Shared Responsibility: Cloud Self-Hosted

┌─────────────────────────────────────────────────────────┐
│         CLOUD PROVIDER (AWS/Azure/GCP/DO/Hostinger)     │
│         THEY MANAGE (Infrastructure Layer)              │
├─────────────────────────────────────────────────────────┤
│  ✓ Physical security (data centers)                     │
│  ✓ Power, cooling, hardware                             │
│  ✓ Network infrastructure                               │
│  ✓ Hypervisor security                                  │
│  ✓ DDoS protection (basic/standard tier)                │
│  ✓ Physical network security                            │
│  ✓ Compliance (their infrastructure)                    │
└─────────────────────────────────────────────────────────┘
                           ↕
┌─────────────────────────────────────────────────────────┐
│         YOU MANAGE (Everything Above VM)                │
├─────────────────────────────────────────────────────────┤
│  ✗ Virtual machines / containers                        │
│  ✗ Operating system security                            │
│  ✗ OS patches and updates                               │
│  ✗ Application installation                             │
│  ✗ Application configuration                            │
│  ✗ Application security                                 │
│  ✗ Network security groups / firewall rules             │
│  ✗ Load balancers                                       │
│  ✗ SSL/TLS certificates                                 │
│  ✗ Database setup and security                          │
│  ✗ Backup configuration                                 │
│  ✗ Monitoring and alerting                              │
│  ✗ Access control (IAM)                                 │
│  ✗ Compliance (your use of platform)                    │
│  ✗ ALL application-layer security                       │
└─────────────────────────────────────────────────────────┘

KEY INSIGHT: Cloud provider gives you a secure empty VM.
             Everything else is YOUR job.

INFRASTRUCTURE & PLATFORM SECURITY

Security ControlSelfHostedSaaSNotes
Server hardening✅ YOU❌ VendorOS patching, kernel updates, security configs
Container security✅ YOU❌ VendorDocker hardening, image scanning
Network segmentation✅ YOU❌ VendorVPC, subnets, firewall rules
DDoS protection✅ YOU❌ VendorCloudFlare, AWS Shield, etc.
WAF configuration✅ YOU❌ VendorModSecurity, AWS WAF rules
SSL/TLS management✅ YOU❌ VendorCertificate rotation, cipher config
Load balancing✅ YOU❌ VendorHigh availability setup
Database hardening✅ YOU❌ VendorPostgreSQL security, encryption
Backup infrastructure✅ YOU❌ VendorBackup systems, retention, testing
Disaster recovery✅ YOU❌ VendorDR planning, failover testing
Platform CVE patching✅ YOU❌ VendorApplying security updates
Vulnerability scanning✅ YOU⚠️ LimitedYou scan workflows, vendor scans infra
Physical security✅ YOU❌ VendorData center access control
Power/cooling✅ YOU❌ VendorInfrastructure reliability

AUTHENTICATION & ACCESS CONTROL

Security ControlSelfHostedSaaSNotes
SSO/SAML integration✅ YOU✅ YOUSame config effort, but vendor provides endpoint
MFA enforcement✅ YOU✅ YOUMust configure & enforce in both cases
Password policies✅ YOU✅ YOUComplexity, rotation, history
Session management⚠️ Configure⚠️ ConfigureTimeout values, concurrent sessions
User provisioning✅ YOU✅ YOUAdding/removing users
Role-based access (RBAC)✅ YOU✅ YOUDefining and assigning roles
Least privilege design✅ YOU✅ YOUEnsuring minimal permissions
Admin account security✅ YOU✅ YOUSeparate admin accounts, audit
Service accounts✅ YOU✅ YOUFor automation/integrations
Access reviews✅ YOU✅ YOUQuarterly user access audits
Failed login monitoring✅ YOU⚠️ YOUEasier with SaaS (built-in logs)
Account lockout policies⚠️ Configure⚠️ ConfigureAfter failed attempts
IP whitelisting✅ YOU⚠️ LimitedEasier self-hosted, tier-dependent SaaS
API key management✅ YOU✅ YOUGeneration, rotation, revocation

Key Point: Almost NO difference - you own this in both cases


CREDENTIAL & SECRETS MANAGEMENT

Security ControlSelf-HostedSaaSNotes
Credential storage✅ YOU⚠️ SharedSelf-hosted: your vault. SaaS: vendor’s vault
Encryption key management✅ YOU❌ VendorCMEK available in enterprise SaaS tiers
Secrets vault integration✅ YOU⚠️ LimitedHashiCorp Vault easier self-hosted
Credential rotation✅ YOU✅ YOUSame process in both
Credential inventory✅ YOU✅ YOUDocumenting what’s stored where
Least privilege credentials✅ YOU✅ YOURead-only where possible
Credential access audit✅ YOU✅ YOUWho accessed what, when
Hardcoded secret prevention✅ YOU✅ YOUCode review, scanning
Time-limited tokens⚠️ Implement⚠️ ImplementShort-lived access tokens
Credential sharing policies✅ YOU✅ YOUWho can share, how
Emergency credential revocation✅ YOU✅ YOUIncident response procedure

