Skip to content
Compliance

MSP Shared Responsibility Matrix Template for Compliance

Scopable Team18 min read
MSP Shared Responsibility Matrix Template for Compliance

A client failed their CMMC assessment. The assessor asked who was responsible for access control reviews. The client pointed at the MSP. The MSP pointed at the client. Neither had documentation.

The assessment failed. The relationship fractured. Lawyers got involved.

This happens because nobody documented responsibilities upfront. The shared responsibility matrix exists to prevent it.

What Is a Shared Responsibility Matrix?

A shared responsibility matrix (SRM) documents who owns what in a compliance engagement. For every control, activity, and obligation, it specifies whether the MSP is responsible, the client is responsible, or responsibility is shared (and if shared, exactly how it's divided).

Why it matters:

  • Prevents finger-pointing after incidents
  • Clarifies scope before work begins
  • Creates defensible documentation for audits
  • Reduces liability disputes
  • Required for CMMC (not optional)

Without an SRM, responsibilities are assumed. Assumptions differ. When something goes wrong, everyone remembers the responsibilities differently, always in their own favor.

SRM Structure

An effective SRM has four columns:

Control/Activity: The specific requirement or task being assigned

MSP Responsibility: What the MSP owns completely (implements, maintains, monitors)

Client Responsibility: What the client owns completely (decides, enforces, funds)

Shared Details: For shared responsibilities, exactly who does what

Each row should be specific enough that there's no ambiguity. "Access control" is too vague. "Quarterly access reviews for systems in scope" is specific enough to assign clearly.

HIPAA Shared Responsibility Matrix Template

With the HIPAA 2026 changes eliminating most "addressable" controls, these matrices become even more critical.

Access Controls

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
User access provisioningConfigure access in managed systems per approved requestSubmit access requests, approve access levels, define role requirementsMSP executes; Client authorizes
Access terminationDisable accounts within 24 hours of notificationNotify MSP of terminations within 4 business hoursClient notifies; MSP executes
Privileged access managementManage privileged accounts for managed infrastructure, enforce MFAApprove privileged access requests, conduct privileged access reviewsMSP implements controls; Client approves access
Access reviewsProvide quarterly access reportsReview reports, approve continued access, document decisionsMSP reports; Client decides
Password managementEnforce password policies in managed systemsDefine password policy requirements, ensure user complianceMSP configures; Client defines policy

Audit Controls

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
Audit log configurationConfigure logging on managed systems per requirementsDefine logging requirements, specify retention periodsMSP configures; Client specifies
Log retentionRetain logs for managed systems per agreed scheduleDefine retention requirements, provide storage if neededMSP retains; Client funds
Log reviewProvide log analysis and alertingReview alerts, investigate anomalies, document findingsMSP alerts; Client investigates
Audit trail protectionProtect integrity of audit logs for managed systemsEnsure physical security of on-premise log storageMSP protects electronic; Client protects physical

Transmission Security

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
Encryption in transitImplement TLS/encryption for managed systemsIdentify systems requiring encryption, fund certificate costsMSP implements; Client identifies scope
Secure emailConfigure email encryption solutionTrain staff on use, enforce usage policiesMSP configures; Client enforces
VPN managementMaintain VPN infrastructure for remote accessApprove VPN access requests, ensure staff complianceMSP maintains; Client authorizes

Integrity Controls

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
Patch managementPatch managed systems per agreed scheduleApprove maintenance windows, test business applicationsMSP patches; Client approves timing
Anti-malwareDeploy and maintain endpoint protectionReport suspected infections, ensure staff complianceMSP deploys; Client reports
Backup verificationTest backups per agreed scheduleDefine RPO/RTO requirements, approve backup scopeMSP tests; Client defines requirements

Administrative Safeguards

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
Risk assessmentConduct annual technical risk assessmentReview findings, make risk decisions, fund remediationMSP assesses; Client decides
Security policiesProvide policy templates, recommend updatesApprove policies, enforce with workforce, document exceptionsMSP recommends; Client owns
Workforce trainingProvide training platform and contentEnsure completion, address failures, reinforce trainingMSP provides; Client ensures completion
Incident responseDetect, alert, provide technical responseDetermine breach status, handle notifications, engage legalMSP detects; Client determines and notifies
Business Associate AgreementsN/A (Client responsibility)Execute BAAs, maintain inventory, ensure vendor complianceClient owns entirely

Physical Safeguards

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
Workstation securityConfigure device encryption, endpoint controlsEnsure physical workstation security, report loss/theftMSP configures; Client secures
Facility accessN/A (Client responsibility)Control facility access, maintain access logsClient owns entirely
Device disposalPerform secure data destruction on managed devicesTrack devices containing ePHI, arrange for destructionMSP destroys; Client tracks

