModel.pptx
PDF
cloud1_aggy.pdf
PPTX
Shared Responsibility Model.pptx
PPTX
Cloud Security Solutions - Cyber security.pptx
PDF
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
PDF
Power Struggle: Balancing Relationships & Responsibility in the Cloud
PPTX
Cloud Security Fundamentals Webinar
PPTX
AWS Cloud Security
PPTX
talk6securingcloudamarprusty-191030091632.pptx
PPTX
shared-responsibilitysecurity-roadshowlondon-160317131610.pptx
PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
PPTX
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
PPTX
Scott Hogg - Gtri cloud security knowledge and certs
PDF
Lecture27 cc-security2
PDF
A study on security responsibilities and adoption in
PDF
A study on security responsibilities and adoption in cloud
PDF
Securing The Journey To The Cloud
PPTX
Cloud Security
Cloud_security_v2_chpater_9_s_version.pdf
The 3 Recommendations for Cloud Security
ShareResponsibilityModel.pptx
cloud1_aggy.pdf
Shared Responsibility Model.pptx
Cloud Security Solutions - Cyber security.pptx
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Power Struggle: Balancing Relationships & Responsibility in the Cloud
Cloud Security Fundamentals Webinar
AWS Cloud Security
talk6securingcloudamarprusty-191030091632.pptx
shared-responsibilitysecurity-roadshowlondon-160317131610.pptx
I am sharing 'Unit-2' with youuuuuu.PPTX
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
Scott Hogg - Gtri cloud security knowledge and certs
Lecture27 cc-security2
A study on security responsibilities and adoption in
A study on security responsibilities and adoption in cloud
Securing The Journey To The Cloud
Cloud Security
Ad

More from Jisc (20)

PPTX
Strengthening open access through collaboration: building connections with OP...
PPTX
Andrew-Brown-JUSP-showcase-20240730.pptx
PPTX
JUSP Showcase - Rebuilding Data presentation
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
FE Accessibility training matrix partnership - information session
PPTX
Procuring a research management system: why is it so hard?
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
How libraries can support authors with open access requirements for UKRI fund...
PPTX
Supporting (UKRI) OA monographs at Salford.pptx
PPTX
The approach at University of Liverpool.pptx
PPTX
Jisc's value to HE: the University of Sheffield
PPTX
Towards a code of practice for AI in AT.pptx
PPTX
Jamworks pilot and AI at Jisc (20/03/2024)
PPTX
Wellbeing inclusion and digital dystopias.pptx
PPTX
Accessible Digital Futures project (20/03/2024)
PPTX
Procuring digital preservation CAN be quick and painless with our new dynamic...
PPTX
International students’ digital experience: understanding and mitigating the ...
PPTX
Digital Storytelling Community Launch!.pptx
PPTX
Open Access book publishing understanding your options (1).pptx
PPTX
Scottish Universities Press supporting authors with requirements for open acc...
Strengthening open access through collaboration: building connections with OP...
Andrew-Brown-JUSP-showcase-20240730.pptx
JUSP Showcase - Rebuilding Data presentation
Adobe Express Engagement Webinar (Delegate).pptx
FE Accessibility training matrix partnership - information session
Procuring a research management system: why is it so hard?
Adobe Express Engagement Webinar (Delegate).pptx
How libraries can support authors with open access requirements for UKRI fund...
Supporting (UKRI) OA monographs at Salford.pptx
The approach at University of Liverpool.pptx
Jisc's value to HE: the University of Sheffield
Towards a code of practice for AI in AT.pptx
Jamworks pilot and AI at Jisc (20/03/2024)
Wellbeing inclusion and digital dystopias.pptx
Accessible Digital Futures project (20/03/2024)
Procuring digital preservation CAN be quick and painless with our new dynamic...
International students’ digital experience: understanding and mitigating the ...
