CLOUD SERVICE PROVIDER MANAGEMENT PROGRAM EVALUATION AND AUDIT



Similar documents
APPLICATION XTENDER PROGRAM EVALUATION AND AUDIT

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

CONTRACT MANAGEMENT PROCESSES ACROSS THE COUNCIL PROGRAM EVALUATION AND AUDIT

CONTINUITY OF OPERATIONS AUDIT PROGRAM EVALUATION AND AUDIT

Risk Management of Outsourced Technology Services. November 28, 2000

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

Management of Cloud Computing Contracts and Environment

Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services

Software Licenses Managing the Asset and Related Risks

Request for Proposals

OFFICE OF INSPECTOR GENERAL

Information Commissioner's Office

STATE OF NORTH CAROLINA

REPORT 2014/078 INTERNAL AUDIT DIVISION

GUIDANCE FOR MANAGING THIRD-PARTY RISK

December 2014 Report No An Audit Report on The Telecommunications Managed Services Contract at the Health and Human Services Commission

UTH~ihltli. December 11, Report on Institutional Use of Cloud Computing #14-204

FedRAMP Standard Contract Language

State of Oregon. State of Oregon 1

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Cloud Computing: Legal Risks and Best Practices

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

INFORMATION SECURITY Humboldt State University

How To Find A Vendor For Parcc, Inc.

CFPB Readiness Series: Compliant Vendor Management Overview

NEW SCHEME FOR THE INFORMATION SECURITY MANAGEMENT WITH ISO 27001:2013

Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division

Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5

AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities

Overview. FedRAMP CONOPS

Microsoft s Compliance Framework for Online Services

Cloud Computing Contract Clauses

IT Audit in the Cloud

Assessing Your Information Technology Organization

December 2013 Report No

Infrastructure Technical Support Services. Request for Proposal

Implementing User Based PA Sales Tax on Cloud Computing/Remote Access Software

Statement of Guidance: Outsourcing All Regulated Entities

GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters

Prepared by David Willson, OCIO in consultation with Marc Buchalter, Procurement Please send comments to David Willson at

Audit of NRC s Network Security Operations Center

GUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY

Specific observations and recommendations that were discussed with campus management are presented in detail below.

March 2010 Report No

September 2010 Report No

Development, Acquisition, Implementation, and Maintenance of Application Systems

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Major IT Projects: Continue Expanding Oversight and Strengthen Accountability

Office of Inspector General Audit Report

T31: Before, During and After Outsourcing David Fong, BlackRock

TTC AUDIT COMMITTEE REPORT NO.

Introduction to the ITS Project Management Methodology

[SUBPART CLOUD COMPUTING (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.

Article 29 Working Party Issues Opinion on Cloud Computing

B Baker Tilly Beers & Cutler - A Guide to GSA Contractual Requirements

INFORMATION SECURITY California Maritime Academy

White Paper on Financial Institution Vendor Management

Information Security Controls for Website Development and Hosting

Food Service Management Companies Table of Contents

Vendor Management Compliance Top 10 Things Regulators Expect

July 2013 Report No

SRA International Managed Information Systems Internal Audit Report

Vendor Management Compliance Top 10 Things Regulators Expect

VENDOR MANAGEMENT. General Overview

SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers)

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL

GAO DEFENSE CONTRACT AUDITS. Actions Needed to Improve DCAA's Access to and Use of Defense Company Internal Audit Reports

Vendor Management Best Practices

LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL FINAL REPORT ON SELECTED INTERNAL CONTROLS RHODE ISLAND LEGAL SERVICES, INC.

Anatomy of an IT Outsourcing Deal. Bruce Laco Deloitte John Pickett IT World Canada Barry Sookman McCarthy Tetrault

Cloud Computing. Report No. OIG-AMR UNITED STATES GOVERNMENT National Labor Relations Board Office of Inspector General.