CMMC Level 2 Shared Responsibility Matrix Template

Access Control (AC)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
AC.L2-3.1.1Limit system access to authorized usersImplement access controls in managed infrastructureDefine authorized users, approve accessMSP implements; Client authorizes
AC.L2-3.1.2Limit system access to authorized functionsConfigure role-based access in managed systemsDefine roles and authorized functionsMSP configures; Client defines
AC.L2-3.1.3Control CUI flowImplement boundary controls, DLP in managed systemsDefine CUI boundaries, train workforce on handlingMSP controls technically; Client defines scope
AC.L2-3.1.5Employ least privilegeConfigure minimum necessary accessApprove access requests, review periodicallyMSP implements; Client approves
AC.L2-3.1.7Prevent non-privileged users from executing privileged functionsEnforce separation in managed systemsDefine privileged vs. non-privileged rolesMSP enforces; Client defines
AC.L2-3.1.12Monitor and control remote accessManage VPN, remote access infrastructureAuthorize remote access users, ensure policy complianceMSP monitors; Client authorizes
AC.L2-3.1.20Verify and control connections to external systemsManage firewall rules, external connectionsApprove external connections, document business needMSP implements; Client approves

Awareness and Training (AT)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
AT.L2-3.2.1Security awareness trainingProvide training platform and CUI-specific contentEnsure workforce completion, address failuresMSP provides; Client ensures
AT.L2-3.2.2Role-based trainingProvide role-specific training contentDefine roles requiring specialized trainingMSP provides; Client defines

Audit and Accountability (AU)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
AU.L2-3.3.1Create and retain audit logsConfigure audit logging on managed systemsDefine retention requirements, fund storageMSP configures; Client defines
AU.L2-3.3.2Trace actions to usersEnsure user attribution in managed systemsEnsure unique accounts, prohibit sharingMSP enables; Client enforces policy
AU.L2-3.3.5Correlate audit review and reportingProvide SIEM/log analysis for managed systemsReview reports, investigate findingsMSP correlates; Client investigates
AU.L2-3.3.8Protect audit informationProtect audit logs in managed systemsEnsure physical security of audit storageMSP protects; Client secures physical

Configuration Management (CM)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
CM.L2-3.4.1Establish and maintain configurationsMaintain baseline configs for managed systemsApprove baselines, define requirements for mission systemsMSP maintains; Client approves
CM.L2-3.4.2Establish and enforce security config settingsImplement hardening standardsApprove standards, fund required changesMSP implements; Client approves
CM.L2-3.4.3Track and manage changesManage change control for infrastructureApprove changes, test business applicationsMSP tracks; Client approves
CM.L2-3.4.6Employ least functionalityDisable unnecessary functions in managed systemsDefine required functionalityMSP disables; Client defines

Identification and Authentication (IA)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
IA.L2-3.5.1Identify and authenticate usersImplement authentication for managed systemsManage user identities, onboarding/offboardingMSP implements; Client manages identities
IA.L2-3.5.2Authenticate devicesImplement device authentication where requiredInventory devices, define device requirementsMSP authenticates; Client inventories
IA.L2-3.5.3Use multifactor authenticationImplement MFA for privileged and remote accessEnsure user enrollment, enforce usageMSP implements; Client ensures adoption
IA.L2-3.5.10Store and transmit cryptographically protected passwordsConfigure secure password storageDefine password policy requirementsMSP configures; Client defines

Incident Response (IR)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
IR.L2-3.6.1Incident handling capabilityProvide detection, alerting, technical responseEstablish IR team, make containment decisionsMSP detects; Client decides
IR.L2-3.6.2Track and document incidentsDocument technical findings and responseReport to DIBNet within 72 hours if requiredMSP documents; Client reports
IR.L2-3.6.3Test incident responseParticipate in tabletop exercisesPlan and conduct exercises, document resultsShared: Both participate

Maintenance (MA)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
MA.L2-3.7.1Perform maintenanceMaintain managed systems per scheduleApprove maintenance windowsMSP maintains; Client approves timing
MA.L2-3.7.2Control maintenance toolsControl tools used on managed systemsInventory tools on client-maintained systemsMSP controls managed; Client controls others
MA.L2-3.7.5Require MFA for remote maintenanceEnforce MFA for remote maintenance accessN/AMSP owns

