Episode 49 — MOUs and MOAs in Infrastructure Planning: Shared Responsibilities and Risk

When organizations talk about building or operating infrastructure together, the technical details get most of the attention, but many of the biggest failures start long before a cable is plugged in. They start with unclear responsibility. If two groups share a network, a building, a data center space, or a set of services, someone has to own decisions about power, access, maintenance, incident response, and cost. When those decisions are vague, people make assumptions, and assumptions turn into gaps. Those gaps become outages, compliance issues, and security incidents, not because anyone wanted them, but because nobody was clearly accountable. This is where agreements like a Memorandum of Understanding (M O U) and a Memorandum of Agreement (M O A) come into the picture. These documents are not just paperwork; they are tools for reducing confusion and reducing risk when multiple parties share infrastructure. For beginners, the most important idea is that security is as much about clarity and coordination as it is about technology.
Before we continue, a quick note: this audio course is a companion to our course companion books. The first book is about the exam and provides detailed information on how to pass it best. The second book is a Kindle-only eBook that contains 1,000 flashcards that can be used on your mobile device or Kindle. Check them both out at Cyber Author dot me, in the Bare Metal Study Guides Series.
An M O U is often used to express a shared understanding between parties about how they intend to work together. It can set expectations, define goals, and describe the general relationship without necessarily creating the same level of detailed obligations you might see in a formal contract. Think of it as a map of intentions and boundaries: who is involved, what the shared purpose is, what resources are in scope, and what each party generally agrees to do. In infrastructure planning, that could include things like shared use of space, shared network connectivity, or shared support responsibilities. The value of an M O U is that it reduces ambiguity early, before the project grows and before misunderstandings become expensive. It also gives both sides a common reference point so people can align decisions and avoid drifting into assumptions. Even if the language is high-level, having something written down is often the first step toward accountability, because it turns a verbal promise into a recorded expectation.
An M O A typically goes a step further by spelling out specific responsibilities and commitments more clearly. Where an M O U might say that two groups will cooperate on operating a shared environment, an M O A often defines who does what, when, and to what standard. In infrastructure, this could include responsibilities for patching systems, monitoring uptime, maintaining backups, controlling physical access, and responding to incidents. It might specify service expectations, escalation paths, and who pays for which pieces of equipment or support. The key security benefit is that it reduces the chance that two parties each assume the other is handling a critical control. Without a clear agreement, it is easy for gaps to form, like nobody applying updates because each group thinks the other owns the systems, or nobody monitoring logs because logging is considered someone else’s job. A well-written M O A makes shared responsibility less fuzzy, and fuzziness is a major source of risk.
Shared responsibility is not automatically bad, but it must be deliberately designed. When infrastructure is shared, the risk is shared too, and that means one party’s weakness can become the other party’s problem. If one organization has lax access controls, that can expose shared spaces or shared networks. If one party delays patching, that can create vulnerabilities that attackers can exploit to reach shared resources. If one party has poor backup practices, a recovery effort might fail even if the other party did everything right. This is why these agreements matter: they create a shared picture of risk and a shared plan for managing it. Beginners sometimes think risk is purely technical, like a software vulnerability, but in shared environments, organizational risk is often just as important. A missing agreement can be more dangerous than a missing firewall rule because it can cause controls to be skipped entirely.
A practical way to understand how M O U and M O A reduce risk is to imagine common failure scenarios. Consider a shared server room where one party controls the building and the other controls the servers. If the building party assumes the server party monitors temperature, and the server party assumes the building party monitors temperature, an HVAC failure might go unnoticed until equipment starts shutting down. Consider a shared network connection where one party manages the firewall but the other runs the applications. If nobody agrees on a change process, firewall rule changes might be made without coordination, causing outages or accidentally exposing services. Consider a situation where an incident occurs, like malware spreading across a shared segment. Without a clear response agreement, people may hesitate, argue about authority, or delay containment because they are unsure who is allowed to take action. Agreements do not prevent every problem, but they prevent avoidable confusion, and confusion is the enemy of effective response.
A strong agreement also clarifies boundaries, which is a security concept as much as a legal one. Boundaries define what is in scope and out of scope for each party. In infrastructure planning, that might mean where one party’s network ends and the other begins, which devices are considered shared, and which logs are shared or private. Clear boundaries help you design technical controls that match reality. For example, if one party is responsible for the internet edge firewall, the agreement should reflect that and define what changes the other party can request and how quickly those changes can be made. If one party is responsible for physical security of a facility, the agreement should specify how access is granted, how access is revoked, and how access events are tracked. When boundaries are unclear, defenders can end up protecting the wrong surface, leaving the actual risk area unmanaged. Clarity lets you align controls to ownership, which improves accountability.
