Cloud Computing and SaaS Environments



Similar documents
Services Providers. Ivan Soto

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Pharma CloudAdoption. and Qualification Trends

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Cloud Services Overview

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Qualification Guideline

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Computing; What is it, How long has it been here, and Where is it going?

Validating Enterprise Systems: A Practical Guide

Clinical Trials in the Cloud: A New Paradigm?

Managing Cloud Computing Risk

How To Run A Cloud Based Data Centre

ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT


Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

Legal Issues in the Cloud: A Case Study. Jason Epstein

Enterprise Governance and Planning

Cloud Computing in a Regulated Environment

The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies

Tips For Buying Cloud Infrastructure

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Validating Cloud. June 2012 Merry Danley

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

Developing a Risk-Based Cloud Strategy

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

2014 HIMSS Analytics Cloud Survey

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014

CLOUD IN HEALTHCARE EXECUTIVE SUMMARY 1/21/15

MiServer and MiDatabase. Service Level Expectations. Service Definition

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

custom hosting for how you do business

Cloud Computing Security Issues

LEGAL ISSUES IN CLOUD COMPUTING

Incident Handling in the Cloud and Audit s Role

ROLE PROFILE. Business Function: Software Operations Managed Cloud Services eg s Head Office, Dunston Business Village, Staffordshire

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Addressing Cloud Computing Security Considerations

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

White Paper on CLOUD COMPUTING

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Orchestrating the New Paradigm Cloud Assurance

All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

BT Ireland and the Cloud

NIST Cloud Computing Reference Architecture

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

CLOUD MIGRATION. Celina Alexandre M6807

CLOUD SERVICE SCHEDULE Newcastle

4/28/2014. What's the Scoop on Cloud Computing. Agenda. Why you are here?

CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS

Developing SAP Enterprise Cloud Computing Strategy

Solutions as a Service N.Konstantinidis Technical Director - MNG

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Time to Value: Successful Cloud Software Implementation

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

IS PRIVATE CLOUD A UNICORN?

Strategies for Secure Cloud Computing

Clinical database/ecrf validation: effective processes and procedures

The NIST Definition of Cloud Computing (Draft)

Introduction to Cloud Services

BUSINESS MANAGEMENT SUPPORT

The Importance of a Cloud Strategy! Should You Consider Moving Some or All of Your Applications? Bruce Lane, Vertical Solutions

Cloud Panel Service Evaluation Scenarios

Key Considerations of Regulatory Compliance in the Public Cloud

Technology & Business Overview of Cloud Computing

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer

The Cloud at 30,000 feet. Art Ridgway Scripps Media Inc. Managing Director Newspaper IT Operations

IT Audit in the Cloud

Regulated Applications in the Cloud

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

Cloud Computing and Disaster Recovery

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

Introduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance

White Paper: Vendor Selection for Your Life Science Company Cloud

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Cloud Computing An Auditor s Perspective

Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1

CLOUD COMPUTING for Construction Accounting BY BRIAN J. THOMAS

Cloud Computing for SCADA

Private Cloud 201 How to Build a Private Cloud

VIRTUALIZATION THE FOUNDATION OF CLOUD COMPUTING

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

Whitepaper: Cloud Computing for Credit Unions

CLOUD COMPUTING DEMYSTIFIED

Cloud Panel Draft Statement of Requirement

IT Sr. Systems Administrator

Transcription:

Regulatory Considerations for Use of Cloud Computing and SaaS Environments Institute of Validation Technology Conference Qualifying and Validating Cloud and Virtualized IT Infrastructure Philadelphia PA 21 August 2012 Chris Wubbolt, BS, MS John Patterson, MSE

Challenges hll / Defintions i Historical Perspective Regulatory Requirements for computing service providers Paradigm Shift : Software Vendors to Software as a Service a Providers Qualification / Validation of hosted applications Key Risk Areas 2

Challenges Faced by Consumers Contemplating Cloud Computing Adoption Include: 1 Policy Technology Guidance Security Standards 3