Media Protection (MP)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
MP.L2-3.8.1Protect mediaProtect electronic media for managed systemsProtect physical media, paper CUIMSP protects electronic; Client protects physical
MP.L2-3.8.3Sanitize mediaSanitize media from managed systemsTrack all media containing CUIMSP sanitizes; Client tracks
MP.L2-3.8.9Protect backup CUIEncrypt backups containing CUIDefine backup scope, verify coverageMSP encrypts; Client defines scope

Personnel Security (PS)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
PS.L2-3.9.1Screen individualsScreen MSP personnel with CUI accessScreen employees, maintain screening recordsEach screens own personnel
PS.L2-3.9.2Ensure CUI protection during personnel actionsTerminate MSP access upon separationNotify MSP of separations, revoke own accessClient notifies; both execute

Physical Protection (PE)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
PE.L2-3.10.1Limit physical accessSecure MSP-hosted infrastructure (if applicable)Secure client facilities processing CUIEach secures own facilities
PE.L2-3.10.3Escort visitorsEscort visitors in MSP facilitiesEscort visitors in client facilitiesEach manages own
PE.L2-3.10.6Enforce safeguarding at alternate sitesN/A (client responsibility)Secure alternate work locationsClient owns

Risk Assessment (RA)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
RA.L2-3.11.1Assess risk periodicallyConduct technical risk assessmentsReview findings, make risk decisionsMSP assesses; Client decides
RA.L2-3.11.2Scan for vulnerabilitiesConduct vulnerability scanning on managed systemsReview findings, prioritize remediationMSP scans; Client prioritizes
RA.L2-3.11.3Remediate vulnerabilitiesRemediate per agreed scheduleApprove remediation, fund changesMSP remediates; Client funds

Security Assessment (CA)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
CA.L2-3.12.1Assess controls periodicallyAssess controls in managed systemsAssess non-MSP controls, compile resultsEach assesses own scope
CA.L2-3.12.2Develop POA&MsContribute findings for managed systemsDevelop overall POA&M, track remediationMSP contributes; Client owns
CA.L2-3.12.4Develop SSPDocument MSP-implemented controlsDevelop and maintain overall SSPMSP documents own; Client owns SSP

System and Communications Protection (SC)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
SC.L2-3.13.1Boundary protectionImplement firewall, boundary controlsDefine CUI boundariesMSP implements; Client defines
SC.L2-3.13.8Encrypt CUI in transitImplement encryption for managed systemsIdentify CUI transmission requirementsMSP encrypts; Client identifies scope
SC.L2-3.13.11Employ FIPS-validated cryptographyUse FIPS-validated encryptionVerify compliance requirementsMSP uses; Client verifies
SC.L2-3.13.16Encrypt CUI at restImplement encryption at restDefine CUI storage locationsMSP encrypts; Client defines scope

System and Information Integrity (SI)

Control IDControl DescriptionMSP ResponsibilityClient ResponsibilityShared Details
SI.L2-3.14.1Identify and correct flawsPatch managed systemsApprove timing, test applicationsMSP patches; Client approves
SI.L2-3.14.2Malicious code protectionDeploy endpoint protectionReport suspected infectionsMSP deploys; Client reports
SI.L2-3.14.3Monitor for indicatorsMonitor managed systemsReview alerts, investigateMSP monitors; Client investigates
SI.L2-3.14.6Monitor communications for attacksMonitor network for threatsReview findings, approve responseMSP monitors; Client approves
SI.L2-3.14.7Identify unauthorized useAlert on anomalous activityInvestigate alerts, take actionMSP alerts; Client investigates

SOC 2 Shared Responsibility Matrix Template

Common Criteria (CC) - Security

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
CC6.1 - Logical accessImplement access controls in managed infrastructureDefine access requirements, authorize usersMSP implements; Client authorizes
CC6.2 - Prior authorizationConfigure approval workflowsApprove access requests, review periodicallyMSP configures; Client approves
CC6.3 - New access removalExecute access changes within SLANotify of onboarding/offboarding, document requirementsMSP executes; Client notifies
CC6.6 - External threatsMonitor and protect from external threatsFund security tools, review findingsMSP monitors; Client funds
CC6.7 - Transmission protectionImplement encryption in transitDefine transmission requirementsMSP implements; Client defines
CC6.8 - Unauthorized softwareControl software installationDefine approved software listMSP controls; Client defines
CC7.1 - Configuration standardsMaintain hardened configurationsApprove standardsMSP maintains; Client approves
CC7.2 - Infrastructure monitoringMonitor infrastructure, alert on issuesReview alerts, investigate findingsMSP monitors; Client investigates
CC7.3 - Change managementImplement change control processApprove changesMSP implements; Client approves
CC7.4 - Vulnerability managementScan and remediate vulnerabilitiesApprove remediation timingMSP remediates; Client approves
CC7.5 - Incident detectionDetect and alert on incidentsRespond, communicate, documentMSP detects; Client responds

