Browse Shared Responsibility Model

Review Questions and Scenario Exercises

Workbook-style prompts for checking shared-responsibility understanding and operating discipline.

This appendix is the study and review workbook for the guide. Use it to pressure-test whether the chapter concepts can be applied to architecture reviews, control mapping, incident coordination, and audit-style reasoning rather than only recalled as definitions.

The strongest way to use this appendix is to answer from memory first, then reopen the relevant chapter only after you have committed to a position. Shared responsibility becomes useful when you can explain not only who owns a control, but also what evidence proves that ownership is real.

    flowchart LR
	    A["Read a chapter"] --> B["Answer review prompt from memory"]
	    B --> C["Check the chapter and compare gaps"]
	    C --> D["Rewrite answer with clearer ownership and evidence"]
	    D --> E["Apply the concept to a real service or scenario"]

How to Use the Workbook

Each chapter below has four parts:

  • a review question to check conceptual recall
  • an audit-style prompt to test evidence and governance thinking
  • a scenario exercise to test applied judgment
  • a short answer lens describing what a strong response should include

If your answer never names the provider boundary, the customer boundary, the accountable owner, and the evidence source, it is probably still too vague.

Chapter 1: Shared Responsibility Model Foundations and First Principles

Review question: What does the shared responsibility model actually mean, and why is it more accurate than saying “the provider secures the cloud and the customer secures in the cloud” without further detail?

Audit-style prompt: Explain how you would demonstrate to a reviewer that your organization understands the provider boundary for one real workload rather than only using generic cloud language.

Scenario exercise: A team says, “We moved to cloud, so infrastructure security is mostly solved now.” How would you respond, and what ownership questions would you ask first?

Strong answer should include: the idea that the model shifts by service model and control area, not by marketing category alone; a clear distinction between provider and customer obligations; and an emphasis on explicit mapping over assumption.

Chapter 2: Trust Boundaries, Risk, and Control Allocation

Review question: Why is trust-boundary thinking central to the shared responsibility model?

Audit-style prompt: Describe how you would map one high-risk control across provider, customer, and internal teams while still preserving one accountable owner.

Scenario exercise: A service spans a managed provider layer, a central platform team, and an application team. The control works only if all three contribute. How do you prevent that from becoming a responsibility gap?

Strong answer should include: trust boundaries, accountability versus contribution, evidence expectations, and the difference between risk location and infrastructure ownership.

Chapter 3: Service Models and How Responsibility Shifts

Review question: How does responsibility change as you move from IaaS to PaaS to SaaS and serverless models?

Audit-style prompt: Compare the evidence you would expect for the same control in IaaS versus SaaS.

Scenario exercise: A team argues that moving from VMs to serverless removes the need for patching, logging, and access reviews. Which parts of that claim are right, and which parts are wrong?

Strong answer should include: a shifting boundary, not disappearing responsibility; examples of controls that move; and controls that remain customer-owned even in highly managed models.

Chapter 4: Infrastructure Responsibilities the Provider Usually Owns

Review question: Which infrastructure layers are usually provider-owned, and why does that matter for control mapping?

Audit-style prompt: Explain how provider evidence can support inherited infrastructure controls without proving the customer workload is secure.

Scenario exercise: An auditor asks whether physical security, host maintenance, and core network operations are controlled. How would you answer without overstating what the provider evidence proves?

Strong answer should include: inherited controls, scope limits, provider attestations as support rather than blanket proof, and the difference between infrastructure assurance and workload assurance.

Chapter 5: Customer Responsibilities the Customer Always Owns

Review question: Which customer-owned responsibilities remain regardless of service model?

Audit-style prompt: Show how you would evidence customer ownership of data handling, access governance, and misconfiguration prevention.

Scenario exercise: A workload uses only managed services, but sensitive data is overshared and role assignments drift. Why is this still a customer failure?

Strong answer should include: data handling, identity, workload behavior, tenant configuration, and the idea that abstraction changes the form of responsibility but not its existence.

Chapter 6: Identity and Access Management in the Shared Responsibility Model

Review question: Why is IAM one of the clearest examples of customer-owned responsibility in cloud and SaaS environments?

Audit-style prompt: Describe the evidence you would want for privileged-access review and service-identity governance.

Scenario exercise: A provider runs the identity service, but the customer has excessive admin roles and weak workload identity controls. Who owns the resulting risk?

Strong answer should include: provider identity capability versus customer identity governance, least privilege, review cadence, service identities, and evidence of actual access review.

Chapter 7: Data Protection, Encryption, and Privacy

Review question: Why do encryption features not automatically solve customer data-protection obligations?

Audit-style prompt: Explain how you would show ownership for retention, deletion, residency, and backup obligations in a privacy-sensitive workload.

Scenario exercise: A team says its regulated data is safe because provider-managed encryption is enabled everywhere. What else must still be reviewed?

Strong answer should include: data classification, key governance where relevant, retention and deletion logic, residency constraints, and customer accountability for data lifecycle decisions.

Chapter 8: Network Security and Exposure Management

Review question: Which network security decisions typically remain customer-owned even in cloud environments with strong provider networking?

Audit-style prompt: Describe what evidence would show that customer-managed exposure paths, segmentation, and access rules are governed properly.