Cloud computing is still in an early deployment stage, and standards are crucial to increased adoption. Urgency is driven by rapid deployment of cloud computing in response to financial incentives. Strategically, there is a need to augment standards and to establish additional security, interoperability, and portability standards : to ensure cost effective and easy migration, to ensure that mission critical requirements can be met, and to reduce the risk that sizable investments may become prematurely technologically obsolete. 4

Cloud Computing 2 Virtual Machines 3 Infrastructure as a Service (IaaS IaaS) 2 Platform as a Service (PaaS) 2 Software as a Service (SaaS) 2 5

Public Cloud 2 The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Private Cloud 2 The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. 6

A virtual machine is a tightly isolated software container that can run its own operating systems and applications as if it were a physical computer. A virtual machine behaves exactly like a physical computer and contains it own virtual (ie, softwarebased) CPU, RAM hard disk and network interface card (NIC). 7

The capability provided to the consumer is to provision processing, storage, g, networks, and other fundamental computing resources where the consumer is able to deploy and run software, which can include operating systems and applications. Theconsumer does not manageor control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls). 8

The capability provided to the consumer is to deploy onto the cloud infrastructure consumer created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. Theconsumer does not manageor control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application hosting environment. 9

The capability provided to the consumer is to use the provider s appls running on a cloud infrastructure. Theapps areaccessible accessible fromvarious client devices through either a thin client interface, such as a web browser (e.g., web based email), or program interface. The consumer does not manage or control the underlying cloud dinfrastructure t including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user specific application configuration settings. 1 0

11

12

GxP Electronic Recordkeeping Controls Qualified If Infrastructure Standard Operating Procedures Trained Personnel (including IT) Validated Applications Record Integrity Record Availability Record Retention 13

Record Integrity Record Availability Record Retention Electronic SOPs SOPs Recordkeeping Backup and Backup and Compliance Restore Restore Program Problem Business SOPs Reporting Continuity Validation Business Disaster Recovery Infrastructure Qualification Continuity Disaster Recovery Plan Record Retention Security Program Plan Policy Training Archival 14

Pharma A Data Center Inc STILL NEED GxPElectronic Recordkeeping Controls QualifiedInfrastructure Standard Operating Procedures Trained Personnel (including IT) Validated Applications 15

A computerised system is a set of software and hardware components which together fulfill certain functionalities Applications should be validated IT infrastructure should be qualified Hardware and software such as networking software and operation systems which makes it possible for the application to function Risk Management Extent ofvalidationand and dataintegritycontrols patient safety, data integrity, product quality 16

Suppliers and Service Providers Formal Agreements required to include clear statements of responsibilities Provide Configure Validate Modify Install Integrate Maintain i Retain IT departments should ldb be considered d analogous 17

GxPElectronic Recordkeeping Controls Qualified Infrastructure Standard Operating Procedures TrainedPersonnel(includingIT) Validated Applications 18

Software Vendor Quality System SLC Processes Customer Support Typically not directly regulated or inspected by regulatory agencies. Audited Adi db by clients for adherence to standards. d Quality of SLC Documentation, Testing, etc. varies considerably for each vendor. Sponsor responsible for installation, ti validation, and electronic recordkeeping controls at sponsor location. 19

Electronic Recordkeeping Compliance Program SOPs Validation Infrastructure Qualification Security Program Training Backup and Restore Problem Reporting Business Continuity Disaster Recovery Plan Record Retention Policy Archival 20

Electronic Recordkeeping Compliance Program SOPs Validation Infrastructure Qualification Security Program Training ProblemReporting Business Continuity Plan Record Retention Policy Electronic Recordkeeping Compliance Program SOPs Validation / SDLC Infrastructure Program Security Program Training BackupandRestore andrestore Problem Reporting Business Continuity Disaster Recovery Plan Record Retention Policy Archival 21

