Cloud 101CircleEventsBlog
Discover the latest cloud threats, evolving AI risks, and how to stay ahead. Don’t miss CSA’s free Cloud Threats & Vulnerabilities Summitregister now!

Download Publication

Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services
Who it's for:
  • cloud customers
  • cloud service providers
  • third-party security services providers

Roles and Responsibilities of Third Party Security Services

Release Date: 11/30/2021

As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibilities are typically split between the CSPs and Cloud Service Customers (CSCs). However, in reality, third-party security services providers increasingly play essential roles, such as providing consultancy or managing security services for CSCs. They have a part in securing the cloud platform as well. For example, some SMEs (Small and Medium Enterprises) without security professionals may be unsure of how to secure their services and thus engage a Third-Party Security Service Provider (TPSSP) for consultancy. 

The role of TPSSP can be pivotal in the security of these SMEs. The guidelines in this document will help cloud customers when signing Service Level Agreement(SLAs) with TPSSPs.

Understand the security roles and responsibilities of TPSSPs for:
  • Identity and access management
  • Cloud Workload Protection Platform
  • Network Security
  • Data & Storage Security
  • Assessment
  • Security Analytics as a Service
  • Application Security
  • Security Support Services
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
CSA Code of Conduct to EU Cloud Code of Conduct Mapping
CSA Code of Conduct to EU Cloud Code of Conduct...
Cloud Key Management Working Group Charter 2025
Cloud Key Management Working Group Charter 2025
Enterprise Authority To Operate (EATO) Auditing Guidelines
Enterprise Authority To Operate (EATO) Auditing...
Don’t Buy A Network Pen Test Until You Ask These Questions
Don’t Buy A Network Pen Test Until You Ask These Questions
Published: 03/28/2025
SaaS Security and IaaS Security—Why You Need Both
SaaS Security and IaaS Security—Why You Need Both
Published: 03/27/2025
Hybrid Cloud Security – Top Challenges and Best Practices
Hybrid Cloud Security – Top Challenges and Best Practices
Published: 03/27/2025
How To Transform Your GRC with Continuous Controls Monitoring
How To Transform Your GRC with Continuous Controls Monitoring
Published: 03/26/2025

Acknowledgements

Dr. Kai Chen
Dr. Kai Chen

Dr. Kai Chen

Dr. Kai Chen is now serving as the Cybersecurity Ecosystem Specialist of Huawei Technologies Co.,Ltd., is responding for Huawei cybersecurity ecosystem development including strategy, policy and partner engagement, etc. He has over 15 years work experience in applied cryptography, information and network security technical research, standard development, policy and regulation fields; published over 20 research papers and delivered speeches ...

Read more

Dr. Liu Wenmao
Dr. Liu Wenmao
Director of Innovation Center

Dr. Liu Wenmao

Director of Innovation Center

Dr. Liu is the Director of Innovation Center, and also the leader of XingYun Lab (Cloud Security) of NSFOCUS Inc. He received his Ph.D. in Information Security from the Harbin Institute of Technology in 2013. After completion of his degree, Dr. Liu served as a researcher at NSFOCUS Inc. During the first two years in NSFOCUS, he was also working at Tsinghua University as a postdoc. He works closely with academia, is a member of the China Com...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. H...

Read more

Jiangyong Shi
Jiangyong Shi

Jiangyong Shi

Du Cheng Headshot Missing
Du Cheng

Du Cheng

Dr. Hing-Yan Lee
Dr. Hing-Yan Lee
Executive Vice President of Government Affairs, CSA

Dr. Hing-Yan Lee

Executive Vice President of Government Affairs, CSA

Dr. Hing Yan Lee serves as the Executive Vice President of Asia Pacific (APAC) for Cloud Security Alliance. Dr. Lee has over 30 years of ICT working experience in both the public and private sectors. In the recent 9+ years, he was Director of National Cloud Computing Office at Infocomm Development Authority, where he was responsible for, inter alia, developing the cloud ecosystem, promoting cloud adoption by government agencies and private...

Read more

Nirjhar Roy Headshot Missing
Nirjhar Roy

Nirjhar Roy

Zhiyuan Wu Headshot Missing
Zhiyuan Wu

Zhiyuan Wu

Ekta Mishra
Ekta Mishra
Membership Director & Country Manager (India), CSA APAC

Ekta Mishra

Membership Director & Country Manager (India), CSA APAC

Adalberto Valle Headshot Missing
Adalberto Valle

Adalberto Valle

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training