Cloud Computing Risks and Considerations for a Successful Implementation. Andrew Ellsweig, Director Nicholas Zaky, Manager

Size: px
Start display at page:

Download "Cloud Computing Risks and Considerations for a Successful Implementation. Andrew Ellsweig, Director Nicholas Zaky, Manager"

Transcription

1 Cloud Computing Risks and Considerations for a Successful Implementation Andrew Ellsweig, Director Nicholas Zaky, Manager

2 Agenda Cloud Computing Defined Cloud Computing Benefits Top Cloud Security Threats and Risks Vendor Selection Due Diligence Database Security Considerations Implementation Questions and Answers 1

3 A Working Definition of Cloud Computing Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. Source: NIST 2

4 The NIST Cloud Definition Framework Hybrid Clouds Deployment Models Private Cloud Community Cloud Public Cloud Service Models Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) On Demand Self-Service Essential Characteristics Broad Network Access Resource Pooling Rapid Elasticity Measured Service Massive Scale Resilient Computing Common Characteristics Source: NIST Homogeneity Virtualization Low Cost Software Geographic Distribution Service Orientation Advanced Security 3

5 Cloud Deployment Models Private cloud - Enterprise owned, leased or managed - Internal virtualized servers that host a corporate intranet site, which is only accessible to users behind the corporate firewall Community cloud - Shared infrastructure for specific group or community - Google s Gov Cloud, which is a government specific offering of Google s cloud offerings such as Google apps Public cloud - Sold to the public, large-scale infrastructure - Includes capacity on demand - An example includes Amazon s simple storage service ( ES3 ) Hybrid cloud - Composition of two or more cloud models - Private cloud managing local data backups and replication of that data to a public cloud solution 4

6 Cloud Computing Benefits Rapid deployment of applications and resources - Great for dealing with seasonal demand or other spikes in business Available anywhere and anytime Cost savings due to reduction of capital expenditures and IT staff Operating expenses (vs. Capex) Reduce power consumption (aka: Green savings) Scalable Maintenance and availability become someone else s responsibility Source: NIST 5

7 Cloud Computing Benefits (Cont.) No more buying servers - Under-utilization and rapid depreciation No buying switches, routers, cabling, backup power, redundant bandwidth, and HVAC Reduce IT staff for server maintenance and server/computer rooms. They buy equipment, you rent - By the gigahertz, gigabyte, kilowatt, Mbps They hire IT staff, you rent their services Possible economies of scale. Lower capital expenditures and IT operating costs Source: Proformative 6

8 Cloud Computing Benefits Cost Savings Estimates vary widely on potential cost savings: Brian Gammage, Gartner Fellow - If you move your data center to a cloud provider, it will be a tenth of the cost. CTO of Washington D.C. - Use of cloud applications can reduce costs from 50% to 90% Preferred Hotel - Traditional: $210k server refresh and $10k/month - Cloud: $10k implementation and $16k/month (33 month break even) Ted Alford and Gwen Morton of Booz Allen Hamilton - Government agencies moving to public or private clouds can save from 50 to 67 percent. Merrill Lynch - Claimed that technology could make business applications 3 to 5 times cheaper, meaning that organizations could save anywhere from 67 to 80% William Forrest, McKinsey Analyst - In disputing some of the cost savings examples he indicated that: There would be few savings from cloud migrations and that moving to the cloud actually would cost 144 percent more than current expenditures. 7

9 Cloud Computing Risks There are a number of "hidden gotchas" when it comes to using cloud providers Not taking full account of financial commitments on existing hardware Not factoring in your unique requirements when signing up for a cloud service Signing an agreement that doesn't account for seasonal or variable demands Assuming you can move your apps to the cloud for free Assuming an incumbent vendor's new cloud offering is best for you Getting locked into a cloud solution Source: CFO.com 8

