Risk & Control Considerations for Outsourced IT Operations



Similar documents
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Vendor Management Best Practices

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

Cloud Security and Managing Use Risks

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

CLASSIFICATION SPECIFICATION FORM

Customer-Facing Information Security Policy

VENDOR MANAGEMENT. General Overview

3 rd -party Security Risk Assessment

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

CFPB Readiness Series: Compliant Vendor Management Overview

3 rd Party Vendor Risk Management

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s

HOW SECURE IS YOUR PAYMENT CARD DATA?

SECURITY AND EXTERNAL SERVICE PROVIDERS

Third Party Risk Management 12 April 2012

2014 Vendor Risk Management Benchmark Study

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Vendor Management Compliance Top 10 Things Regulators Expect

Credit Union Liability with Third-Party Processors

Auditing Cloud Computing and Outsourced Operations

Outsourced Third Party Relationship Management/ Vendor Management. TTS Webinar July 15, 2015 Susan Orr CISA, CISM, CRISC, CRP

Outsourcing Technology Services A Management Decision

The Elephant in the Room: What s the Buzz Around Cloud Computing?

OUTSOURCING DUE DILIGENCE FORM

9/13/ /20 Vision for Vendor Management & Oversight. Disclaimer. Bank Service Company Act - FIL-49-99

Vendor Management. Outsourcing Technology Services

Vendor Compliance Management Series: Performing an Effective Risk Assessment

Professional Services Overview

ISE Northeast Executive Forum and Awards

Risk Management of Outsourced Technology Services. November 28, 2000

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

AHIA HCCA Auditing & Monitoring Focus Group Defining the Key Roles and Responsibilities Corporate Compliance and Internal Audit.

Third Party Security Guidelines. e-governance

A Flexible and Comprehensive Approach to a Cloud Compliance Program

Managing data security and privacy risk of third-party vendors

Cloud Computing An Auditor s Perspective

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA

GUIDANCE FOR MANAGING THIRD-PARTY RISK

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

Third Party Supplier Security

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: Document Version Preprint (usually an early version)

Orchestrating the New Paradigm Cloud Assurance

Vendor Management Panel Discussion. Managing 3 rd Party Risk

Anatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault

Common Student Information System for Schools and School Boards. Project Summary

Managing Outsourcing Arrangements

IT Insights. Managing Third Party Technology Risk

Cloud Computing: Background, Risks and Audit Recommendations

Mitigating and managing cyber risk: ten issues to consider

Security and Privacy in Cloud Computing

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Vendor Risk Management in the New Regulatory Environment. kpmg.com

ADMINISTRATIVE POLICY # (2014) Information Security Roles and Responsibilities

Vendor Management Compliance Top 10 Things Regulators Expect

Microsoft s Compliance Framework for Online Services

Cloud Services Overview

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

Weighing in on the Benefits of a SAS 70 Audit for Third Party Data Centers

Service Organizations and the Internal Audit function conference Institute of Internal Auditors in Israel

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

Weighing in on the Benefits of a SAS 70 Audit for Payroll Service Providers

How To Protect Your Data From Theft

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

OUTSOURCING POLICY

Payment Card Industry Data Security Standard (PCI DSS) v1.2

Domain 1 The Process of Auditing Information Systems

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

ICT SERVICE LEVEL AGREEMENT MANAGEMENT POLICY (EXTERNAL SERVICE PROVIDERS/VENDORS)

Cloud Computing Thunder and Lightning on Your Horizon?

Transcription:

Risk & Control Considerations for Outsourced IT Operations Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. Core Competencies C32 CRISC CGEIT CISM CISA

Introductions & Poll Organization has outsourced some IT operations? Organization has outsourced all of IT operations? Organization is considering outsourcing some or all of IT operations? 2

Agenda What is outsourcing/it outsourcing? Why do companies outsource IT? Current trends in IT outsourcing Benefits of IT outsourcing IT outsourcing risks Controls to be considered for IT outsourcing Risk based approach to auditing outsourced IT operations 3

What is outsourcing? A partnership between a client and an outside vendor, both sharing a common vision to effectively, efficiently, and accurately accomplish agreed-upon process for the benefit of both parties. 1 1 Outsourcing as defined in Auditing Outsourced Functions by Mark Salamasick (IIA Research Foundation) 4

What is IT Outsourcing? Per Gartner 1 : IT Outsourcing is the use of external service providers to effectively deliver IT-enabled business process, application service and infrastructure solutions for business outcomes. Outsourcing, which also includes utility services, software as a service and cloud-enabled outsourcing, helps clients to develop the right sourcing strategies and vision, select the right IT service providers, structure the best possible contracts, and govern deals for sustainable win-win relationships with external providers. 1 - http://www.gartner.com/it-glossary/it-outsourcing/ 5