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

March 2007 Report No FDIC s Contract Planning and Management for Business Continuity AUDIT REPORT

(a) the kind of data and the harm that could result if any of those things should occur;

Office of the Chief Information Officer

Auditor General s Office. Governance and Management of City Computer Software Needs Improvement

CITY OF CHILLICOTHE REQUEST FOR PROPOSALS

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010

Due Diligence Request List: IP and IT

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Securing the Microsoft Cloud

Software as a Service: Guiding Principles

REPORT NO DECEMBER 2012 UNIVERSITY OF CENTRAL FLORIDA. Operational Audit

Managing Cloud Computing Risk

REPORT 2016/045 INTERNAL AUDIT DIVISION. Audit of contracts management in the African Union-United Nations Hybrid Operation in Darfur

Industry Services Quality Management System

Internal Audit Quality Assessment. Presented To: World Intellectual Property Organization

Initial Professional Development Technical Competence (Revised)

STATE OF NORTH CAROLINA

A Secure System Development Framework for SaaS Applications in Cloud Computing

LIMITED-SCOPE PERFORMANCE AUDIT REPORT

Legal Issues in the Cloud: A Case Study. Jason Epstein

Request for Proposal For: CQ5 Java Developer. ABA Information Systems April 11, Table of Contents

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Data Privacy, Security, and Risk Management in the Cloud

Third Party Risk Management 12 April 2012

Information Security Program

Transcription:

CLOUD SERVICE PROVIDER MANAGEMENT PROGRAM EVALUATION AND AUDIT November 2015

INTRODUCTION Background Cloud computing is defined by the National Institute of Standards and Technology as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services). Cloud computing comes in various forms, known as models. These service models include near outsourcing of resources (Infrastructure as a Service), supporting in-house applications on a cloud service provider s platform (Platform as a Service) and using third-party applications run on the cloud service provider s infrastructure (Software as a Service.) Furthermore, cloud service can be private to one organization, shared by multiple organizations with shared missions, or open to the public. Each combination of service model and deployment model has a unique risk profile. Use of cloud computing has expanded at the agency in recent years. Multiple business units have sought cloud-based solutions for operations while existing service providers have sought to move to a cloud-based service model. The benefits of using cloud services include flexible deployment of resources and potential cost savings. The risks include unclear responsibilities between service provider and client, security, data ownership, and the necessity of adequate controls. Purpose Determine adequacy of contracts and contractual compliance between the service provider and agency Determine if internal control deficiencies within the agency and it s interface with Cloud Service Providers exists, and recommend solutions to mitigate or strengthen controls where necessary Provide an assessment of the effectiveness of the cloud service providers internal controls and security Scope Cloud providers were identified in collaboration with Information Services (IS). From this pool, a judgmental sample of nine current or expired contracts (covering eight providers) was selected for further review based on discussions of risk with IS staff. Contracts in the sample were executed between August 2013 and July 2014, with two exceptions; one contract was executed in July 2009 and included in the sample because issues were identified with the vendor, while the other was executed in October 2007 and was renewed via the 2013 sole source procurement for hardware and software maintenance. Contracts total approximately $1.6 million, and include cloud-based services for Regional Administration (7), Environmental Services (1) and Community Development (1). Methodology Review of cloud service provider contracts Interviews with relevant staff from Information Services, Procurement, and Business Units Cloud service provider internal controls assurance questionnaire 1

Assurances This audit was conducted in accordance with the Institute of Internal Auditors International Standards for the Professional Practice of Internal Auditing and the U. S. Government Accountability Office s Government Auditing Standards. 2

OBSERVATIONS Cloud services were purchased without the involvement of key information services functions during the requirements phase of projects. Of the nine contracts reviewed, audit could confirm the involvement of information security during the requirements phase in one case, involving a provider administering an HR application. The involvement of information security in the purchase of the other cloud services in the sample could not be confirmed prior to the signing of the contract. The involvement of continuity of operations staff prior to purchase was confirmed only for the software used by their staff. The appropriate involvement of key Information Services (IS) functions, such as information security and continuity of operations staff, during the requirements phase of a project is necessary to implement the agency s information security policy. The information security policy states Information systems belonging to the Metropolitan Council must be managed and protected so that confidentiality is maintained (preventing information from unauthorized disclosure), integrity is ensured (preventing information and systems from accidental and malicious modification), and availability is guaranteed (ensuring the reliability and accessibility of data and resources to authorized individuals in a timely manner.) Several reasons were identified for cloud services being purchased without the involvement of information security and continuity of operations staff. First, Information Services is not always aware of when contracts for IT-related services are initiated. When hardware and software is needed, an Information Technology Request (ITR) form is filled out, which informs IS of the need prior to purchase, among other things. The cloud services in the sample either went out for bid through the procurement process or were renewed through a sole source procurement. In each of these cases an ITR was not needed. A contract initiation memo (CIM), required to initiate a procurement over a certain dollar amount, was used instead per procurement procedures. The CIM does not have a mechanism to notify IS of IT-related services like the ITR does. There is a gap in IS being aware of IT-related services that are initiated through the CIM. As a result of this gap, involvement of IS in the procurement is driven primarily by the diligence of agency project managers who may not be aware of who to involve in the process, and involvement may occur after the requirements phase of a project. Second, a project manager reports that they work with IS staff assigned to their department, who were not aware of the need to work with information security or continuity of operations. Third, one project manager reports using the same RFP with minor changes as the previous time it went out, and did not think it needed to change. These reasons point to the need to notify IS when IT-related contracts are initiated, to clarify the role of key IS functions during the requirements phase of projects, and to communicate the role of key IS business functions to project managers and IS staff across the agency. An additional effect of the inconsistent involvement of IS in these cases is that an inventory of cloud service providers and associated contracts could not easily be produced. A full inventory of systems containing agency data is necessary to monitor the effectiveness of information security controls. Information security policies and procedures can be improved to support the management of cloud service providers. The current information security policy was adopted on 03/25/2009, and six procedures flow from the policy. However, the procedures do not specify security standards or responsibilities in working with external parties who access the Council s information, nor do they address the assessment of risks posed by external parties. A checklist has been developed by information security to help guide the security requirements for cloud service providers. The checklist may be a basis for future security 3

