EPC Group - Enterprise Microsoft AI, SharePoint, Power BI, and Azure Consulting
Clutch Top Power BI & Data Solutions Company 2026, G2 High Performer, Momentum Leader, Leader Awards
BlogContact
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌

EPC Group

Enterprise Microsoft consulting with 28+ years serving Fortune 500 companies.

(888) 381-9725
contact@epcgroup.net
4900 Woodway Drive - Suite 830
Houston, TX 77056

Follow Us

Solutions

  • All Services
  • Microsoft 365 Consulting
  • AI Governance
  • Azure AI Consulting
  • Cloud Migration
  • Microsoft Copilot
  • Data Governance
  • Microsoft Fabric
  • vCIO / vCAIO Services
  • Large-Scale Migrations
  • SharePoint Development

Industries

  • All Industries
  • Healthcare IT
  • Financial Services
  • Government
  • Education
  • Teams vs Slack

Power BI

  • Case Studies
  • 24/7 Emergency Support
  • Dashboard Guide
  • Gateway Setup
  • Premium Features
  • Lookup Functions
  • Power Pivot vs BI
  • Treemaps Guide
  • Dataverse
  • Power BI Consulting

Company

  • About Us
  • Our History
  • Microsoft Gold Partner
  • Case Studies
  • Testimonials
  • Blog
  • Resources
  • Contact

Microsoft Teams

  • Teams Questions
  • Teams Healthcare
  • Task Management
  • PSTN Calling
  • Enable Dial Pad

Azure & SharePoint

  • Azure Databricks
  • Azure DevOps
  • Azure Synapse
  • SharePoint MySites
  • SharePoint ECM
  • SharePoint vs M-Files

Comparisons

  • M365 vs Google
  • Databricks vs Dataproc
  • Dynamics vs SAP
  • Intune vs SCCM
  • Power BI vs MicroStrategy

Legal

  • Sitemap
  • Privacy Policy
  • Terms
  • Cookies

© 2026 EPC Group. All rights reserved.

Back to Blog

What Is the Azure Shared Responsibility Model? Tips for Cloud Security

Errin O\'Connor
December 2025
8 min read

The Azure shared responsibility model defines which security tasks are handled by Microsoft as the cloud provider and which remain the responsibility of your organization as the customer. Misunderstanding this division is the root cause of 82% of cloud security breaches, according to IBM. For enterprise organizations in regulated industries, clearly understanding and acting on your responsibilities within this model is not optional -- it is the foundation of your entire cloud security posture.

At EPC Group, our cloud security architects have spent over 28 years implementing security frameworks for healthcare (HIPAA), financial services (SOC 2), and government (FedRAMP) organizations. This guide breaks down the shared responsibility model across every Azure service type and provides actionable tips for securing your cloud workloads.

How the Shared Responsibility Model Works

The shared responsibility model divides security obligations between Microsoft (the cloud provider) and your organization (the customer). The division of responsibility shifts depending on the service model you use: IaaS, PaaS, or SaaS.

Microsoft's Responsibilities (Always)

Regardless of service model, Microsoft is always responsible for:

  • Physical Security: Data center facilities, physical access controls, environmental protections (fire suppression, cooling, power redundancy)
  • Network Infrastructure: Core network fabric, DDoS protection at the infrastructure level, network redundancy
  • Host Infrastructure: Physical servers, storage hardware, and hypervisor security
  • Compliance Certifications: Maintaining Azure's 100+ compliance certifications including SOC 1/2/3, ISO 27001, HIPAA, and FedRAMP

Customer Responsibilities (Always)

Regardless of service model, your organization is always responsible for:

  • Data Classification and Protection: Classifying data sensitivity levels and applying appropriate encryption and access controls
  • Identity and Access Management: Managing user accounts, authentication policies, conditional access, and privilege levels
  • Device Security: Securing endpoints (laptops, phones, tablets) that access cloud resources
  • Account Security: Protecting administrative credentials, implementing MFA, and monitoring for compromised accounts

Responsibility Matrix by Service Model

Security LayerIaaS (VMs)PaaS (App Service)SaaS (M365)
Physical Data CenterMicrosoftMicrosoftMicrosoft
Network ControlsCustomerSharedMicrosoft
Operating SystemCustomerMicrosoftMicrosoft
ApplicationCustomerCustomerMicrosoft
Identity & AccessCustomerCustomerCustomer
DataCustomerCustomerCustomer

Actionable Security Tips for Each Service Model

IaaS Security Tips (Azure Virtual Machines)

With IaaS, you have the most control and the most responsibility. Treat Azure VMs like on-premises servers with additional cloud-specific security layers:

  • Patch Management: Implement Azure Update Manager to automate OS and application patching across all VMs. Unpatched systems are the second-most exploited attack vector after credential compromise.
  • Network Security Groups (NSGs): Apply NSGs to every subnet and NIC. Deny all inbound traffic by default, then open only required ports to specific source IP ranges.
  • Just-In-Time (JIT) VM Access: Enable JIT access in Microsoft Defender for Cloud to eliminate persistent open management ports (RDP, SSH). JIT opens ports only when needed and auto-closes them after a defined period.
  • Disk Encryption: Enable Azure Disk Encryption (BitLocker for Windows, DM-Crypt for Linux) on all VM disks. Use customer-managed keys in Azure Key Vault for maximum control.
  • Endpoint Protection: Deploy Microsoft Defender for Endpoint on every VM for real-time malware detection, EDR, and threat hunting.

