Understanding ISO and Preparing for the Modern Era of Cloud Security
|
|
|
- Virgil Howard
- 9 years ago
- Views:
Transcription
1 Understanding ISO and Preparing for the Modern Era of Cloud Security Presented by Microsoft and Foley Hoag LLP s Privacy and Data Security Practice Group May 14, 2015 Proposal or event name (optional) 2015 Foley Hoag LLP. All Rights Reserved. 1
2 Speakers Sharon Gillett, Principal Networking Policy Strategist, Microsoft Research Deborah Hurley, Founder and Principal, Hurley, and Fellow, Institute for Quantitative Social Science, Harvard University Colin Zick, Partner, Co-Chair and Co-Founder, Privacy & Data Security Practice, Foley Hoag LLP 2015 Foley Hoag LLP. All Rights Reserved. 2
3 Overview What are the key data privacy and data protection issues companies should consider before moving to cloud computing technologies? What are the key substantive requirements of ISO for handling customer data? How does ISO adoption benefit customers in regulated industries such as healthcare and financial services? How do the ISO requirements map against existing sectorbased data privacy and security standards (e.g., HIPAA, SOC 2)? What value is provided by third party verification (through accreditation) of ISO and other data privacy and security practices in cloud computing? 2015 Foley Hoag LLP. All Rights Reserved. 3
4 What is ISO 27018? On July , the International Organization for Standardization (ISO) adopted ISO as a voluntary international standard. - ISO governs the processing of personal information by public Cloud Service Providers (CSPs). Even though this standard is voluntary, it is widely expected to become the benchmark for CSPs going forward. As the first and only international privacy standard for the cloud, ISO incorporates controls for personally identifiable information (PII). ISO establishes control objectives, controls and guidelines for implementing measures to protect PII Foley Hoag LLP. All Rights Reserved. 4
5 Meet the ISO Family The ISO family of standards addresses privacy, confidentiality and technical security issues and have: "established guidelines and general principles for initiating, implementing, maintaining, and improving information security management within an organization." The standards outline hundreds of potential controls and control mechanisms. ISO 27001: - one of the most widely recognized certifications for a cloud service - defines how to implement, monitor, maintain, and continually improve the information security management system (ISMS). An organization may obtain an ISO certification on its ISMS, which is typically based on the ISO Information Security Standards Foley Hoag LLP. All Rights Reserved. 5
6 What are the key data privacy and data protection issues companies should Cover option 2 consider before moving to Subtitle or Company Name cloud computing Month Day, Year technologies? Proposal or event name (optional) 2015 Foley Hoag LLP. All Rights Reserved. 6
7 What privacy and data protection issues should be considered before moving to the cloud? Are we dealing with PII, or data that we or our customers would consider sensitive even if not formally classified as PII? Does my organization have the resources and know-how to comply on its own? Even if it does, is cloud compliance the highest and best use of my organization s resources? Will a cloud provider follow best practices to ensure the security of our data, both in terms of physical security and information access? Will the data need to cross borders? Many jurisdictions have stronger data protection laws than the U.S. can moving our data to the cloud help us with compliance? How much transparency and control will we get over what the cloud provider does with our data? Will we be able to verify the data protection assurances and contractual commitments we receive from a cloud provider? 2015 Foley Hoag LLP. All Rights Reserved. 7
8 Is it statutorily protected data of any type? - Financial - Consumer - Health care - Defense IP/Trade Secrets Contractually protected: What kind of data is it? - Are the contractual limitations on where data can go or how it is to be protected? 2015 Foley Hoag LLP. All Rights Reserved. 8
9 Where is the data? It is easy to wind up with data all around the world. The rules protecting that data are different: - United States - EU - The rest of the world. If dealing with PII or PHI, there may be a need to avoid having data crossing borders Foley Hoag LLP. All Rights Reserved. 9
10 What kind of expertise is necessary? Evaluate your security procedures against your needs. Does my organization have the resources and knowhow to comply on its own? Is compliance the highest and best use of my organization s resources? 2015 Foley Hoag LLP. All Rights Reserved. 10
11 What type of cloud service categories: are you considering? Public Cloud Customers access cloud services and store documents in large datacenters equipped with hundreds of virtualized servers that house data from multiple organizations. Private Cloud A single organization uses a dedicated cloud infrastructure. Community Cloud A private cloud is shared by a group of organizations with common missions, interests, or concerns. For example, a cloud provider may offer an instance of their services in a cloud dedicated for only government customers. Hybrid Cloud A private cloud is extended to the public cloud to extend an organization s datacenter; or two or more cloud types are linked to enable data and applications to flow between them in a controlled way Foley Hoag LLP. All Rights Reserved. 11