Another major theme is service expectations, because shared infrastructure often supports services people rely on. Agreements can define uptime expectations, maintenance windows, and how planned outages are communicated. This matters because unplanned outages often trigger rushed workarounds, and rushed workarounds can create security problems. If a service level expectation is unrealistic or undefined, one party may underinvest in redundancy or monitoring, thinking it is not required, while the other party assumes a higher level of reliability. Clear expectations also help in incident response because they define urgency. A minor service disruption might allow for careful investigation, while a major outage might require immediate containment actions. Agreements do not make systems more reliable by themselves, but they guide planning decisions, budgets, and operational discipline. For beginners, it is enough to see that reliability goals are part of security because they influence how people behave under stress.
Agreements also help define how security controls are implemented and verified. For example, who is responsible for vulnerability scanning, and how often is it done. Who is responsible for patch management, and what is the expected patch timeline for critical issues. Who manages identity and access, and how quickly are accounts deprovisioned when someone changes roles. Who is responsible for logging, and where are logs stored, and who can access them. If you skip these details, you can end up with gaps that attackers love, like unpatched systems, stale accounts, or missing logs when you need them most. A good agreement also clarifies audit and compliance responsibilities, because shared environments often face shared scrutiny. Even if the agreement is not a compliance document, it can help ensure controls are actually performed, not just assumed. In practical security, controls that are assumed but not verified are often the ones that fail.
A subtle but important aspect of shared responsibility is incident response authority. When something goes wrong, who has the authority to isolate a system, block traffic, or take a service offline to contain damage. In shared environments, these decisions can impact both parties, so authority must be clear. If an agreement does not define how emergency decisions are made, teams may delay because they fear stepping outside their role, or they may act unilaterally and create conflict. Neither outcome is ideal during an incident. Clear escalation paths and communication channels reduce this risk. It can also be helpful to define how evidence is handled, such as who collects logs, who preserves systems for investigation, and how information is shared between parties. Beginners do not need to memorize legal language, but they should understand that security incidents are time-sensitive, and unclear authority creates delay, and delay increases damage.
There is also a human dimension to these agreements that matters for long-term security. Shared infrastructure often involves different cultures, different priorities, and different resource constraints. One party might prioritize speed and cost savings, while another prioritizes uptime and security controls. An agreement can serve as a negotiated compromise that sets expectations so these differences do not cause constant friction. It can also make staffing and budgeting more predictable, because responsibilities are assigned and costs are understood. Without that clarity, teams may argue about who should pay for monitoring tools, who should staff after-hours support, or who should replace aging equipment. Those arguments can stall necessary improvements, leaving weak infrastructure in place longer than it should be. Security often fails not because a control is impossible, but because responsibility for funding and operating that control is unclear. Agreements can reduce that friction by turning vague expectations into concrete commitments.
From a risk management perspective, the core benefit of M O U and M O A is reducing uncertainty. Risk is the combination of likelihood and impact, and uncertainty makes both harder to manage. When you do not know who owns a control, the likelihood of that control being missed goes up. When you do not know who responds to an incident, the impact of that incident tends to go up because containment is slower. When you do not know who maintains equipment, failures become more frequent and recovery becomes slower. Agreements create a shared model of responsibility that reduces the likelihood of missed controls and reduces the impact of failures through planned response and maintenance. This is why these documents show up in infrastructure planning, not just in legal departments. They are part of engineering a stable, predictable environment where security controls actually happen.
To wrap up, M O U and M O A are tools for managing shared responsibility in infrastructure planning, and they reduce security risk by replacing assumptions with clarity. An M O U sets a shared understanding of the relationship, goals, and general expectations, which helps prevent early misunderstandings that can grow into operational gaps. An M O A typically provides more detailed commitments about who does what, how services are maintained, how access is controlled, and how incidents are handled. In shared infrastructure, unclear ownership is a real vulnerability because it leads to unpatched systems, unmanaged access, weak monitoring, and slow response during crises. Clear agreements help align technical controls to real responsibilities, define service expectations, and establish authority when fast decisions are required. When you see these documents as part of security architecture rather than as paperwork, you begin to understand a practical truth: strong security requires not only good technology, but also clear coordination and accountability across the people and organizations involved.

Episode 49 — MOUs and MOAs in Infrastructure Planning: Shared Responsibilities and Risk
Broadcast by