10 Cloud Computing Risks (Cont.) Moving PII and sensitive data off-premise - Privacy impact assessments Using SLAs for cloud security - Suggested requirements for cloud SLAs - Issues with cloud forensics Contingency planning, disaster recovery Handling compliance - FISMA - HIPAA - SOX - PCI - SAS 70/SSAE16 Audits Source: NIST 9

11 Cloud Computing Security Risks Trust vendor s security model Respond to audit findings Support forensic investigations Liable for third party administrator Vet proprietary implementations Lack physical control Know where data is Source: NIST 10

12 Cloud Computing Security Risks (Cont.) More than half of U.S. organizations are adopting cloud services, but only 47 percent believe that cloud services are evaluated for security prior to deployment. More than half of U.S. organizations are unaware of all the cloud services in use today Substantial concern in securing mission critical data and business processes in the cloud. The surveyed IT practitioners note some data is still too risky for the Cloud: - 68 percent thought it too risky to store financial information and intellectual property - 55 percent do not want to store health records - 43 percent are not in favor of storing credit card information Source: CA Technologies and the Ponemon Institute 11

13 Top Cloud Security Threats According to Cloud Security Alliance (CSA) the following are the top threats: - Abuse and Nefarious Use of Cloud Computing - Insecure Application Programming Interfaces (API) - Malicious Insiders - Shared Technology Vulnerabilities - Data Loss/Leakage - Account, Service, and Traffic Hijacking Matrixed to impact on specific cloud computing service models CSA s mission: promote best practices for security assurance within Cloud Computing, and provide education on Cloud Computing to help secure all other forms of computing 12

14 Moving to the Cloud Considerations Readiness Assessment Requirements Definition and Vendor Selection - Develop well defined business requirements - Identify vendors that can meet these requirements Due Diligence - Organize a committee that is composed of representatives from affected business areas - Develop structured methodology to better understand the use of cloud computing within the company and it s associated risks Implementation Plan - Identify each party s responsibilities - Develop a plan to test and evaluate data, interfaces, functionality, and systems that are migrated to the cloud - Ensure appropriate end-user involvement and training 13

15 Vendor Selection Considerations Develop a well-defined Request for Proposal ( RFP ) Prioritize business needs View and evaluate demonstrations and trials Perform reference checks and review search engine results Evaluate if the vendor s overall culture fits well with your company s Use questionnaires to evaluate the potential cloud provider that should address your company s requirements for: - Security - Availability - Regulatory compliance - Internal controls and monitoring - ROI - Auditability Source: Intacct 14

16 Vendor Selection Governance Define business and regulatory requirements to help identify specific security requirements and controls that need to be in place at the potential cloud provider - Allows a company to compare vendors via an apples-to-apples comparison to determine their strengths and weaknesses Source: Dark Reading 15

17 Provider Due Diligence Before entering into an agreement with a cloud (or any outsourced) provider, organizations need to perform due diligence procedures, which should be based on the type of data/processes being outsourced or moved to the Cloud Due diligence should be carried out by a multi-disciplinary team that could include members from the business area(s) affected, finance, legal, information security, privacy office, corporate security & audit Because it does not fit in their cost model, most cloud providers will not allow on-site audits If Type II SSAE16s (or other attestations or certifications) are not available (e.g., for smaller providers or new entrants into Cloud Computing), then an on-site audit is recommended Audits should be performed pre-contract execution where possible Should also evaluate the vendors health, including review of D&B reports Develop a structured methodology albeit through policy, procedure or questionnaire to assess a potential vendor s ability to meet the company s requirements for availability, security, privacy, controls, etc. 16

18 Provider Due Diligence (cont.) Vendor selection risk assessments should address the following: - What type of data is being stored and what are the associated compliance requirements - How should the data be protected, (e.g., IDS, firewalls, encryption, etc.) - Who should/will have access to stored data How does the provider perform background checks - Will the hosting provider allow the customer to perform independent audits or have third-party audits been completed, such as SSAE 16 exists - How will authorized users gain access to hosted data (secured protocol, direct DB access, application only) - Is there a database in the back end is the data and user credentials being encrypted - If the database is shared, how will the hosted provider ensure data is only viewable and accessible to a single customer 17