Scenario exercise: A service sits behind strong provider networking, but it is attached to overly broad ingress and hybrid connectivity rules. How would you analyze the ownership gap?

Strong answer should include: segmentation, ingress and egress decisions, hybrid links, layered defense, and the difference between provider backbone security and customer exposure management.

Chapter 9: Compute, Runtime, and Operating System Security

Review question: How do compute-layer responsibilities shift across guest OS, containers, managed runtime, and serverless models?

Audit-style prompt: Compare the evidence you would request for guest patch ownership, image hygiene, and function permission scope.

Scenario exercise: A team adopts serverless and concludes that runtime security is now mostly handled by the provider. Which controls still need customer ownership?

Strong answer should include: guest OS ownership in IaaS, image and workload policy in containers, runtime behavior and dependencies, and serverless code, identity, trigger, and data controls.

Chapter 10: Logging, Monitoring, and Incident Response

Review question: Why are provider telemetry and customer telemetry complementary rather than interchangeable?

Audit-style prompt: Describe the evidence that a customer-owned detection pipeline is actually operating instead of merely enabled.

Scenario exercise: A team relies on provider health dashboards and service emails but has weak tenant logging and no alert ownership. Why is that still an observability failure?

Strong answer should include: telemetry categories, routing and retention ownership, incident handoffs, and the need for actionable customer-side evidence.

Chapter 11: Compliance, Audit, and Regulatory Interpretation

Review question: What do provider certifications actually prove, and what do they not prove?

Audit-style prompt: Explain how you would separate inherited controls, shared controls, and customer controls for a regulated workload.

Scenario exercise: A team presents provider audit reports as proof that its workload is compliant. What evidence would you still expect from the customer?

Strong answer should include: scope review, inherited versus shared controls, current customer evidence, and sector-specific interpretation that remains customer-owned.

Chapter 12: Resilience, Availability, and Business Continuity

Review question: Why is provider availability not the same thing as workload availability?

Audit-style prompt: Describe the evidence you would request to validate backup readiness, recovery objectives, and continuity planning.

Scenario exercise: A service runs on resilient managed infrastructure, but failover design, restore testing, and continuity communication are weak. How would you explain the ownership gap?

Strong answer should include: workload architecture, RPO and RTO decisions, restore validation, continuity planning, and business prioritization that remains customer-owned.

Chapter 13: SaaS, Third-Party Platforms, and Shadow Responsibility

Review question: How does shared responsibility change in SaaS without disappearing?

Audit-style prompt: Explain what a strong vendor review and tenant-governance package should include before approving a high-risk SaaS platform.

Scenario exercise: Teams adopt unsanctioned SaaS tools because they are easy to use. Why is that not just a procurement problem?

Strong answer should include: tenant configuration, user lifecycle, integration risk, vendor due diligence, and the fact that shadow IT creates unknown control boundaries.

Chapter 14: Multi-Cloud, Hybrid, and Organizational Complexity

Review question: Why does multi-cloud or hybrid design increase customer-side responsibility management rather than reduce it?

Audit-style prompt: Describe how you would map one control consistently across several providers and several internal teams.

Scenario exercise: A hybrid service outage spans on-prem identity, private connectivity, and a cloud-hosted application. What should the ownership model look like before that incident happens?

Strong answer should include: provider inconsistency, hybrid seams, internal-team accountability, guardrails, and one internal standard expressed across different technical implementations.

Chapter 15: Anti-Patterns, Failure Modes, and Responsibility Gaps

Review question: What are the most common signs that shared responsibility is being narrated but not actually operated?

Audit-style prompt: Explain how you would test whether a cloud-native tool, inherited control claim, or team handoff is real rather than theater.

Scenario exercise: An organization has provider reports, many dashboards, and many teams, but still suffers repeated preventable incidents. Which anti-patterns would you test for first?

Strong answer should include: provider-handles-that assumptions, tooling without ownership, internal ownership gaps, and the difference between documentation and current operational evidence.

Chapter 16: Operating the Shared Responsibility Model in the Real World

Review question: What structures are needed to turn shared responsibility into a living operating model?

Audit-style prompt: Describe the minimum artifacts and routines you would expect in a mature shared-responsibility program.

Scenario exercise: A company understands the model conceptually but cannot show current matrices, review checkpoints, or a maturity roadmap. What should it build first?

Strong answer should include: responsibility matrices, operating model roles, design checkpoints, evidence and cadence, and a staged maturity plan instead of a vague improvement ambition.

Cross-Chapter Synthesis Exercises

Scenario 1: Your organization is moving a regulated workload from IaaS into a mix of managed platform services and SaaS integrations. Explain how the provider boundary moves, which controls become inherited or shared, and which customer-owned controls become more important instead of less important.

Scenario 2: A major incident spans a federated identity chain, a managed cloud service, and an unsanctioned SaaS integration used by one business unit. Explain how detection, containment, provider coordination, and governance review should divide across the customer organization.

Scenario 3: An audit program claims strong cloud maturity because provider reports are current and most tools are enabled. Explain how you would test whether the organization actually has living ownership, operating evidence, and review checkpoints rather than audit theater.

Use these final scenarios when you want to see whether the whole guide has become one operating model in your mind instead of a list of separate chapters.

Revised on Thursday, April 23, 2026