Digital Storytelling Community Launch!.pptx
Open Access book publishing understanding your options (1).pptx
Scottish Universities Press supporting authors with requirements for open acc...

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Monthly Chronicles - July 2025
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Shared responsibility - a model for good cloud security

  • 1. Shared responsibility - a model for good cloud security Andy Powell, Jisc
  • 2. Shared responsibility - a model for good cloud security Andy Powell, Jisc
  • 3. Mohamed Hammady, CTO Sky 3 Shared responsibility - a model for good cloud security “We have decided to build our data lake on Google Cloud Platform. This is a key component of our internal data factory transformation programme. One of the deliverables of this programme, which is very ambitious, is to join up all available data in a customer-centric way. This will allow us to progressively personalise every customer interaction to make it quicker and more relevant to the individual customer need.”
  • 4. David Rogers, Head of Architecture and Security Ministry of Justice 4 Shared responsibility - a model for good cloud security “As we started to create more and more digital services AWS became a platform for us. We started to automate the way we were delivering these services into the cloud. We started to consolidate the way we were working with the cloud, such as thru our deployment pipeline and thru monitoring and logging. What emerged was the use of that platform very consistently across digital services for around 19 or 20 services.”
  • 5. “We now have a unified API as a basis for designing, testing, and deploying the next generation of machine learning and digital services in the hospital for our young patients. This will also enable rapid and easier collaboration with our international paediatric hospital partners to share specialised tools to improve patient outcomes and experience.” “Partnering with Microsoft on the Azure API for Fast Healthcare Interoperability Resources (FHIR) allows us to scale out and accelerate our customers’ use of [data]. The managed service is a great additional component […] bringing research and innovation closer to clinical impact.” Professor Neil Sebire, Chief Research Information Officer Great Ormond Street Hospital Rodrigo Barnes, CTO Aridhia 5 Shared responsibility - a model for good cloud security
  • 6. Darryl West, Group CIO HSBC 6 Shared responsibility - a model for good cloud security “HSBC is no different to most other global enterprises. We tried for many years to build data centres, to provision infrastructure, to buy products and to run it all ourselves. But we decided about 18 months ago that we ought to focus on what we are great at, which is customer experience and focusing on our customers and partnering with people like Google to do all the heavy lifting on infrastructure.”
  • 7. Scene setting • Three big players in the market (yes, there are others as well!) • All with similar directions of travel • Global presence (10s or 100s of data centres) • Typically organised into Regions, Availability Zones and Edge locations • Service portfolio that extends well beyond traditional IaaS • … including big data, container platforms, serverless, database as a service, IoT, ML, AI, … • All three talk about a shared responsibility model for security 7 Shared responsibility - a model for good cloud security
  • 8. Threat, what threat? 1. Data breaches 2. Data loss 3. Account / service compromise 4. Insecure API 5. Denial of service 6. Insider threat 7. Abuse of cloud services 8. Insufficient due diligence 9. Shared tech vulnerabilities 8 Shared responsibility - a model for good cloud security
  • 9. Shared responsibility 9 Shared responsibility - a model for good cloud security Application design, identity & access management Operating system, network & firewall configuration Data at rest (on-prem) Data at rest (in cloud) Data in transit Software Hardware / global infrastructure Regions Availability zones Edge locations Compute Database NetworkingStorage Security in the cloud (your responsibility) Security of the cloud (cloud provider’s responsibility)
  • 10. Confidentiality, Integrity, Availability • Is access to my data restricted to the people I want to see it? • Can I tell if my data has been tampered with? • Can the right people get access if they need to? 10 Shared responsibility - a model for good cloud security Confidentiality • Access control • Encryption • Firewalling Integrity • Encryption • Audit logs Availability • Global scale • Account/subscription config • DDoS protection