19 Provider Due Diligence (cont.) Vendor selection risk assessments should address/determine the following: Where is the data physically stored? Are there specific state laws that need to be complied with? Has the hosted provided considered its ability to comply with data privacy regulations (e.g., Privacy over donor information)? What are your companies quality-of-service (QoS) requirements? Can the hosting provider meet these? Does your company s existing Disaster Recovery Plan address the unique issues related to cloud services? Can the standard internal controls be applied to the hosted service Identify whether the service provider has a proven history of delivering security functionality via the Internet Does the hosting provider have proactive security intelligence? Ability to work with existing infrastructure Source: IBM 18

20 SAS70 Vs. SSAE16 & ISAE3402 Key Difference SSAE 16 replaced the SAS 70 auditing standard for reporting periods ending on or after June 15,

21 SOC1, SOC2 & SOC3 Under what professional standard is the engagement performed? SOC 1 Reports SOC 2 Reports SOC 3 Reports SSAE No. 16, Reporting on Controls at a Service Organization AICPA Guide, Applying SSAE No. 16, Reporting on Controls at a Service Organization. AT 101, Attestation Engagements AICPA Guide, Reporting on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy. AT 101, Attestation Engagements AICPA Technical Practice Aid, Trust Services Principles, Criteria, and Illustrations What is the subject matter of the engagement? Controls at a service organization relevant to user entities internal control over financial reporting. Controls at a service organization relevant to security, availability, processing integrity confidentiality, or privacy. If the report addresses the privacy principle, the service organization s compliance with the commitments in its statement of privacy practices. Controls at a service organization relevant to security, availability, processing integrity, confidentiality, or privacy. If the report addresses the privacy principle, the service organization s compliance with the commitments in its statement of privacy practices What is the purpose of the report? To provide information to the auditor of a user entity s financial statements about controls at a service organization that may be relevant to a user entity s internal control over financial reporting. It enables the user auditor to perform risk assessment procedures, and if a type 2 report is provided, to assess the risk of material misstatement of financial statement assertions affected by the service organization s processing. To provide management of a service organization, user entities and other specified parties with information and a CPA s opinion about controls at the service organization that may affect user entities security, availability, processing integrity, confidentiality or privacy. A type 2 report that addresses the privacy principle, also provides a CPA s opinion about the service organization s compliance with the commitments in its statement of privacy practices To provide interested parties with a CPA s opinion about controls at the service organization that may affect user entities security, availability, processing integrity, confidentiality, or privacy. A report that addresses the privacy principle, also provides a CPA s opinion about the service organization s compliance with the commitments in its privacy notice. 20

22 SSAE16/SAS70s Cloud Computing Myth #1: My Provider is SSAE16 (or SAS70) Certified, so I do not have to worry about my data Most large providers are now performing SSAE16s or other attestations (e.g., Webtrust/Systrust or SOC-2 /SOC-3). SSAE16s are a good first step for gaining assurance that the provider has documented control procedures. Type I vs. Type II: Type I reports only provide a Service organization's description of controls and an auditors opinion on whether the controls were designed effectively. Type I reports do not include testing of the controls. Type II reports also include the results of an independent auditors testing of the controls. SAS70s were replaced by SSAE 16 (US standard) and all reports need to comply with the International Standard ISAE SOC-1 reporting, which uses the SSAE 16 professional standard, is geared toward reporting on controls relevant to financial reporting. SOC-2 and SOC-3 reports are designed for reporting on controls other than those likely to be relevant to user entities internal controls outside of financial reporting (e.g., security, availability, processing integrity, confidentiality, or privacy). In short, SOC 2 and SOC 3 reports are to be issued under the AT Section 101 attest standard. SOC-3 report does not include the detailed description of tests, controls and results that are included in a SOC-2 report. 21

