In today's complex cybersecurity landscape, ambiguity in roles and responsibilities can lead to significant vulnerabilities. The concept of a Shared Responsibility Model (SRM) is pivotal in delineating clear boundaries between service providers and customers, ensuring that every aspect of security is accounted for.
This framework was a focal point in a recent presentation at the RSA Conference 2025, delivered jointly by Lawrence Cruciana, President of Corporate Information Technologies, and Matt Lee from Pax8, highlighting its critical role in modern cybersecurity strategies.
A Shared Responsibility Model is a framework that defines the division of security responsibilities between service providers and their customers. While commonly associated with cloud services, SRMs are equally applicable to on-premises and hybrid environments. They ensure that both parties understand their roles in securing systems, data, and operations.
Without a well-defined SRM, organizations risk overlapping duties or, worse, leaving critical security tasks unaddressed. This lack of clarity can lead to incidents where each party assumes the other is responsible, resulting in delayed responses and increased damage.
The Center for Internet Security (CIS) Controls v8.1 provides a comprehensive and actionable set of best practices for securing IT systems and sensitive data. These controls are designed to be accessible to organizations across a wide range of sizes, industries, and risk profiles.
The framework is divided into three Implementation Groups (IGs):
Implementation Group 1 (IG1) is intended for small to mid-sized organizations with non-complex environments and minimal regulatory requirements. It defines essential cyber hygiene practices that serve as a foundational baseline.
Implementation Group 2 (IG2) targets organizations with moderate complexity or oversight obligations, requiring more advanced security capabilities.
Implementation Group 3 (IG3) is tailored for enterprises with sophisticated systems, sensitive data, or heightened exposure to advanced threats—such as those in defense, critical infrastructure, or heavily regulated sectors.
CIS Controls are organized around the guiding principle that “offense informs defense.” They are prioritized based on real-world data from incident responders, threat analysts, and red team operations to focus on the most effective and high-impact safeguards.
Each of the 18 CIS Controls is broken down into Safeguards (formerly known as sub-controls), which offer precise, implementation-ready actions. These Safeguards are mapped to the IGs, allowing organizations to scale their cybersecurity program based on resources, risk, and mission requirements.
This structured approach enables organizations to:
By aligning shared responsibilities with CIS Controls, organizations can ensure that both internal teams and external partners uphold defensible, auditable, and proactive security measures.
A – Agreed Metrics: Establish clear, measurable criteria for success and failure.
N – Named Scope: Define the exact systems, data, and processes covered.
C – Clear Responsibilities: Assign specific duties to each party, leaving no room for assumptions.
H – Handled Data: Identify data types involved and outline handling procedures.
O – Operational Specifics: Detail configurations, maintenance schedules, and other operational aspects.
R – Risks Identified: Recognize potential risks and determine how they are managed or transferred.
The ANCHOR framework aligns naturally with specific CIS Controls v8.1 Safeguards, especially in regulated environments such as those guided by the Cybersecurity Maturity Model Certification (CMMC).
Here are examples of how ANCHOR elements connect with the safeguards of the CIS Controls in the context of an CMMC Organization Seeking Certification (OSC) working with an External Service Provider (ESP) or Cloud Service Provider (CSP):
An OSC delegates patch management to an ESP. The SRM should reflect:
CorpInfoTech's Commitment to Cybersecurity Excellence
At Corporate Information Technologies (CorpInfoTech), we are proud to be a CIS-accredited organization, demonstrating our dedication to implementing and promoting these critical security controls. Our team applies CIS Controls at IG3 across a variety of customer environments, aligning with regulatory, operational, and contractual requirements to build resilient, secure, and auditable infrastructures.
To learn more about our services and approach, visit us at https://www.corp-infotech.com.
In an era where cyber threats are increasingly sophisticated, establishing a clear and effective Shared Responsibility Model is not just beneficial—it's essential. By utilizing frameworks like A.N.C.H.O.R. and aligning with CIS Controls v8.1 IG3, organizations can ensure that every aspect of their cybersecurity posture is addressed, responsibilities are clear, and risks are managed proactively.
For more information on how to implement these practices in your organization, visit Corporate Information Technologies at https://www.corp-infotech.com.