12 What type of cloud infrastructure are you considering? Cloud Service Categories: Software as a Service (SaaS) The cloud provider hosts a single application, or a suite of programs which includes a mix of products. Platform as a Service (PaaS) Users create and run their own software applications while relying on the cloud provider for software development tools as well as the underlying infrastructure and operating system. Infrastructure as a Service (IaaS) Users rent computing power either actual hardware or virtual machines to deploy and run their own operating systems and software applications Foley Hoag LLP. All Rights Reserved. 12
13 What are the key substantive requirements of ISO for handling customer data? Cover option 2 Subtitle or Company Name Month Day, Year Proposal or event name (optional) 2015 Foley Hoag LLP. All Rights Reserved. 13
14 Key Elements of ISO What does it cover? What is the concerns? What are the key elements of ISO 27018? All elements of PII/PHI are covered by ISO All types of industries fall within the scope of ISO ISO applies to any size company 2015 Foley Hoag LLP. All Rights Reserved. 14
15 Key Elements of ISO (cont.) What does it cover? What is the concerns? What are the key elements of ISO 27018? Need for clarity and simplicity Extensive time and expense of complying with different standards Lack of uniformity across industries, jurisdictions Worldwide recognition of security standards Standards that hold up against audits, customer inquiries and government reviews 2015 Foley Hoag LLP. All Rights Reserved. 15
16 Key Elements of ISO What does it cover? What is the concerns? What are the key elements of ISO 27018? Specifies guidelines for the protection of PII. - These protections are based on ISO 27002, taking into consideration the regulatory requirements that might be applicable within the context of the information security risk environment(s) of a provider of public cloud services. Commonly accepted control objectives, controls and guidelines. - This includes guidelines for implementing measures to protect public cloud computing in accordance with the privacy principles in ISO Under ISO 27018, compliant CSPs will not use customer data for their own independent purposes (such as advertising and marketing) without the customer s express consent, and not tie the agreement to use the services to the CSP s use of personal data for advertising and marketing Foley Hoag LLP. All Rights Reserved. 16
17 Key Elements of ISO What does it cover? What is the concerns? What are the key elements of ISO 27018? Establishes clear and transparent parameters for the return, transfer and secure disposal of personal information. Requires CSPs to disclose the identities of any sub-processor they engage to help with data processing before customers enter into a contract. - And if any of the CSP changes subprocessors, the CSP is required to inform customers promptly to give them an opportunity to object or terminate their agreement Foley Hoag LLP. All Rights Reserved. 17
18 How does ISO adoption benefit customers in regulated industries such as healthcare Cover and option financial 2 Subtitle or Company services? Name Month Day, Year Proposal or event name (optional) 2015 Foley Hoag LLP. All Rights Reserved. 18
19 Benefits of ISO Adoption The standard covers a wide range of subjects. It removes needs for negotiations over privacy and security standards. Demonstrated adherence to ISO allows a CSP to show that its cloud privacy policies and practices are consistent with the industry s best practices. Regulators like it, because they see it as assurance of compliance with their own country s data protection rules Foley Hoag LLP. All Rights Reserved. 19
20 How do the ISO requirements map against existing sector-based data privacy and security Cover standards option 2 (e.g., HIPAA, Subtitle SSAE/SOC or Company Name 2)? Month Day, Year Proposal or event name (optional) 2015 Foley Hoag LLP. All Rights Reserved. 20
21 ISO is applicable to all types and sizes of organizations This includes: public and private companies, government entities, not-for-profit organizations, If they provide information processing services as PII processors via cloud computing under contract to other organizations Foley Hoag LLP. All Rights Reserved. 21
22 ISO v. SSAE SSAE 16 (Statement on Standards for Attestation Engagements No. 16), the successor to SAS 70, and ISAE 3402 (International Standards for Attestation Engagement No. 3402), are audit standards established by the American Institute of Certified Public Accountants (AICPA) and the International Auditing and Assurance Standards Board of the International Federation of Accountants. SSAE 16 and ISAE 3402 are geared towards service organizations (entities that provide outsourcing services that impact the control environment of their customers, e.g., insurance and medical claims processors, hosted data centers, application service providers and managed security providers) Foley Hoag LLP. All Rights Reserved. 22
23 ISO v. SSAE (cont.) SSAE 16 and ISAE 3402 audits are independent verifications of compliance with security controls and effectiveness of security controls. At the conclusion of an SSAE 16/ISAE 3402 service auditor's examination, the service auditor renders an opinion on the following information: 1. Whether or not the service organization's description of controls is presented fairly. 2. Whether or not the service organization's controls are designed effectively. 3. Whether or not the service organization's controls are placed in operation as of a specified date. 4. Whether or not the service organization's controls are operating effectively over a specified period of time. (SSAE 16 (SOC 1) Type II and (SOC2) Type II only) Foley Hoag LLP. All Rights Reserved. 23