Types of IT Outsourcing Application development and management Independent testing and validation services Innovation and R&D services Infrastructure management Help desk services Data center management Systems integration Managed security services, etc. 6

Why do Companies Outsource IT? Increased pressure to reduce costs Lack of technical knowledge about the particular area or process Lack of time, i.e. requirement to get things done more quickly Opportunities to increase focus on core competencies or valueadded activities Lack of labor / Staff augmentation Lack of capital or resources Opportunities to expand market share and increase revenues 7

Current Trends in IT Outsourcing Gartner 1 : Worldwide IT Outsourcing (ITO) Market to Reach $288 Billion in 2013 The global ITO market will record a 5.4% compound annual growth rate (CAGR) from 2012 through 2017. Dice 2 : U.S. Outsourcing Growth Outpaces Global Rate North America growth rate at 8 percent in 2013 and a 6 percent CAGR through 2017 1 http://www.gartner.com/newsroom/id/2550615 2 - http://news.dice.com/2013/08/12/u-s-outsourcing-growth-outpaces-global-rate/ 8

Current Trends in IT Outsourcing KPMG Sourcing Advisory 1 : 2Q13 Global Pulse Survey: ITO increase in demand of up to 36% in the next 1-2 quarters HfS Research 2 : Growth in the IT Outsourcing (ITO) services market is expected to increase in 2013 to 3.5% and sustain a 4.7% CAGR through 2017 1 http://www.kpmginstitutes.com/shared-services-outsourcing-institute/insights/2013/pdf/2q13-sourcing-advisory-global-pulse-report.pdf 2 - http://myemail.constantcontact.com/hfs-market-index-shows-4--growth-for-global-it-and-business-process-outsourcing-in- 2013.html?soid=1102861932005&aid=WRFwz7MgC4w 9

Ponemon Institute s 2013 Report on Securing Outsourced Consumer Data 65% organizations have had a breach involving consumer data outsourced to a vendor 45% of the breaches were caused by negligence 40% of the breaches were due to lost or stolen devices 46% do not evaluate the security and privacy practices of vendors before sharing sensitive or confidential information Source: http://press.experian.com/united-states/press-release/experian-data-breach-resolution-and-ponemon-institute-survey-results.aspx 10

2013 Trustwave Global Security Report A whopping 63% of data breaches were linked to a third-party. Unfortunately, almost all businesses provide these trusted outsiders with some degree of unfettered access. Source: https://www2.trustwave.com/2013gsr.html 11

Benefits of IT Outsourcing Cost reduction Round-the-clock coverage Greater competency or specialized skills Accelerate time to market Take advantage of external expertise, assets and/or intellectual property Improvement of the organization's protection (managed security service providers) 12

IT Outsourcing Risks Reputation risk Service transition risk Strategic risk Data/Intellectual Property risk Service quality risk Business continuity risk Regulatory risk Security and Privacy Financial risk 13

IT Outsourcing Horror Stories! Fraud at Satyam, Indian Outsourcing Company - NYTimes.com www.nytimes.com/2009/01/08/business/worldb usiness/08satyam.html Jan 7, 2009 - A top Indian outsourcing company massively inflated its earnings for years. 14

Controls to be Considered for IT Outsourcing Contract terms and conditions Control environment Governance and monitoring Billing and time tracking Security considerations Data protection risks Security: network, physical, environment, personal, logical access and wireless access control 15

Controls to be Considered for IT Outsourcing Software/systems development controls Asset Management - Hardware - Software Change management controls HR policies and procedures Business continuity and disaster recovery 16

Key points to consider for contracts Right to audit clause Third party assurance of controls SOC 1/2/3, ISO 27001, etc. Billing provisions Financial performance monitoring (needs to negotiated in the contract for private service providers) Quality assurance Regulatory compliance Asset ownership Software licensing Dispute resolution and termination Security and nondisclosure 17

Key points to consider for contracts (continued) Employee allocation Confidentiality/Intellectual Property Additional services Delineation of responsibilities Term of contract Recourse and remediation of unsatisfactory performance Data breach liability Service level agreements and reporting procedures Assignment and sub-contracting Insurance Disaster recovery and business continuity 18

Risk Based Approach to Auditing Outsourced IT Operations Perform an engagement level risk assessment Interview key stakeholders within the company and the service provider Determine the key objectives, risks and controls Check to see if the service provider has any third party assessments or reports available SOC 1 or SSAE 16 (formerly known as SAS 70) SOC 2 or SOC 3 ISO 2700X ISAE 3402, etc. HIPAA, PCI, etc. 19