procedures, standards or as part of a risk assessment, but it has not been formally required or adopted as such. Best practice guidance for the management of information security (ISO 27002) discusses the importance of risk assessment prior to working with external parties. It states, Where there is a business need for working with external parties that may require access to the organization s information and information processing facilities, or in obtaining or providing a product and service from or to an external party, a risk assessment should be carried out to determine security implications and control requirements. This guidance suggests a risk assessment should be required in policies, procedures or standards for external parties. Policies, procedures and standards for external parties and cloud service providers help ensure data security and continuity of operations risks are addressed consistently throughout the agency. These risks include compliance with data practices laws and maintaining access to critical data according to continuity of operations standards. One of nine contracts included recommended contract language for cloud service providers; three of nine contracts included Service Level Agreements, two of which met recommended criteria. A review of nine cloud services contracts was conducted for cloud-service clauses recommended by ISACA 1. One contract satisfied 13 of the 15 criteria for cloud service contracts. It was notably missing an audit clause, but this was somewhat mitigated by requiring full disclosure of cloud service provider security policies and third-party performance audits of the vendors internal controls two clauses that occurred in only one other contract. Seven of the remaining eight contracts included less than half of the recommended contract clauses. Three were considered non-standard agreements, which means they were provided by the cloud-service provider and did not follow one of the approved contract templates of the agency. These contracts showed variation in how many clauses were addressed. One included 9 of 15 of clauses, while another included only 2 and was missing an audit clause. Two of the nine contracts had Service Level Agreements (SLA) that met recommended criteria. SLAs define acceptable service levels to be provided to the agency by the specific service provider. Service level agreements should reflect business, security and continuity of operations requirements, be measurable, include consequences for not being met, and be incorporated into the cloud service contract. Difficulties with a specific vendor serve to illustrate these points. A vendor handling agency GPS data transferred part of its service to a third-party cloud service provider. When the contract term expired, information security reported difficulty getting agency data back from the third-party. The contract addressed the subcontracting risk by including language that the vendor cannot subcontract any part of the work without prior approval that subcontracting occurred highlights contract administration and monitoring issues. The fact that the vendor did not originally provide cloud-based services would have made it difficult to anticipate and address specific cloud-based security risks in the contract, but in this case, the data security risks were similar for both the vendor and the cloud-based subcontractor. For example, recommended contract language for agency ownership of data, collection of third-party audit 1 Formerly the Information Systems Audit and Control Association, ISACA is an independent, nonprofit, global association [which] engages in the development, adoption and use of globally accepted, industry-leading knowledge and practice for information systems. 4

