ChaptersEventsBlog
Register now for NHIcon 2026, a half-day online event, to learn what the future of AI security requires.

Download Publication

Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services
Who it's for:
  • cloud customers
  • cloud service providers
  • third-party security services providers

Roles and Responsibilities of Third Party Security Services

Release Date: 11/30/2021

As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibilities are typically split between the CSPs and Cloud Service Customers (CSCs). However, in reality, third-party security services providers increasingly play essential roles, such as providing consultancy or managing security services for CSCs. They have a part in securing the cloud platform as well. For example, some SMEs (Small and Medium Enterprises) without security professionals may be unsure of how to secure their services and thus engage a Third-Party Security Service Provider (TPSSP) for consultancy. 

The role of TPSSP can be pivotal in the security of these SMEs. The guidelines in this document will help cloud customers when signing Service Level Agreement(SLAs) with TPSSPs.

Understand the security roles and responsibilities of TPSSPs for:
  • Identity and access management
  • Cloud Workload Protection Platform
  • Network Security
  • Data & Storage Security
  • Assessment
  • Security Analytics as a Service
  • Application Security
  • Security Support Services
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Introductory Guidance to AICM
Introductory Guidance to AICM
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
The Ghost in the Machine is a Compulsive Liar
The Ghost in the Machine is a Compulsive Liar
Published: 12/12/2025
Why Your Copilot Needs a Security Co-Pilot: Enhancing GenAI with Deterministic Fixes
Why Your Copilot Needs a Security Co-Pilot: Enhancing GenAI with De...
Published: 12/10/2025
How to Build AI Prompt Guardrails: An In-Depth Guide for Securing Enterprise GenAI
How to Build AI Prompt Guardrails: An In-Depth Guide for Securing E...
Published: 12/10/2025
Why Compliance as Code is the Future (And How to Get Started)
Why Compliance as Code is the Future (And How to Get Started)
Published: 12/04/2025

Interested in helping develop research with CSA?

Related Certificates & Training