Validation SOPs User Requirements Specification User Acceptance Testing (Performance Qualification) Traceability System Acceptance Validation SOPs SDLC Methodology Functional Specification Configuration Installation (IQ) System Testing (Operational Qualification) System Release to Customer Traceability 22

Specifications Not complete Not updated periodically after changes Test Records Not pre approved Results not reviewed db by second person Integrity of test results No approved summary reports Release Management 23

Test Record Integrity Results typed into Word document or Excel spreadsheet No failures documented Test dates and times do not correlate 24

Software Vendor Quality System Quality System SLC Processes SLC Processes Customer Support Customer Support Validation Record Keeping Controls Hosted Environment Hosted Typically Environment not directly regulated is used for or a inspected direct GxPfunction by regulatory (record agencies. keeping) and is more likely to be inspected by regulatory agencies. Audited by clients for adherence to standards. Audited by clients for adherence to standards (GxP, Part 11). Quality of SLC Documentation, Testing, etc. varies considerably for each vendor. QualityofSLCDocumentation Documentation, Testing, etc. variesconsiderably considerablyfor eachvendor vendor. Sponsor SaaSprovider responsible responsible for installation, for some aspects validation, of installation, and electronic validation, recordkeeping and controls electronic at recordkeeping sponsor location. controls. 25

This could now be the documentation used to support your validation effort! Make sure you understand (and audit) your SaaS Service Providers Validation/Qualification Procedures and dd Documentation 26

SAS 70 / SSAE 16 Internationally recognized financial auditing standard developed by the AICPA SAS 70 was replaced by SSAE 16 in June 2011 There is no SAS 70 / SSAE 16 certification There is no list of published SAS 70 /SSAE 16 standards 27

SAS 70 / SSAE 16 Requires a description of controls and attestation of controls by management CPA firms issue Type I(design) and Type II (design and effectiveness) reports Neither SAS 70 or SSAE 16 discuss qualification or validation of network infrastructure 28

A SAS 70 Report by itself may not be sufficient to assure regulatory requirements are being met. 29

System Unavailable System Down Connection Problems Data Center Disaster Legal / Contractual Disputes Make sure your Business Continuity Plans are established. Be sure your legal contracts are carefully constructed and reviewed. 30

Change Control In a shared environment with multiple customers, how are hardware or software platform changes communicated or approved? How are application upgrades handled? Backups What is the frequency enc of the backup? What happens if a backup fails? Security Who has access to the computing environment (logically ll or physically)? 31

Disaster Recovery Where are the backup locations in the event of a disaster? How is the disaster recovery program tested? Environmental lc Controls What are the requirements for monitoring of environmental controls? AService Level Agreement is akey document to maintain compliance with a SaaS provider. 32

Formal Agreements (e.g. SLAs) in Place with Cloud Providers to include: Security/Incident/Problem/Change Mgt. Back up Recovery/Business Continuity it Periodic Review/Monitoring Interface Management Ensuring alignment of Cloud Providers/Consumers control processes 33

34

1. NIST Special Publication 500 293, US Government Cloud Computing Technology Roadmap, Volume I, Release 1.0 (draft) f), High Priority Requirements to Further USG Agency Cloud Computing Adoption, November 2011 2. NIST Special Publication 800 145, The NIST Definition of Cloud Computing, September 2011 3. VMWare (http://www.vmware.com/virtualization/virtual machine.html) p// / / 4. Federal Cloud Computing Strategy, The White House, February 8, 2011 35

Chris Wubbolt, BS, MS www.qacvconsulting.com Principal Consultant 3242 Regal Road QACV Consulting, LLC Bethlehem, h PA 18020 USA Telephone: 610 442 22502250 E mail: chris.wubbolt@qacvconsulting.com John Patterson, MSE Executive Director Compliance; Manufacturing, Supply Chain IT; Merck & Co. 1 Merck Drive Whitehouse Station NJ 08889 Telephone: 908 423 5675 E mail: john.patterson@merck.com 36