23 SSEA16 Reliance & Limitations SSAE16 limitations included a general lack of security focus and the testing procedures are sometimes narrowly defined When reviewing SSAE16, organizations should consider the following: - Was it a Type I or a type II? - Who performed the SSAE16? - Did the entity receive a clean audit opinion? - What audit objectives & testing procedures were covered by the SSAE16? - Were there any findings and how were they addressed? - What Client Control Considerations were included? - Is this enough to cover the organizations regulatory requirements (e.g., PCI, SOX, GLBA, Privacy Laws)? - Did they cover sub-service organizations? 22

24 SSAE16s - The Bottom Line Organizations should look for additional assurances besides the SSAE16s, which can include: ISO 27001/27002 TRUSTe Verisign Safeharbor SOC2/SOC3 SSAE16s must be reviewed carefully to verify they are still applicable and that all areas that are important to your organization are covered 23

25 Other Certifications SalesForce.com 24

26 Due Diligence Leveraging the CCM The Cloud Security Alliance recently launched the Cloud Controls Matrix (CCM) 1.1 The CSA Governance, Risk Management and Compliance ( GRC ) Stack, is specifically designed to: - Provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. - Provide a controls framework that gives a detailed understanding of security concepts and principles that are aligned to the Cloud Security Alliance s 13 domains. - Strengthen existing information security control environments by emphasizing business information security control requirements. - Reduce and identify consistent security threats and vulnerabilities in the cloud. - Standardize security and operational risk management - Normalize security expectations, cloud taxonomy and terminology, and security measures implemented in the cloud. The foundations of the CSA CCM rest on its customized relationship to other industryaccepted security standards, regulations, and controls frameworks such as ISO 27001/27002, ISACA COBIT, PCI, and NIST. The matrix is now available for free download at: Source: 25

27 Cloud Security Alliance Cloud Controls Matrix 26

28 Cloud Security Alliance Cloud Controls Matrix 27

29 Database Security - Considerations What is the goal of database security? Protect data in use, in motion and at rest Approach Since some deployment models abstract the layers we would like to have control over let s focus on the data rather than the database. 28

30 Database Security - Considerations Review of deployment models: SaaS IaaS PaaS Public Private 29

31 Database Security - Considerations So Now What? Since cloud services look at resources in a modular fashion it makes sense to look at security in a modular fashion as well. 30

32 Database Security - Considerations IaaS Depending on the vendor you may configure everything yourself or go with pre-built virtual machines. Some even offer pre-built database implementations. You are responsible for managing everything relating to security Is this the same as managing in-house systems? You may still be a part of a multi-tenant environment. 31

33 Database Security - Considerations PaaS Can be thought of as database as a service. Vendor may provide OS and database software but you can typically alter the internal structure, change features and configure the DB to meet your needs. Vendor may perform maintenance as well as assist with configuration; this should be defined as part of the RFQ process Examples: MS SQL Azure Amazon Simple DB Google s Big Table Database.com by Salesforce.com You are still responsible for managing the DB, setting access and securing data. Auditing, vuln/pen testing is likely not allowed 32

34 Database Security - Considerations SaaS Examples Salesforce.com Oracle on Demand Google Apps Most if not all of SaaS vendors have DBs in the background supporting the application Storage is abstracted and hidden by design You are still responsible for setting up user accounts and authorization but other security is performed by the vendor SLA s are key with this type of deployment Review the vendor s security implementation (SSAE16 s etc) 33

35 Database Security - Considerations Security Most models focus on patching, configuration and access controls. Here we will look at the data this is what we have control over in the cloud and it is what we really care about anyway right? 34

36 Database Security - Considerations 35

37 Database Security - Considerations Data Creation Look at how data is classified as it is created or when you move it into the cloud service Data Loss Prevention (DLP) or Content discovery tools: RSA, Cisco, Symantec, McAfee all have products. Data crawlers can be used to scan DBs for sensitive information Label Security Options Labels and Schemas defined prior to implementation Post-insertion scripts to apply controls or verify labels are in place Digital Rights Management (DRM) or Encryption for more sensitive data Separate crypto keys for different access levels 36