Key Point: ZERO difference - you own credential security completely


WORKFLOW & APPLICATION SECURITY

Security ControlSelf-HostedSaaSNotes
Workflow code review✅ YOU✅ YOUSecurity review before production
Input validation✅ YOU✅ YOUSanitizing user inputs
Output sanitization✅ YOU✅ YOUPreventing injection attacks
Error handling✅ YOU✅ YOUProper error messages, no info leak
Workflow approval process✅ YOU✅ YOUProduction deployment gates
Version control✅ YOU⚠️ YOUEasier with self-hosted Git integration
Testing environment✅ YOU⚠️ YOUMay need separate SaaS account
Workflow documentation✅ YOU✅ YOUDocumenting business logic
Dependency management✅ YOU❌ VendorManaging libraries, node modules
API security✅ YOU⚠️ SharedRate limiting, auth on endpoints
Injection prevention✅ YOU✅ YOUSQL injection, command injection
Data validation✅ YOU✅ YOUType checking, range validation
Sensitive data handling✅ YOU✅ YOUMasking, encryption, deletion
Third-party integrations✅ YOU✅ YOUOAuth scope, API permissions

Key Point: Almost identical - application security is YOUR job


MONITORING, LOGGING & INCIDENT RESPONSE

Security ControlSelf-HostedSaaSNotes
Audit logging enabled⚠️ Configure⚠️ ConfigureMust enable in both
Log export to SIEM✅ YOU⚠️ YOUEasier self-hosted, SaaS tier-dependent
Log retention policy✅ YOU⚠️ VendorSaaS retention limited by tier
Security event alerting✅ YOU⚠️ YOUCustom alerts easier self-hosted
Failed login alerts✅ YOU⚠️ Built-inOften included in SaaS
Privilege escalation alerts✅ YOU⚠️ LimitedBetter visibility self-hosted
Unusual activity detection✅ YOU⚠️ LimitedBaseline detection
Infrastructure monitoring✅ YOU❌ VendorCPU, memory, disk - vendor’s job in SaaS
Application monitoring✅ YOU⚠️ SharedWorkflow performance
Incident response plan✅ YOU✅ YOUYour data = your incident
Forensic evidence collection✅ YOU⚠️ LimitedLess visibility in SaaS
Security metrics/KPIs✅ YOU⚠️ LimitedDashboards from available logs
Compliance reporting✅ YOU⚠️ SharedVendor provides some reports

Key Point: Partial reduction - you still need to monitor and respond


COMPLIANCE & GOVERNANCE

Security ControlSelf-HostedSaaSNotes
Data classification✅ YOU✅ YOUIdentifying sensitive data
Privacy impact assessment✅ YOU✅ YOUGDPR, CCPA requirements
Data processing agreement❌ N/A✅ YOUDPA with SaaS vendor
Data residency✅ YOU⚠️ VendorSelf-hosted = full control, SaaS = region choice
Right to audit vendor❌ N/A⚠️ ContractNegotiate in SaaS contract
Compliance certifications✅ YOU⚠️ VendorYou get audited vs inheriting vendor’s
Data subject requests✅ YOU⚠️ SharedGDPR deletion, export
Breach notification✅ YOU⚠️ Shared72-hour rule applies to both
Data retention policies✅ YOU⚠️ ConfigureSet in both, easier self-hosted
Audit trail completeness✅ YOU⚠️ LimitedMore complete self-hosted
Third-party risk assessment⚠️ Integrations✅ Vendor + IntegrationsAdd vendor to risk register
Vendor security assessment❌ N/A✅ YOUMust assess SaaS vendor
Exit strategy/data portability❌ N/A✅ YOUMust plan for SaaS migration

OPERATIONAL SECURITY

Security ControlSelf-HostedSaaSNotes
Change management✅ YOU⚠️ SharedWorkflow changes vs platform changes
Patch management✅ YOU❌ VendorSecurity updates
Vulnerability scanning✅ YOU❌ VendorPlatform vulnerabilities
Penetration testing✅ YOU⚠️ VendorVendor tests platform, you test workflows
Security training✅ YOU✅ YOUUser awareness programs
Acceptable use policy✅ YOU✅ YOUWhat users can/can’t do
Secure development practices✅ YOU✅ YOUFor workflow development
Code review process✅ YOU✅ YOUBefore production deployment
Secrets in version control✅ YOU✅ YOUPrevention, scanning
Dependency vulnerabilities✅ YOU❌ VendorLibraries, packages
Configuration drift✅ YOU❌ VendorInfrastructure as code
Capacity planning✅ YOU❌ VendorScaling resources
Performance monitoring✅ YOU⚠️ SharedWorkflow optimization
Cost monitoring✅ YOU✅ YOUResource usage, billing alerts