2026 Q1 Report: AI-based Attacks are Rising and Putting Enterprises at Risk

Azure Shared Responsibility Model: What Azure Secures vs What Customers Must Secure

Key Takeaways

Azure’s shared responsibility model explains which security tasks Microsoft takes on within Azure, and which ones stay firmly on the customer’s side. For security and cloud teams in 2026, the harder part is less about understanding that diagram and more about making it work in real environments across IaaS, PaaS, SaaS, and hybrid setups, with enough monitoring and auditability that it will stand up to scrutiny from security, risk, and compliance.

Why the Azure Shared Responsibility Model Matters in 2026

Azure is widely used by enterprises, including organizations that operate in regulated and high‑value sectors. Microsoft’s documentation states that Azure secures the underlying cloud infrastructure—physical hosts, networks, and data centers—while customers are responsible for the security of the data, identities, and workloads they deploy on that infrastructure. Analyst research and breach investigations consistently show that most cloud incidents stem from customer-side misconfigurations, over‑privileged access, and unmonitored assets rather than failures of the provider’s infrastructure.

Fidelis’ work with large enterprises reflects the same reality: even when teams understand the shared responsibility model conceptually, gaps appear when they try to manage identities, configurations, and compliance across fast‑changing Azure estates at scale.

Understanding the Azure Shared Responsibility Model

According to Microsoft documentation, the Microsoft Azure shared responsibility model defines a clear split between what Azure secures and what customers must secure in the cloud. This split varies with service model—on‑premises, IaaS, PaaS, or SaaS—but a few principles are consistent.

Azure’s Security Scope

At a high level, Azure is responsible for:

In short, the cloud provider handles the “security of the cloud”—the foundational infrastructure on which all Azure services run.

Customer-Owned Security Scope

Customers are responsible for the “security in the cloud”—everything they deploy, configure, and manage:

These responsibilities apply across IaaS, PaaS, and SaaS, even though Azure takes on more or fewer layers depending on the service type.

Responsibility by Service Model: IaaS, PaaS, SaaS

The cloud responsibility matrix shifts depending on whether you’re using infrastructure as a service, platform as a service, or software as a service. Microsoft describes this as a gradient where more abstraction means Azure handles more of the stack, and you handle less—but never nothing.

High-Level Azure Responsibility Matrix

Layer / AssetOn-Premises (Customer)IaaS on AzurePaaS on AzureSaaS on Azure/M365
Customer dataCustomerCustomerCustomerCustomer
Application logic & app securityCustomerCustomerShared (customer config)Shared (customer usage)
Guest operating systemsCustomerCustomerMicrosoftMicrosoft
Identity & directory infrastructure CustomerCustomerSharedCustomer (usage)
Network security controlsCustomerCustomerSharedMicrosoft
Virtualization layerCustomerMicrosoftMicrosoftMicrosoft
Physical hosts, network, data centerCustomerMicrosoftMicrosoftMicrosoft

IaaS (e.g., Azure Virtual Machines)

For IaaS, Azure takes care of the physical data centers, hosts, storage, and virtualization layer. Customers own the full stack above that:

PaaS (e.g., Azure App Service, Azure SQL Database)

With PaaS services, Azure moves further up the stack:

SaaS (e.g., Microsoft 365)

In SaaS scenarios, Azure/Microsoft owns almost the entire technical stack:

Across IaaS, PaaS, and SaaS, this pattern aligns closely with the shared responsibility approach used by AWS and other major cloud providers; the main differences come from each platform’s specific controls, terminology, and tooling, which can add complexity in multi‑cloud setups if responsibilities are not clearly mapped and automated.

Where Azure Ends and You Begin

In its shared responsibility guidance, Microsoft emphasizes that the line of demarcation is fixed on the infrastructure side: Azure owns physical security, infrastructure security, and platform operations; customers own their workloads, identities, and data. Fidelis’ vendor‑agnostic model reinforces this by showing the stack from physical data centers up to application logic, with lower‑level infrastructure clearly marked as provider‑owned and application‑level elements always customer‑owned.

That boundary doesn’t change by contract or SLA—it only shifts as you choose different service types (IaaS vs. PaaS vs. SaaS). For example, moving from VMs to a serverless PaaS may push OS patching to Azure, but it never moves application logic, code, or data classification out of your responsibility.