38 Database Security - Considerations What if our data is already in the cloud? SaaS Determine if the provider will provide a database schema with column definitions. Manual Process Use data archives Encryption/label security or authorization mapping SLA s 37

39 Database Security - Considerations What if our data is already in the cloud? IaaS Column / Table encryption Structure, system catalog and content Use tags to designate classification Tagged file or ISAM Focus on finding and tagging data so you can protect it 38

40 Database Security - Considerations What if our data is already in the cloud? PaaS All of your discovery, classification and rights management tools should still work Find the data Understand the Data lifecycle 39

41 Database Security - Considerations Do your work up front to plan controls and think in terms of the data life-cycle prior to moving data into the cloud whenever possible. 40

42 Implementation - Considerations Include appropriate SLAs to ensure expectations are clearly defined. Data migration assurance (e.g., if you decide to switch vendors ensure that hosted provider can provide your data back in a workable format) Availability requirements Bonus structure for exceeding expectations and penalties for not meeting SLA Identify price caps for future services if steep discounts were provided during initial subscription Training requirements Notification of upgrades, modifications, service disruptions, etc. Cost of overages (e.g., if 10 users were subscribed but then 15 are required) Verify that prerequisites are identified and in place (e.g., If particular OS have to be used, if client side software needs to be installed) Source: IBM 41

43 Implementation Considerations (Cont.) Make sure end-user considerations and controls are reviewed and implemented Perform an analysis to determine if existing security services/licenses are redundant and can be removed Evaluate and be involved with testing of interfaces that may be implemented between systems Ensure a designated Point of Contract ( POC ) is defined for issues with the hosted service. Ensure an escalation plan exists so that the customer (including business users) are notified of incidents timely Source: IBM 42

44 Implementation Considerations Private Cloud Private Cloud implementation considerations - Use an incremental approach, to avoid service disruptions and minimize risk - Test the cloud technology in a development environment to allow IT and staff become accustomed to it - Determine which applications are cloud candidates and implement those that are into production - Review existing processes and determine if manual processes can be automated and if support groups have to be reorganized to use their knowledge and capabilities to the fullest 43

45 Implementation - Governance Make sure appropriate SLA and contractual agreements are in place to define and/or identify Type of data managed and ownership Monitoring and reporting requirements Security and privacy requirements (e.g., encryption standards, data separation/segregation, HIPPA, PCI DSS, SOX, etc.) Internal policies and procedures that need to be revisited and updated to include the use of cloud computing The monitoring program in place to ensure controls exist and remain in place Source: Intacct & IBM 44

46 Cloud Computing - Summary The cloud computing trend is gaining traction and provides management with a wonderful opportunity for reducing costs, reacting quickly to changing business needs and for freeing up their IT resources so they can focus on supporting the business. While security/privacy issues are some of the biggest concerns for management, these can be effectively mitigated via sound due diligence and vendor oversight. Management should ensure that they have the correct team in place when evaluating any new provider relationships to ensure that they have all the facts and that their ROI calculations are complete. 45

47 Selected References National Institute of Standards and Technology (NIST), Cloud Security Alliance (CSA), Proformative, The Resource For Corporate Finance, Accounting & Treasury Professionals,

48 Questions? Andrew Ellsweig, CPA, CGEIT Director RSM McGladrey, Inc Nicholas Zaky, MCP, CISSP Manager McGladrey & Pullen LLP

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

Cloud Services Overview

Cloud Services Overview Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Cloud Computing An Auditor s Perspective

Cloud Computing An Auditor s Perspective Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,

More information

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization

More information

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify

More information

Compliance and the Cloud: What You Can and What You Can t Outsource

Compliance and the Cloud: What You Can and What You Can t Outsource Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

The Elephant in the Room: What s the Buzz Around Cloud Computing?

The Elephant in the Room: What s the Buzz Around Cloud Computing? The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton

More information

Cloud models and compliance requirements which is right for you?

