Content library
Security responsibilities (SSRM)
Implementing and monitoring Shared Security Responsibility Model

Other tasks from the same security theme

Task name
Priority
Status
Theme
Policy
Other requirements
Consideration of Shared Security Responsibility Model (SSRM)- responsibilities when doing internal audits
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Partner management
Security responsibilities (SSRM)
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Consideration of Shared Security Responsibility Model (SSRM)- responsibilities when doing internal audits
1. Task description

In its internal auditing procedures and in conducting internal audits, the organization shall take into account that, with respect to the digital services provided, the audits seek to assess the implementation of security responsibilities from a supply chain perspective. If necessary, the audit must also take into account e.g. customer service level promises.

Implementing and monitoring Shared Security Responsibility Model
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Partner management
Security responsibilities (SSRM)
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Implementing and monitoring Shared Security Responsibility Model
1. Task description

The organization shall ensure that, in its provision / use of cloud services, it meets the areas of shared responsibility for which it is responsible for each service / system.

Documentation of the responsibility for organizing CSA CCM controls for provided digital service
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Partner management
Security responsibilities (SSRM)
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Documentation of the responsibility for organizing CSA CCM controls for provided digital service
1. Task description

When providing digital services to customers as a cloud service, the responsibility for the safe use of the service lies with both the service provider and the customer. For example, the service provider may be responsible for the technical security of the service, but the customer is responsible for managing access and instructing the correct use of the service.

For each digital service provided, the organization must review the CSA CCM controls and document who is responsible for implementing each control. Relevant responsibility choices include:

  • service provider is fully responsible
  • customer is fully responsible
  • service provider is responsible, but has outsourced the implementation
  • responsibility is shared between the service provider and customer
  • shared implementation between the service provider and the third party, but the service provider is responsible

In addition, based on the choice of responsibilities, the service provider must describe either:

  • how the service provider has implemented the control
  • which part of the control is the customer's responsibility
  • why the control is not suitable

To accomplish this, use Cyberday's CSA CCM Compliance Report (to illustrate implementation) and the Consensus Assessments Initiative Questionnaire (CAIQ) template provided by CSA.

Communicating Shared Security Responsibility Model(SSRM) to the clients
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Partner management
Security responsibilities (SSRM)
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Communicating Shared Security Responsibility Model(SSRM) to the clients
1. Task description

The organization must inform and guide the customer using the digital service about the distribution of security responsibilities between the various organizations in the supply chain.

Defining the policy for the Shared Security Responsibility Model(SSRM) in offered digital services
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Partner management
Security responsibilities (SSRM)
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Defining the policy for the Shared Security Responsibility Model(SSRM) in offered digital services
1. Task description

When providing digital services to customers as a cloud service, the responsibility for the secure use of the service lies with both the service provider and the customer. For example, the service provider may be responsible for the technical security of the service, but the customer is responsible for managing access and instructing the proper use of the service.

The organization must define how the implementation of the "Shared Security Responsibility Model" (SSRM) for the digital services provided will be implemented. Content related to the Shared Security model must be reviewed at least annually.

Reviewing Shared Security Responsibility Model - documentation for critical data systems in use
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Partner management
Security responsibilities (SSRM)
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Reviewing Shared Security Responsibility Model - documentation for critical data systems in use
1. Task description

The organization must review and verify Shared Security Responsibility Model (SSRM) documentation with critical systems used by the organization. System supplier must review issues that come up.

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.

Security frameworks tend to share the common core. All frameworks cover basic topics like risk management, backup, malware, personnel awareness or access management in their respective sections.
Cyberday’s universal cyber security language technology creates you a single security plan and ensures you implement the common parts of frameworks just once. You focus on implementing your plan, we automate the compliance part - for current and upcoming frameworks.
Start your free trial
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.
No items found.