Risk Based Approach to Auditing Outsourced IT Operations Adjust the scope of the audit based on controls you could rely on in the above reports. Develop the risk and controls matrix Develop the audit program Consider leveraging subject matter experts, in case your department may not have expertise in certain areas, such as local laws and regulations. 20

Risk Based Approach to Auditing Outsourced IT Operations Fieldwork Onsite/offshore Travel & other logistics Onsite presentation after the conclusion of fieldwork Offsite/onshore Offsite closing meeting Reporting Follow-up 21

Case Study: Safeway Inc. (SWY) Quick Facts One of the largest food and drug retailers in North America operating under the Safeway, Vons, Dominick s, Carrs, Pavilions, Randall s, and Tom Thumb banners. Over 1400 stores in Western, Southwestern, Rocky Mountain, Midwestern, and Mid-Atlantic Regions of the U.S. Over 1100 in-store pharmacies. In June 2013, Safeway announced the sale of its Canadian operations for C$5.8 billion. Owns GroceryWorks.com, an Internet grocer doing business under the names Safeway.com and Vons.com Safeway also owns 73% of Blackhawk Network Holdings Inc. (NASDAQ: HAWK), which completed its IPO in April 2013. Provides third-party gift cards, prepaid cards, telecom cards, and sports and entertainment cards to retailers in North America, Europe, Asia, and Australia. Holds 49% interest in Casa Ley, S.A. de C.V., which operates 195 food and general merchandise stores in Western Mexico. Headquartered in Pleasanton, CA in the San Francisco Bay Area. 171,000 employees. US$44.2B in 2012 revenue (Fortune #62). 22

Case Study: 3 rd Party Service Provider A key strategic offshore/onshore partner of Safeway Inc. Service Provider has global operations. Development centers are in Asia Services provided to Safeway: Application development, IT infrastructure, and innovation 23

Case Study Performed engagement level risk assessment Interviewed key stakeholders at Safeway Interviewed key 3 rd party personnel Determined the key objectives, risks and controls Checked to see if the service provider had any third party assessments or reports available Adjusted the scope of the audit based on controls you could rely on in the above reports. Developed the Risk and Controls Matrix Developed the audit program 24

Key Objectives Contract compliance Delivery model review (personnel, training, succession planning, etc.) Quality of work Relationship management Time tracking and billing Adherence to Safeway standards and best practices: software development, change management, information security and privacy, user access (adding, deleting, changing), physical security, desktop security, wireless access control, etc. Asset management (hardware and software) Business continuity and disaster recovery Compliance with local laws Benchmarking Safeway s relationship with the vendor and other companies relationship with IT service providers in that country 25

Audit Team Team included IT Audit Director IT Audit Lead/Manager Staff from a Big 4 office in Asia Provided expertise in the area of local laws and regulations and emerging trends One of the resource was a contributor to the previous version of the IIA GTAG assisted in benchmarking for this review We were onsite in Asia for a couple weeks with the Big 4 staff from an office in Asia. 26

Fieldwork Provided a presentation after the conclusion of onsite/offshore fieldwork Included potential observations and next steps Performed offsite/onshore fieldwork Review of controls at Safeway with regards to the relationship with this service provider Vetting of observations Obtained Management Action Plans/responses to the observations Closing Meeting 27

Reporting & Follow-up Draft Report distributed to stakeholders at SWY Final Report distributed to stakeholders at SWY Next step: Follow-up on observations 28

Common Observations Areas: Audit of Outsourced IT Operations Contract (MSA and SOWs) terms and conditions are not adequate Billing and time tracking procedures Data security and physical security controls Governance and monitoring processes Software licensing Business continuity and disaster recovery plan Compliance with local laws and regulations 29

Resources HfS Research http://www.hfsresearch.com/ IIA GTAG 7: Information Technology Outsourcing, 2nd Edition ISACA: Outsourced IT Environments Audit/Assurance Program https://na.theiia.org/standards-guidance/recommendedguidance/practice-guides/pages/gtag7.aspx http://www.isaca.org/knowledge- Center/Research/ResearchDeliverables/Pages/Outsourced-IT- Environments-Audit-Assurance-Program.aspx 30

Resources SANS: Outsourced Information Technology Environment Audit http://itaudit.sans.org/community/papers/outsourcedinformation-technology-environment-audit_2514 Auditing Outsourced Functions by Mark Salamasick (IIA Research Foundation) http://www.theiia.org/bookstore/product/auditingoutsourced-functions-risk-management-in-anoutsourced-world-1632.cfm 31

Questions? 32

Contact Information Adnan Dakhwe, MS, CISA, CRISC, CRMA adnan.dakhwe@safeway.com adnandakhwe@gmail.com https://www.linkedin.com/in/adnandakhwe 33

Thank you! 34