Availability

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
A1.1 - Capacity managementMonitor capacity, plan scalingDefine requirements, fund expansionMSP monitors; Client funds
A1.2 - Environmental controlsMaintain environmental controls for hosted systemsMaintain controls for on-premise equipmentEach maintains own
A1.3 - Backup and recoveryImplement backup per requirements, test recoveryDefine RPO/RTO, verify business requirementsMSP implements; Client defines

Confidentiality

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
C1.1 - Confidential data identificationProtect data classified as confidentialIdentify confidential data, classify appropriatelyMSP protects; Client classifies
C1.2 - Confidential data disposalSecurely dispose of dataNotify when disposal requiredMSP disposes; Client notifies

Processing Integrity

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
PI1.1 - Accurate processingMaintain system accuracyVerify processing meets requirementsMSP maintains; Client verifies
PI1.2 - Error detectionAlert on processing errorsInvestigate errors, define resolutionMSP alerts; Client investigates

Privacy

Control AreaMSP ResponsibilityClient ResponsibilityShared Details
P1.1 - Privacy noticeN/AProvide privacy notices to data subjectsClient owns
P4.1 - Data collectionN/ALimit collection to stated purposesClient owns
P5.1 - Data useProcess data only as authorizedDefine authorized usesMSP processes; Client defines
P6.1 - Data disclosureDisclose only to authorized partiesDefine authorized disclosureMSP follows; Client defines
P7.1 - Data qualityMaintain data accuracyVerify data qualityMSP maintains; Client verifies

How to Use This Template

Step 1: Select the Appropriate Framework(s)

Use the HIPAA template for healthcare clients. Use the CMMC template for defense contractors. Use the SOC 2 template for SaaS clients and service providers.

For multi-framework engagements, combine templates and consolidate overlapping controls.

Step 2: Customize for Your Engagement

The templates are starting points. Customize based on:

  • Actual scope of your services
  • Client's existing capabilities
  • Specific systems and applications in scope
  • Client's other service providers

Don't copy verbatim. Review each row and verify it reflects your actual arrangement.

Step 3: Review with the Client

Walk through the SRM with the client before signing. Verify they understand and agree with each assignment. Address disagreements now, not during an audit or incident.

Step 4: Incorporate into Your Agreement

The SRM should be an exhibit to your MSA or SOW. Reference it in the scope of services. Make it contractually binding.

Step 5: Review and Update Periodically

Circumstances change. Services expand. New controls come into scope. Review the SRM at least annually and update as needed.

Common SRM Mistakes

Mistake 1: "Shared" Without Specifics

"Shared responsibility for incident response" means nothing. Who detects? Who investigates? Who notifies regulators? Who communicates with customers?

Every "shared" responsibility needs specifics. Otherwise, both parties assume the other is handling it.

Mistake 2: Copying Without Customizing

A template SRM doesn't match your actual engagement. If you assign yourself responsibility for something you're not actually doing, you've created liability for no reason.

Review every row. Customize to reality.

Mistake 3: Not Getting Sign-Off

An SRM the client hasn't acknowledged is just your opinion. Get their signature on the document or acknowledgment in the SOW.

Mistake 4: Set and Forget

Your services evolve. The client's environment changes. New requirements emerge. If the SRM doesn't update, it becomes inaccurate.

Review annually at minimum.

Mistake 5: Too Much "MSP Responsible"

If you're taking responsibility for things outside your actual scope, you're creating liability. Be realistic about what you own.

Some things should be client responsibility: policy approval, risk decisions, regulatory notifications, workforce management. Don't take those on unless you intend to do them.

Bottom Line

A shared responsibility matrix isn't paperwork. It's liability protection.

For CMMC, it's required. For every other compliance engagement, it's essential. Without one, responsibilities are assumed, assumptions diverge, and disputes follow.

Document responsibilities before work begins. Get client sign-off. Update as circumstances change.

When something goes wrong (and eventually something will), the SRM is your first reference for who owned what. Read our MSP Compliance Liability Guide for the complete framework on protecting your business. And check out our Compliance Pricing Guide to ensure you're pricing based on what you're actually responsible for.

Frequently Asked Questions

Ready to stop guessing?

Scopable automates quoting, roadmaps, and QBRs for MSPs. Join the alpha and help shape the platform you actually want.

Quote Your Next Project In Minutes

Get MSP insights weekly

No spam. Unsubscribe anytime.