1 4 Security Design Shared Responsibility Model A shared responsibility model is a safety framework that involves a cloud provider transferring responsibilities to a security team. This is done to improve security accountability. Each user's responsibility, especially in the setting of many clouds, is to reduce the risks associated with vulnerability. This paradigm could shift differently depending on the type of infrastructure being utilized. The model also varies depending on the company that provides the security. In contrast to Microsoft Azure, which defines its shared model as security ownership of the host, data centers, and general networks, Amazon Web Services mandates that customers take full responsibility for the upkeep of all hardware, networking, and software, in addition to general security precautions (Demissie & Ranise, 2021). Under the shared model, the user is responsible for performing some responsibilities, such as those of the data controller. Essentially, it is up to the user to decide when and how their data will be exploited. This responsibility falls squarely on the user's shoulders. Expounding The Shared Responsibility Model The cloud environment is one of a kind because of the shared responsibility model's capability to allow test groups of developers to spin up servers utilizing self-service methods. Even while these settings have the potential to stimulate creativity, they are often tied to your production assets. If they are not set up effectively, they pose major security hazards. Even if the cloud is inherently safe from the perspective of the provider, to have a secure cloud, the infrastructure has to be configured properly and access carefully monitored. Security Threats Even though the cloud environment is more secure than on-premise commercial operations infrastructure, security concerns still need to be addressed. One of the security threats associated with working in the cloud is the possibility of experiencing a data breach. These types of breaches can occur when an unauthorized user or program views, copies, or sends personal data due to an attack on cloud computing security. The cloud environment is also susceptible to the security threat of data loss, which may occur due to natural disasters or man-made disasters brought on by the destruction of servers or human error. This type of data loss can occur due to any of these events. Another common threat is the possibility of a denial of service attack (DoS) (Kim et al., 2020). To overload the system, attackers use enormous amounts of bandwidth, resulting in the server providing cloud services at a much slower rate. Even if the systems in the cloud environment are perfectly secure, the presence of third-party services inside the cloud environment may still introduce additional vulnerabilities to the cloud's data protection. Attackers can use insecure application programming interfaces (APIs) to access data stored in cloud environ ...