24 ISO v. SSAE (cont.) SSAE 16 has been predominantly used in the United States to provide a standard for audits of the design and effectiveness of controls. ISO is an international standard geared towards security practices of an organization. ISO is common in Europe, Japan and some other Asian countries, but is gaining popularity in the United States Foley Hoag LLP. All Rights Reserved. 24
25 ISO v. SSAE (cont.) ISO stipulates a set of security controls and certifies against those controls; it is more comprehensive in coverage than SSAE 16. Organizations may be certified as compliant with ISO by a number of Accredited Registrars worldwide Foley Hoag LLP. All Rights Reserved. 25
26 ISO v. HIPAA ISO mirrors some of HIPAA while also providing a third-party review mechanism. ISO focuses on PII, but can serve as a guide for a technology service provider handling PHI. ISO and HIPAA overlap significantly. It bridges the gap HIPAA leaves for those entities that touch health information, but are not HIPAA covered entities or HIPAA business associates. Technology service providers that have successfully undergone a successful audit for the controls under ISO demonstrates a commitment to using security and privacy controls that is applicable under HIPAA. However, ISO does not eliminate the need for HIPAA business associate agreements. See Commentary: Healthcare must embrace new ISO cloud privacy standard, April 27, 2015, Julie Anderson, SafeGov, Foley Hoag LLP. All Rights Reserved. 26
27 What value is provided by third party verification (through accreditation) of ISO and other data privacy Cover and option security 2 practices Subtitle in cloud or Company computing? Name Month Day, Year Proposal or event name (optional) 2015 Foley Hoag LLP. All Rights Reserved. 27
28 The Value of ISO Compliance: Look to work with CSPs that are verified as ISO compliant. Accreditation: In order to be so certified, a CSP must go through a rigorous process, under the auspices of an accredited and independent certification body. Regular Reviews: And to remain compliant, a CSP must subject itself to regular third-party reviews of its adherence to ISO Foley Hoag LLP. All Rights Reserved. 28
29 Next Steps Review your company s existing CSP agreements, to see what they say about compliance with existing cloud standards, including ISO Cloud users should ask their current CSPs if they are now (or are planning to be) ISO compliant. Consider amendments to CSP agreements to add ISO compliance Foley Hoag LLP. All Rights Reserved. 29
30 For follow-up, please contact: Colin J. Zick, Esq. Thank you! Partner and Co-Chair, Privacy and Data Security Practice Group Foley Hoag LLP (617) Foley Hoag LLP. All Rights Reserved
Hans Bos Microsoft Nederland. [email protected]
Hans Bos Microsoft Nederland Email: Twitter: [email protected] @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
Cloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
Service Organization Control Reports
SAS 70 ENDS EXIT TO SSAE 16 Service Organization Control Reports What Did We Learn from Year One? Agenda Definitions Service Organization Reports What are they? Year One Experiences SSAE 16 Year One Experiences
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?
Privacy Transparency What does privacy at Microsoft mean? Are you using my data to build advertising products? Where is my data? Who has access to my data? Compliance What certifications and capabilities
Whitepaper. Canopy Security. Simplicity, Agility, Transparency. An Atos company. Powered by EMC 2 and VMware
Whitepaper Canopy Security Simplicity, Agility, Transparency 2 Whitepaper Summary Introduction While business is turning to the cloud to save costs and improve agility, for many enterprises security is
Cloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
Protecting Data and Privacy in the Cloud
Protecting Data and Privacy in the Cloud Contents 1 3 6 9 12 13 Protecting Data and Privacy in the Cloud an Introduction Building Services to Protect Data Protecting Data in Service Operations Empowering
Third party assurance services
TECHNOLOGY RISK SERVICES Third party assurance services Delivering assurance over your service providers The current third party service provider environment Corporate UK has been transformed in recent
Contracting with a Cloud Service Provider DATA PROTECTION WORKSHOP NJERI OLWENY, MICROSOFT
Contracting with a Cloud Service Provider DATA PROTECTION WORKSHOP NJERI OLWENY, MICROSOFT Overview Cloud computing offers great opportunities for organizations, including schools, hospitals and businesses
Goodbye, SAS 70! Hello, SSAE 16!
Goodbye, SAS 70! Hello, SSAE 16! A Session to Provide Insight on the New Standard and What Service Providers and End-Users Need to Know January 3, 2012 Agenda Introduction Background on what was SAS 70
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS Jeff Cook November 2015 Summary Service Organization Control (SOC) reports (formerly SAS 70 or
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Licensing Guide for Partners. Leveraging Data Center Providers and Software Services Resellers
Licensing Guide for Partners Leveraging Data Center Providers and Software Services Resellers LEVERAGING DATA CENTER PROVIDERS AND SOFTWARE SERVICES RESELLERS: LICENSING GUIDE Table of Contents Introduction...
