Skip to content

Commit a726225

Browse files
authored
Apply suggestions from PR review
Grammar fix.
1 parent 155b8c9 commit a726225

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/7-well-architected-framework-security-pillar.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The economies of scale allow cloud provider specialist teams to invest in optimi
3030

3131
Cloud providers must be compliant with the same IT regulatory requirements as the aggregate of all their customers. Providers must develop expertise to defend against the aggregate set of adversaries who attack their customers. As a consequence, the default security posture of applications deployed to the cloud is frequently much better than that of applications hosted on-premises.
3232

33-
**Shared Responsibility Model:** As computing environments move from customer-controlled datacenters to the cloud, the responsibility of security also shifts. Security of the operational environment is now a concern shared by both cloud providers and customers. Organizations can reduce focus on activities that aren't core business competencies by shifting these responsibilities to a cloud service like Azure. Depending on the specific technology choices, some security protections will be built into the particular service, while addressing others remain the customer's responsibility. To ensure that proper security controls are provided, organizations must carefully evaluate the services and technology choices.
33+
**Shared Responsibility Model:** As computing environments move from customer-controlled datacenters to the cloud, the responsibility of security also shifts. Security of the operational environment is now a concern shared by both cloud providers and customers. Organizations can reduce focus on activities that aren't core business competencies by shifting these responsibilities to a cloud service like Azure. Depending on the specific technology choices, some security protections are built into the particular service, while addressing others remains the customer's responsibility. To ensure that proper security controls are provided, organizations must carefully evaluate the services and technology choices.
3434

3535
![Diagram showing shared responsibility and key strategies.](../media/shared-resp-color.png)
3636

0 commit comments

Comments
 (0)