PaaS Security Tips (App Service, Azure SQL, Functions)

  • Private Endpoints: Use Azure Private Endpoints to ensure PaaS services are accessible only through your virtual network, not the public internet.
  • Managed Identity: Use Azure Managed Identities instead of storing connection strings and API keys in application code or configuration files.
  • WAF Protection: Deploy Azure Web Application Firewall (WAF) on Application Gateway or Azure Front Door to protect web applications from OWASP Top 10 threats.
  • SQL Security: Enable Azure SQL Advanced Threat Protection, Transparent Data Encryption (TDE), and SQL auditing for all databases.
  • Key Vault: Store all secrets, certificates, and encryption keys in Azure Key Vault with access policies and audit logging.

SaaS Security Tips (Microsoft 365, Dynamics 365)

  • Conditional Access: Implement conditional access policies that enforce MFA, device compliance, and location-based access restrictions for all SaaS applications.
  • Data Loss Prevention (DLP): Configure Microsoft Purview DLP policies to prevent sensitive data (PII, PHI, financial data) from being shared externally.
  • Sensitivity Labels: Apply Microsoft Information Protection sensitivity labels to classify and protect documents, emails, and meetings based on content sensitivity.
  • Cloud App Security: Deploy Microsoft Defender for Cloud Apps (CASB) to monitor SaaS application usage, detect shadow IT, and enforce data protection policies.
  • Privileged Access: Implement Privileged Identity Management (PIM) for time-limited, approval-based elevation of administrative privileges.

Building a Cloud Security Operations Center

For enterprise organizations, cloud security requires continuous monitoring and response capabilities:

  • Microsoft Sentinel: Cloud-native SIEM that aggregates security data from Azure, Microsoft 365, on-premises, and third-party sources into a unified threat detection and response platform
  • Microsoft Defender for Cloud: Continuous security assessment with secure score, recommendations, and workload protection across Azure, AWS, and GCP
  • Microsoft Defender XDR: Extended detection and response across endpoints, email, identity, and cloud applications
  • Azure Policy: Automated enforcement of organizational standards and compliance requirements across all Azure subscriptions

How EPC Group Can Help

EPC Group's security architects specialize in implementing the shared responsibility model for enterprise organizations in regulated industries. With 28+ years of experience, we provide:

  • Cloud security assessments benchmarked against CIS, NIST, and industry-specific frameworks
  • Shared responsibility gap analysis identifying unaddressed customer responsibilities
  • Microsoft Defender for Cloud deployment and secure score optimization
  • Microsoft Sentinel SIEM implementation with custom detection rules and automated response
  • Zero-trust architecture design and implementation using Microsoft Entra ID
  • Compliance framework implementation for HIPAA, SOC 2, FedRAMP, and PCI DSS

Secure Your Cloud with Confidence

Do not leave gaps in your cloud security posture. Our security architects will assess your shared responsibility coverage, identify vulnerabilities, and implement the controls needed to protect your data and maintain compliance.

Schedule a Security AssessmentCall (888) 381-9725

Frequently Asked Questions

Does the shared responsibility model mean Microsoft handles our security?

No. Microsoft secures the cloud infrastructure, but you are responsible for securing what you put in the cloud -- your data, identities, applications, and access configurations. Even with SaaS services like Microsoft 365, you must configure conditional access policies, DLP rules, sensitivity labels, and administrative controls. The shared responsibility model means security is a partnership, not a delegation.

How does the shared responsibility model apply to HIPAA compliance?

Microsoft signs a Business Associate Agreement (BAA) that covers their responsibilities for HIPAA compliance within Azure infrastructure. However, the customer remains responsible for configuring services to be HIPAA-compliant: encrypting PHI at rest and in transit, implementing access controls, maintaining audit logs, conducting risk assessments, and establishing breach notification procedures. Simply running workloads on Azure does not make them HIPAA-compliant -- proper configuration is required.

What is the most commonly overlooked customer responsibility?

Identity and access management is the most frequently overlooked and the most exploited attack vector. 80% of cloud breaches involve compromised credentials. Organizations often deploy cloud resources without implementing MFA, conditional access, privileged access management, and regular access reviews. These are all customer responsibilities regardless of service model. EPC Group prioritizes identity security as the first step in any cloud security engagement.

How do we track our shared responsibility coverage?

Microsoft Defender for Cloud provides a Secure Score that measures your security posture against best practices. Azure Policy enforces compliance with organizational standards. Microsoft Compliance Manager maps your compliance status against regulatory frameworks (HIPAA, SOC 2, NIST). Together, these tools provide continuous visibility into your shared responsibility coverage and highlight gaps that need attention.

Does using a managed service provider change the shared responsibility model?

A managed service provider like EPC Group does not change the shared responsibility model between Microsoft and the customer. Instead, the MSP acts on behalf of the customer to fulfill the customer's responsibilities. This is formalized through service level agreements, RACI matrices, and potentially a BAA (for HIPAA). The customer retains ultimate accountability, but the MSP provides the expertise and operational capacity to meet those responsibilities effectively.