Cloud models and compliance requirements which is right for you? Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,

More information

Orchestrating the New Paradigm Cloud Assurance

Orchestrating the New Paradigm Cloud Assurance Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems

More information

Production in the Cloud

Production in the Cloud 2/18/2013 Production in the Cloud Presentation by: Rick Dmytryshyn, Program Manager Ph. (303) 882-1282, E-mail. [email protected] Presentation Overview DEFINITION: What is the Cloud? SECURITY:

More information

Open Source and Cloud. Ramesh Kumar

Open Source and Cloud. Ramesh Kumar Open Source and Cloud Ramesh Kumar Agenda Introduction to Open Source Potential Benefits Potential Disadvantages/ Risks Costs vis a vis Business Needs What is Cloud technology? Benefits V/s Risks of Cloud

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

Cloud Computing Thunder and Lightning on Your Horizon?

Cloud Computing Thunder and Lightning on Your Horizon? Cloud Computing Thunder and Lightning on Your Horizon? Overview As organizations automate more and more of their manual processes, the Internet is increasingly becoming an important tool in the delivery

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

Cloud Computing: Background, Risks and Audit Recommendations

Cloud Computing: Background, Risks and Audit Recommendations Cloud Computing: Background, Risks and Audit Recommendations October 30, 2014 Table of Contents Cloud Computing: Overview 3 Multiple Models of Cloud Computing 11 Deployment Models 16 Considerations For

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director

More information

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies

More information

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson

More information

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data

More information

Deploying a Geospatial Cloud

Deploying a Geospatial Cloud Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size

More information

Auditing Cloud Computing and Outsourced Operations

Auditing Cloud Computing and Outsourced Operations Session 136 Auditing Cloud Computing and Outsourced Operations Monday, May 7, 2012 3:30 PM 5:00 PM Mike Schiller Director of Sales & Marketing IT, Texas Instruments Co Author, IT Auditing: Using Controls

More information

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101

Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101 Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro

More information

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud Computing Governance & Security. Security Risks in the Cloud Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud

More information

journey to a hybrid cloud

journey to a hybrid cloud journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - 45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor [email protected]

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com Cloud Security & Risk Adam Cravedi, CISA Senior IT Auditor [email protected] Agenda About Compass Overcast - Cloud Overview Thunderheads - Risks in the Cloud The Silver Lining - Security Approaches

More information

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014 IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security

More information

GRC Stack Research Sponsorship

GRC Stack Research Sponsorship GRC Stack Research Sponsorship Overview Achieving Governance, Risk Management and Compliance (GRC) goals requires appropriate assessment criteria, relevant control objectives and timely access to necessary

More information

With Eversync s cloud data tiering, the customer can tier data protection as follows:

With Eversync s cloud data tiering, the customer can tier data protection as follows: APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the

More information

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National

More information

Cloud Computing An Internal Audit Perspective. Heather Paquette, Partner Tom Humbert, Manager

Cloud Computing An Internal Audit Perspective. Heather Paquette, Partner Tom Humbert, Manager Cloud Computing An Internal Audit Perspective Heather Paquette, Partner Tom Humbert, Manager March10 2011 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,

More information

How To Protect Your Cloud Computing Resources From Attack

How To Protect Your Cloud Computing Resources From Attack Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview

More information

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) [email protected] www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions

More information

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

Tips For Buying Cloud Infrastructure

Tips For Buying Cloud Infrastructure 27 Tips For Buying Cloud Infrastructure A Comprehensive list of questions to ask yourself when reviewing potential cloud providers By Christopher Wilson @chrisleewilson Table of Contents Intro: Evaluating

More information

Cloud Security Certification

Cloud Security Certification Cloud Security Certification January 21, 2015 1 Agenda 1. What problem are we solving? 2. Definitions (Attestation vs Certification) 3. Cloud Security Responsibilities and Risk Exposure 4. Who is responsible

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

NAREIM Session: Dangers and challenges of The Cloud. President, NiceNets Consulting, LLC

