ChaptersEventsBlog

Download Publication

Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services
Who it's for:
  • cloud customers
  • cloud service providers
  • third-party security services providers

Roles and Responsibilities of Third Party Security Services

Release Date: 11/30/2021

As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibilities are typically split between the CSPs and Cloud Service Customers (CSCs). However, in reality, third-party security services providers increasingly play essential roles, such as providing consultancy or managing security services for CSCs. They have a part in securing the cloud platform as well. For example, some SMEs (Small and Medium Enterprises) without security professionals may be unsure of how to secure their services and thus engage a Third-Party Security Service Provider (TPSSP) for consultancy. 

The role of TPSSP can be pivotal in the security of these SMEs. The guidelines in this document will help cloud customers when signing Service Level Agreement(SLAs) with TPSSPs.

Understand the security roles and responsibilities of TPSSPs for:
  • Identity and access management
  • Cloud Workload Protection Platform
  • Network Security
  • Data & Storage Security
  • Assessment
  • Security Analytics as a Service
  • Application Security
  • Security Support Services
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Introductory Guidance to AICM
Introductory Guidance to AICM
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
How Organizations are Addressing Cloud Investigation and Response
How Organizations are Addressing Cloud Investigation and Response
Published: 01/22/2026
Beyond Badge-Selling: Why Compliance Automation Needs Trust by Design
Beyond Badge-Selling: Why Compliance Automation Needs Trust by Design
Published: 01/21/2026
Scoping a Privacy Information Management System (PIMS) With ISO 27701:2025
Scoping a Privacy Information Management System (PIMS) With ISO 277...
Published: 01/21/2026
What Actually Makes an Agentic AI Solution Scalable?
What Actually Makes an Agentic AI Solution Scalable?
Published: 01/20/2026

Interested in helping develop research with CSA?

Related Certificates & Training