  • 11. Basic building blocks • Regions and availability zones • Virtual Private Clouds (VPCs) and subnets • Security groups & Network Access Control Lists (firewalls) • Identity and access management (cloud platform level and operating system) • Logging of all API access • Encryption of data at rest (option to bring your own keys and use HSM in the cloud) including for database as a service options • Encryption of data in transit • DDoS protection at platform level (and WAF and DDoS available as extras, usually bundled into edge-based CDN) 11 Shared responsibility - a model for good cloud security
  • 12. Connectivity • Most of your cloud usage is going to be hybrid • Connectivity will be critical, as will securing your data in transit • All the cloud providers provide dedicated private connectivity options • However, Janet has extremely good peering arrangements • For connectivity requirements up to 1.5Gbps bandwidth, just use Janet • For hybrid requirements, secure data in transit using a site-to-site VPN irrespective of whether you use Janet or not 12 Shared responsibility - a model for good cloud security
  • 13. Infrastructure as Code • All the major cloud suppliers support infrastructure as code (IaC) • CloudFormation, ARM Templates, Cloud Deployment Manager • And you can also use third-party tooling such as Terraform • Repeatable and re-usable deployments • Manage your infrastructure in a code repository • Helps to prevent accidental deployments of insecure infrastructure 13 Shared responsibility - a model for good cloud security
  • 14. Security Information and Event Management (SIEM) 14 Shared responsibility - a model for good cloud security • Native SIEM tooling is emerging from the major cloud vendors (e.g. Sentinel on Azure) • However, your SIEM requirements are likely to be hybrid (and may be multi- cloud) • All the major SIEM vendors will provide integration with cloud platform logging • Note that Jisc is partnered with Splunk in order to provide a hosted Splunk platform
  • 15. Auto-remediation • All cloud vendors now support serverless • Small software ‘functions’ run on demand, typically triggered by an API event or by a timer • Use this approach to auto-run remediation code • E.g. to automatically (and instantly) close down a security group that allows world access to SSH or RDP or to take a copy of a compromised VM, prior to deletion, so that it can be spun up in an isolated environment for later analysis • Also look at Security Orchestration, Automation and Response (SOAR) tools, e.g. CloudCustodian 15 Shared responsibility - a model for good cloud security
  • 16. Third-party tooling • Our experience is that some native tooling can be limited, especially with early releases • Your existing security approaches can almost always be stretched into the cloud • Either by buying them from the marketplace • … or by layering them in-front of cloud services • For example, we often use Imperva Cloud WAF as an alternative to the native WAF solutions provided by the cloud vendors • We also use CloudCheckr for billing recommendations, security posture analysis, and compliance status 16 Shared responsibility - a model for good cloud security
  • 17. Compliance 17 Shared responsibility - a model for good cloud security
  • 18. Are you well architected? 18 Shared responsibility - a model for good cloud security
  • 19. Summary – 5 take-aways 1. Understand the shared responsibility model. Where does the cloud provider’s responsibility end and yours start? How does this apply to IaaS, PaaS and SaaS? How does this affect your compliance? 2. Use the basic building blocks to create highly resilient and secure solutions - don’t forget the basics… firewalls, anti-malware and backups 3. It’s your data - secure it at rest (on-prem and in the cloud) and in transit - encryption is your friend 4. If necessary, use existing security tooling to complement what the cloud provider gives you 5. Defend in depth - follow best-practice guidance including the NCSC 14 cloud security principles 19 Shared responsibility - a model for good cloud security
  • 20. Arguably, AWS, Microsoft and Google are now the biggest security companies in the world Questions? Andy Powell, Jisc @andypowe11 andy.powell@jisc.ac.uk
  • 21. Additional reading • AWS Compliance Programs • Azure Compliance • Google Compliance Resource Center • AWS Well-Architected • Pillars of a great Azure architecture • Google Infrastructure Security Design Overview • Azure Security and Compliance UK OFFICIAL Blueprint • Standardized Architecture for UK-OFFICIAL on AWS • NCSC Cloud security guidance 21 Shared responsibility - a model for good cloud security