Once that boundary between Azure’s responsibilities and yours is clear conceptually, the next step is to operationalize your side of the model in day‑to‑day security tasks.

Cloud Shared Responsibility Model Explained
Shared Responsibility model cover

Your Share of Azure Cloud Security Responsibilities

Once the line between what Azure secures and what you own is clear, the real work is putting your side into practice. In practical terms, this work usually falls into the same areas: data, applications, identities, platform configuration, and monitoring—regardless of whether you run virtual machines, PaaS services, or a hybrid mix.

1. Information and data

2. Application logic and code

3. Identity and access management

4. Platform and resource configuration

5. Connected infrastructure and monitoring

Misconfiguration: The Most Common Failure Point

Fidelis’ shared responsibility whitepaper notes that misconfigurations are a dominant source of cloud risk and cites external research indicating that most cloud security failures are attributable to customer‑side issues rather than provider platforms. Analyst research and published incident post‑mortems report that misconfigured storage, overly permissive identities, unpatched workloads, and exposed management interfaces are frequent root causes of cloud breaches.

Industry surveys report that a large majority of cybersecurity professionals remain extremely to moderately concerned about public cloud security, especially around configuration drift, access management, and lack of unified visibility. In Azure, these concerns materialize when:

This is precisely the gap that shared responsibility automation and CNAPP platforms like Fidelis Halo® aim to close.

Best Practices for Implementing Azure Services in Enterprise Real-Life Scenarios

These practices map directly to the customer‑owned layers of the Azure responsibility model and are meant to be used as a practical checklist.

1. Treat identity as the primary control plane

2. Standardize secure baselines for IaaS and PaaS

For IaaS (e.g., Azure Virtual Machines):

For PaaS (e.g., Azure App Service, Azure SQL):

3. Integrate security into DevOps and CI/CD

4. Implement policy-driven governance and continuous compliance

5. Maintain end-to-end visibility across hybrid and multi-cloud

How Fidelis Halo® Operationalizes Your Side of the Azure Shared Responsibility Model

Fidelis describes Halo® as a shared responsibility model automation platform for cloud environments, designed to help customers implement and maintain their responsibilities across Azure and other providers. It works alongside Azure’s native controls and focuses on automating the customer‑owned layers of the responsibility model.

Automating Shared Responsibility Across Azure

Fidelis Halo® provides a broad range of security controls that directly address customer obligations in the Azure model:

These capabilities align with the responsibilities required—asset discovery, vulnerability and exposure management, integrity and drift monitoring, threat detection, and compliance—and apply them consistently across Azure, AWS, and other public cloud services.

Attributes That Matter for Azure Programs

Fidelis highlights eight key attributes of an effective security automation platform—unified, portable, comprehensive, fast, integrated, frictionless, scalable, and cost‑effective. For Azure customers, these attributes translate into:

Automate Security and Compliance for Microsoft Azure
Azure Cloud Security Datasheet Cover

DevOps Integration and Secure Self-Service

Fidelis Halo® also integrates with DevOps processes and workflows, enabling secure self‑service and faster delivery without sacrificing control:

This approach lets security teams empower DevOps and business units to use Azure at full speed while maintaining the organization’s side of the shared responsibility model.

Turning the Azure Responsibility Model into an Operating Model with Fidelis

On a slide, the Azure shared responsibility model looks straightforward: Microsoft takes care of the underlying cloud infrastructure, and you’re accountable for your data, identities, configurations, and applications. In environments with multiple subscriptions, several cloud providers, and a mix of on‑prem and Azure resources, applying that model consistently often requires more than manual processes.

Fidelis Halo® is designed to turn that model from a static diagram into something you can actually run every day by:

For organizations that depend on Azure for critical workloads, this combination of clear responsibility boundaries and automated enforcement is what cuts risk down to size, strengthens cloud security posture, and lets teams make full use of the cloud without losing sight of the obligations that stay on their side of the model.

Reference:

About Author

Sarika Sharma

Sarika, a cybersecurity enthusiast, contributes insightful articles to Fidelis Security, guiding readers through the complexities of digital security with clarity and passion. Beyond her writing, she actively engages in the cybersecurity community, staying informed about emerging trends and technologies to empower individuals and organizations in safeguarding their digital assets.

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.