ChaptersEventsBlog

Download Publication

Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services
Who it's for:
  • cloud customers
  • cloud service providers
  • third-party security services providers

Roles and Responsibilities of Third Party Security Services

Release Date: 11/30/2021

As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibilities are typically split between the CSPs and Cloud Service Customers (CSCs). However, in reality, third-party security services providers increasingly play essential roles, such as providing consultancy or managing security services for CSCs. They have a part in securing the cloud platform as well. For example, some SMEs (Small and Medium Enterprises) without security professionals may be unsure of how to secure their services and thus engage a Third-Party Security Service Provider (TPSSP) for consultancy. 

The role of TPSSP can be pivotal in the security of these SMEs. The guidelines in this document will help cloud customers when signing Service Level Agreement(SLAs) with TPSSPs.

Understand the security roles and responsibilities of TPSSPs for:
  • Identity and access management
  • Cloud Workload Protection Platform
  • Network Security
  • Data & Storage Security
  • Assessment
  • Security Analytics as a Service
  • Application Security
  • Security Support Services
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Introductory Guidance to AICM
Introductory Guidance to AICM
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
The First Question Security Should Ask on AI Projects
The First Question Security Should Ask on AI Projects
Published: 01/09/2026
How to Build a Trustworthy AI Governance Roadmap Aligned with ISO 42001
How to Build a Trustworthy AI Governance Roadmap Aligned with ISO 4...
Published: 01/07/2026
AWS Ends SSE-C Encryption, and a Ransomware Vector
AWS Ends SSE-C Encryption, and a Ransomware Vector
Published: 01/05/2026
Choosing the Right Key Responsibility Model
Choosing the Right Key Responsibility Model
Published: 01/05/2026

Interested in helping develop research with CSA?

Related Certificates & Training