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch
SSAE 16 for Transportation & Logistics Companies Chris Kradjan Kim Koch 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind,
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
Privacy in the Cloud A Microsoft Perspective
A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased
Service Organization Controls. Managing Risks by Obtaining a Service Auditor s Report
Service Organization Controls Managing Risks by Obtaining a Service Auditor s Report Contributing Authors Audrey Katcher, CPA/CITP, Partner at RubinBrown, LLP Janis Parthun, CPA/CITP, Sr. Technical Manager
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister
2011 Morrison & Foerster LLP All Rights Reserved mofo.com Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister Presenter Miriam Wugmeister Morrison & Foerster LLP New York
OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
Isaac Willett April 5, 2011
Current Options for EHR Implementation: Cloud or No Cloud? Regina Sharrow Isaac Willett April 5, 2011 Introduction Health Information Technology for Economic and Clinical Health Act ( HITECH (HITECH Act
CSA Position Paper on AICPA Service Organization Control Reports
CSA Position Paper on AICPA Service Organization Control Reports February 2013 2013, Cloud Security Alliance. All rights reserved. You may download, store, display on your computer, view, print, and link
10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015
10 Considerations for a Cloud Procurement Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015 www.lbmctech.com [email protected] Purpose: Cloud computing provides public sector organizations
Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:
UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
FAQs New Service Organization Standards and Implementation Guidance
FAQs New Service Organization Standards and Implementation Guidance During the past two years several significant changes have occurred in audit and attest standards for reporting on controls at service
HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers
How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting
SOC 3 for Security and Availability
SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2014 through September 30, 2015 Independent SOC 3 Report for the Security and Availability Trust
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
SERVICE ORGANIZATION CONTROL REPORTS SM. Formerly SAS 70 Reports
SERVICE ORGANIZATION CONTROL REPORTS SM Formerly SAS 70 Reports SAS No. 70, Service Organizations Standard for reporting on a service organization s controls affecting user entities financial statements
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini
Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last
SSAE 16 & SAS 70 A Primer on Changes to Service Organization Audit Standards
A Member of OneBeacon Insurance Group SSAE 16 & SAS 70 A Primer on Changes to Service Organization Audit Standards Author: Jack Fletcher, Risk Control Technology Specialist Published: November 2014 Executive
{Moving to the cloud}
{Moving to the cloud} plantemoran.com doesn t mean outsourcing your security controls. Cloud computing is a strategic move. Its impact will have a ripple effect throughout an organization. You don t have
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania
Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of
Microsoft Azure. White Paper Security, Privacy, and Compliance in
White Paper Security, Privacy, and Compliance in Security, Privacy, and Compliance in Executive Summary The adoption of cloud services worldwide continues to accelerate, yet many organizations are wary
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for
Contracting for Cloud Computing
Contracting for Cloud Computing Geofrey L Master Mayer Brown JSM Partner +852 2843 4320 [email protected] April 5th 2011 Mayer Brown is a global legal services organization comprising legal
Service Organization Control (SOC) Reports
Service Organization Control (SOC) Reports Transitioning from SAS 70 to SSAE 16 Deloitte & Touche LLP Agenda Overview SAS 70/SSAE 16 Historical Perspective The New Framework Under SSAE 16 (SOC 1) Impact
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
Qualification Guideline
Qualification Guideline June 2013 Disclaimer: This document is meant as a reference to Life Science companies in regards to the Microsoft O365 platform. Montrium does not warrant that the use of the recommendations
Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015
Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should
Open Certification Framework. Vision Statement
Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
Assessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
Speakers. Michael R. Overly, Partner, Yusuf Cassim, Senior Corporate Counsel & VP,Charles Schwab & Co., Inc. Foley & Lardner LLP
1 Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago, IL 60654 312.832.4500
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined
NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015
NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 [email protected]
Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC! 24.06.
Securing the Microsoft Cloud Infrastructure Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC! 24.06.2015 1 Certification & Security Reliance Microsoft s cloud environment Application
SOC Readiness Assessments. SOC Report - Type 1. SOC Report - Type 2. Building Trust and Confidence in Third-Party Relationships
Building Trust and Confidence in Third-Party Relationships Today s businesses rely heavily on outsourcing certain business tasks or functions to service organizations, even those that are core to their
SAS No. 70, Service Organizations
SAS No. 70, Service Organizations A standard for reporting on a service organization s controls affecting user entities' financial statements. Only for use by service organization management, existing
Appendix D-1 to Aproove Saas Contract : Security and solution hosting provider specs.
Appendix D-1 to Aproove Saas Contract : Security and solution hosting provider specs. The hosting company retained by Aproove is Microsoft Corporation, One Microsoft Way, Redmond, Washington 98052 USA.