NAREIM Session: Dangers and challenges of The Cloud. President, NiceNets Consulting, LLC Main Types of Cloud Environments: - Public Cloud: A service built on an external platform run by a cloud service provider such as IBM, Amazon Web Services or Microsoft Azure. Subscribers can get access

More information

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data

More information

Compliance and Cloud Computing

Compliance and Cloud Computing Compliance and Cloud Computing Balaji Palanisamy Director, Southwest- US Coalfire Systems, Inc. July 24, 2014 Agenda Introduction Cloud Computing Basics Cloud Computing Threats Security vs. Compliance

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Information Security: Cloud Computing

Information Security: Cloud Computing Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration

More information

Cloud & Security. Dr Debabrata Nayak [email protected]

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages

More information

Cloud Storage: Where Does It Fit Into Tomorrow s IT?

Cloud Storage: Where Does It Fit Into Tomorrow s IT? Cloud Storage: Where Does It Fit Into Tomorrow s IT? Vincent Franceschini CTO Distributed Data Storage Solutions Hitachi Data Systems Corporation [email protected] Constant, increasing reliance

More information

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2013 through September 30, 2014 Independent SOC 3 Report for the Security and Availability Trust

More information

Cloud Security: The Grand Challenge

Cloud Security: The Grand Challenge Dr. Paul Ashley IBM Software Group [email protected] Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and

More information

Cloud Computing Trends, Examples & What s Ahead

Cloud Computing Trends, Examples & What s Ahead Cloud Computing Trends, Examples & What s Ahead Mike Klein President, Online Tech June 21, 2010 Cloud Computing Defined One Definition: On-Demand Computing Elastic & Scalable Rapidly Provisioned Virtualized

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

Top 10 Cloud Risks That Will Keep You Awake at Night

Top 10 Cloud Risks That Will Keep You Awake at Night Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com

More information

Legal Issues in the Cloud: A Case Study. Jason Epstein

Legal Issues in the Cloud: A Case Study. Jason Epstein Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types

More information

Information Technology: This Year s Hot Issue - Cloud Computing

Information Technology: This Year s Hot Issue - Cloud Computing Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.

More information

Securing Oracle E-Business Suite in the Cloud

Securing Oracle E-Business Suite in the Cloud Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The

More information

Cloud Computing What Auditors need to know

Cloud Computing What Auditors need to know Cloud Computing What Auditors need to know This presentation is provided solely for educational purposes and, in developing and presenting these materials, Deloitte is not providing accounting, business,

More information

Vendor Management Best Practices

Vendor Management Best Practices 23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion

More information

CLOUD SERVICES FOR EMS

CLOUD SERVICES FOR EMS CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition VMware vcloud Architecture Toolkit Version 2.0.1 October 2011 This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents

More information

security in the cloud White Paper Series

security in the cloud White Paper Series security in the cloud White Paper Series 2 THE MOVE TO THE CLOUD Cloud computing is being rapidly embraced across all industries. Terms like software as a service (SaaS), infrastructure as a service (IaaS),

More information

Evaluating the Cloud An Executive Perspective

Evaluating the Cloud An Executive Perspective Evaluating the Cloud An Executive Perspective Terry Ginley, Socius Jason Rook, Microsoft Cloud is front and center In This Session Why is the cloud gaining traction? Types of Cloud Deployments IAAS Hosted

More information

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected]

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit jdoleh@wayne.edu Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit [email protected] 2 If cloud computing is so simple, then what s the big deal? What is the

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................

More information

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors 1 Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors Scott Woodison Executive Director, Compliance and Enterprise Risk Office of Internal Audit and Compliance

More information

Clinical Trials in the Cloud: A New Paradigm?

Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

A Flexible and Comprehensive Approach to a Cloud Compliance Program

A Flexible and Comprehensive Approach to a Cloud Compliance Program A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility

More information

Key Considerations of Regulatory Compliance in the Public Cloud

Key Considerations of Regulatory Compliance in the Public Cloud Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

More information