Guest operating systems and patch ownership are one of the most commonly misunderstood parts of cloud shared responsibility.
Guest operating systems and patch ownership are one of the most commonly misunderstood parts of cloud shared responsibility. In IaaS, the provider usually secures the physical hosts, the virtualization platform, and the underlying hardware lifecycle. The customer typically still owns the guest operating system inside the virtual machine, including patching, hardening, endpoint controls, local configuration, and much of the runtime security posture above that boundary.
This matters because many teams migrate servers to cloud infrastructure and assume the provider has therefore taken over patching and host hardening. That is usually wrong for IaaS. The provider changed the substrate, not the ownership of the guest.
The stack boundary looks like this:
flowchart TD
A["Provider-owned layer"] --> B["Physical host and virtualization"]
B --> C["Customer-owned guest OS"]
C --> D["Packages, agents, local config, and runtime dependencies"]
D --> E["Application and workload controls"]
What to notice:
Customer ownership in this model often includes:
These are not legacy concerns that magically vanish in the cloud. They remain customer responsibilities because the customer still controls the guest operating environment.
1guest_os_baseline:
2 patch_window: weekly
3 critical_patch_sla_days: 7
4 local_admin_access: restricted
5 endpoint_agent: required
6 unused_services:
7 - disabled
8 ssh_or_rdp_source_scope:
9 - admin-subnet-only
What this demonstrates:
Teams miss this boundary because the provider platform feels more abstract than on-premises virtualization. The servers are no longer in the customer’s building, so teams mentally move too much of the stack to the provider. The correct boundary is not “who owns the building?” It is “who owns the guest operating environment and the workload inside it?”
A team migrates a set of internal APIs from on-premises virtual machines to cloud IaaS and says the provider now owns patching because the workload runs on cloud servers. The team still controls the guest operating systems, local packages, SSH access, and endpoint tooling. Is the team’s interpretation strong?
No. The stronger answer is that the provider owns the underlying host and virtualization foundation, but the customer still owns the guest operating system boundary and all the patching and hardening choices above it.