Auditing the Cloud Auditors Chief Audit Executives



Similar documents
Logging In: Auditing Cybersecurity in an Unsecure World

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Public Cloud Workshop Offerings

Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services

Fundamental Concepts and Models

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

Security Inspection Inc. Solutions to secure your network

Release 1. ICAICT814A Develop cloud computing strategies for a business

ICANWK616A Manage security, privacy and compliance of cloud service deployment

Cloud Computing. What is Cloud Computing?

Security Officer s Checklist in a Sourcing Deal

LEGAL ISSUES IN CLOUD COMPUTING

Isaac Willett April 5, 2011

Chapter 2. Migrating into a Cloud

Your Place or Mine? In-House e- Discovery Platform vs. Software as a Service

Private vs. Public Cloud Solutions

HP S POINT OF VIEW TO CLOUD

Data Privacy, Security, and Risk Management in the Cloud

2014 HIMSS Analytics Cloud Survey

Infrastructure as a Service (IaaS): Market and Forecast for Secure Multitenancy Platforms and Services

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

Cloud Security An Overview OWASP. The OWASP Foundation

Data Protection Act Guidance on the use of cloud computing

2011 Morrison & Foerster LLP All Rights Reserved mofo.com. Risk, Governance and Negotiation in the Cloud: Capture Benefits and Reduce Risks

Management of Cloud Computing Contracts and Environment

Cloud Computing for SCADA

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Cloud models and compliance requirements which is right for you?

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

Elevate your analytics with SAS in the cloud

Communication and Negotiation Skills for the 21st Century Auditor

Acquia Comments on EU Recommendations for Data Processing in the Cloud

Cloud, Community and Collaboration Airline benefits of using the Amadeus community cloud

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Commercial Software Licensing

Services Providers. Ivan Soto

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

It s All About Cloud Key Concepts, Players, Platforms And Technologies

Applying Business Architecture to the Cloud

Cloudy with Showers of Business Opportunities and a Good Chance of. Security. Transforming the government IT landscape through cloud technology

NCTA Cloud Architecture

CHAPTER 8 CLOUD COMPUTING

FOR THE FUTURE OF DATA CENTERS?

Part 1. A summary of our Journey and what we learned

security in the cloud White Paper Series

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Web Application Hosting Cloud Solution Architecture.

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

Cloud Computing Security Issues

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Johan Hallberg Research Manager / Industry Analyst IDC Nordic Services & Sourcing Digital Transformation Global CIO Agenda

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Higher National Unit specification: general information

OVERVIEW Cloud Deployment Services

Quattra s Cloud Vision & Framework Value

Security Issues in Cloud Computing

Securing The Cloud With Confidence. Opinion Piece

Cloud Computing Trends, Examples & What s Ahead

Refresher on cloud computing

Cloud Computing: Risks and Auditing

Cloud Computing Technology

Security management in the internet era

Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing

ITIL Asset and Configuration Management in the Cloud. January 2016

IT Audit in the Cloud

This document is a preview generated by EVS

Construction Activity: Audit Strategies

BECOME A SMARTER CLOUD CONSUMER

How to ensure control and security when moving to SaaS/cloud applications

Transcription:

Auditing the Cloud This course introduces the seemingly new and specific risks of the various types of cloud computing. Through reviewing recent cloud computing failures and breaches, together with a detailed discussion of traditional contract compliance issues and associated risk mitigation strategies, participants will come away with an ability to assess and prioritize risks associated with their organization s planned or existing implementation(s) of cloud computing. This course also emphasizes established tools and techniques to assess and prioritize these risks. Course exercises will provide attendees the opportunity to prepare an audit program specific to cloud computing for their organizations. Best practices for reporting, including use of visual models to communicate the location of data and responsibility for controls, will be featured. Auditors and Chief Audit Executives seeking to understand the key risks and opportunities related to cloud computing should plan to attend. IT Auditors and IT Managers are welcome to attend; however, this is a course on the contractual and management issues associated with cloud computing. This is not a technical IT Audit class. This is not a technical IT audit class.

Course Duration: 2 Days CPE Hours Available: 16 Knowledge Level: Intermediate Field of Study: Auditing Prerequisites: Supervisory or managerial experience is recommended. Business and auditing experience, including interviewing, negotiation, and reporting skills are recommended. Attendees should have a minimum of three to five years of experience, and have completed a variety of Operational and/or Financial Audits. Advance Preparation: None is required. However, attendees may benefit from building an inventory of cloud computing systems being used or proposed at their organization. Time permitting; examples from participants may be incorporated in addition to those in the materials. Delivery Format: On-site, elearning

Course Outline: Headline Review: Recent Failures and Breaches in Cloud Computing Discuss cloud computing risks at your organization, based on examples of failures or breaches at other organizations. Discuss recent headlines of cloud computing failures and breaches. Consider the operational, financial, legal, and compliance implications of these headlines for your firm. IT Risk Assessment Frameworks Explain IT risk assessment frameworks, focusing on confidentiality, integrity, and availability. Clarify the new risks of cloud computing, including security, availability, compliance, co-location (i.e., multi-tenancy), sustainability, and scalability. Compare these new risks against other known risks and controls, using existing IT and operational audit frameworks and techniques. Begin to develop a cloud-focused risk assessment at your firm that Business Benefits of Cloud Computing (Why the Cloud?) Compare and contrast cloud computing against more traditional IT systems and controls. State the business benefits of cloud computing, including efficiency, scalability, and flexibility. State the prevalence of cloud computing. Identify some of the cloud providers and distinguish between their service offerings. Defining the Buzzwords Establish a common vocabulary for cloud computing. Compare public, private, and hybrid cloud computing. Distinguish between SaaS, IaaS, PaaS, and DaaS forms of cloud computing. Contrast cloud computing and virtualization.

Develop a Risk-assessment Questionnaire for Your Enterprise Develop a risk-assessment questionnaire to prioritize organizationspecific risks associated with cloud computing. Prepare a cloud-focused risk assessment for your firm that Execute a cloud-focused risk assessment for your firm that Leverage and build on your team s existing approach to risk assessment. Risk Responses Recommend risk response options including risk avoidance, risk reduction, risk sharing, and risk acceptance given specific risks of cloud computing. Discuss classic risk mitigation techniques as they relate to cloud computing. Identify a scenario where each of these risk responses would be appropriate. Contract Compliance Fundamentals Explain contract compliance fundamentals, with a focus on the kinds of terms and conditions that can be used to protect each party. Discuss any company-specific or industry-specific requirements that should influence an agreement with your cloud computing vendor(s). Compare standard click-through agreements and compare/contrast with the T s and C s associated with other common service-level agreements.

User Controls Inform management regarding the importance of user controls in preparing for security breaches or outages related to the use of cloud computing services. Compare the responses and associated consequences for NetFlix, Reddit, Quora, and Foursquare during the Amazon EC2 cloud outage of April 2011. Recommend user controls that would avoid, reduce, share, or even accept the risks associated with cloud computing security breaches and outages. Recent Litigation Cases Apply data points from recent cases and litigation against organization-specific risks related to cloud computing. Discuss recent IT litigation cases and related news events affecting cloud computing providers and their customers. Debate who should approve risk acceptance for cloud computing agreements at your organization. Developing Your Audit Program Develop a Company-specific audit program to assess and mitigate your organization s risks of cloud computing. Develop a company-specific audit program based on topic areas discussed in class. o The first portion of the audit program will focus on activities to be performed prior to using any new cloud computing vendors coming into use. o The second portion of the audit program will focus on audit activities to be performed for existing cloud computing vendors.