reports, and explicit expectations for how data is managed at the end of end of the contract would have helped address the data security risks illustrated by this vendor and its cloud-based subcontractor. The issues with this vendor served to raise awareness of data security and external vendor risks to Council management, and action was being taken to improve contract language at the time of the audit. One of four cloud service providers could not provide evidence their internal security practices are followed. A sample of four cloud service providers were selected for review to give increased assurance that their internal security practices were adequate to protect agency data. A questionnaire was sent to each service provider asking them to provide third-party audits of their operations, information security certifications or attestations, internal security policies and other operational questions. One provider could produce a summary of internal security policies, but could not produce evidence of third-party audit reports or security certifications to demonstrate compliance with internal policies. (Appendix 1) A requirement to provide third-party audits was not in the contract, but an external audit was reportedly in progress. While the provider was cooperative in responding to the questionnaire, an audit clause was missing from this contract. Based on what was provided by the vendor, audit cannot confirm their adherence to their internal security practices without further auditing their operations. One cause of this finding is that no documentation of monitoring of the contract or service levels could be produced for the contracts reviewed by audit. Monitoring processes and responsibilities between business units and IS are not defined, nor is a process to track and follow up on issues that arise with a vendor. Additional causes relate to the findings above. Lack of involvement by information security and agency security policies contributed to a contract with this vendor that did not include recommended language. As a result, the agency is limited in their ability to produce evidence that the vendor handles agency data appropriately and to hold them accountable if they don t. 5

CONCLUSIONS The governance and management of cloud service providers is an emerging issue for the agency as business units increasingly seek to take advantage of cloud-based service opportunities and existing vendors move to cloud-based service models. Governance and management functions can be improved by being more defined and integrated across business units, from appropriate involvement of Information Services during the requirements phase of projects, to the development of contracts and contract monitoring processes. 6

RECOMMENDATIONS Program Evaluation and Audit recommendations are categorized according to the level of risk they pose for the Council. The categories are: Essential Steps must be taken to avoid the emergence of critical risks to the Council or to add great value to the Council and its programs. Essential recommendations are tracked through the Audit Database and status is reported twice annually to the Council s Audit Committee. Significant Adds value to programs or initiatives of the Council, but is not necessary to avoid major control risks or other critical risk exposures. Significant recommendations are also tracked with status reports to the Council s Audit Committee. Considerations Recommendation would be beneficial, but may be subject to being set aside in favor of higher priority activities for the Council, or may require collaboration with another program area or division. Considerations are not tracked or reported. Their implementation is solely at the hands of management. Verbal Recommendation An issue was found that bears mentioning, but is not sufficient to constitute a control risk or other repercussions to warrant inclusion in the written report. Verbal recommendations are documented in the file, but are not tracked or reported regularly. 1. (Essential) Information security policies, procedures and standards should be reviewed and updated to provide management direction and support for the purchase of IT-related external vendors. A risk assessment process prior to acquiring external IT services is recommended be included in policies or procedures. Management Response: Information Services (IS) agrees that information security policies and procedures should be reviewed for updates to the security standards required to protect Council data stored and used by cloud service providers. Guidance needs to be included to mitigate risks identified prior to acquisition of external IT services. Staff Responsible: Dave Hinrichs (CIO) and Eirik Felter (Technology Security Officer) Timetable: Time must be provided to research necessary changes, coordinate with internal stakeholders, and follow the Council s review and approval process. Anticipated completion by the end of third quarter 2016. 2. (Essential) The role of IS should be reviewed and defined during the requirements phase of IT-related projects and throughout the procurement process. Increased controls to better ensure appropriate IS awareness of IT-related contracts are recommended. Management Response: The Procurement Department has modified its Solicitation Planning Package intake worksheets to ensure that IS is consulted on procurements of hardware and 7

software systems. Cloud storage security language is one of the requirements that is evaluated. Staff Responsible: Micky Gutzmann and Dave Hinrichs Timetable: These intake worksheets have already been implemented. IS will consult with Procurement on any necessary changes as new needs arise. 3. (Essential) Use cloud service specific language in cloud provider contracts, including agreed upon security and continuity of operations requirements, and develop Service Level Agreements with cloud providers. Where feasible, consider amending existing contracts with high-risk cloud service providers to include cloud-specific contract language. Management Response: The Procurement Department, Office of Legal Counsel and IS- Security staff have developed contract language that will be included in agreements which involve the sharing or creation of Council data. We agree this language needs to include continuity of operations requirements and that service level agreements should be negotiated into agreements that involve private not public data and/or support of critical/high priority services. Staff Responsible: Micky Gutzmann and Dave Hinrichs Timetable: Implementation is planned for end of first quarter 2016. Identification of high risk cloud service provider contracts requiring amendment will be difficult and likely require the full year to implement. 4. (Significant) IS should define contract monitoring responsibilities and internal issue tracking processes for external IT services. Responsibilities should also be communicated to relevant staff. The following monitoring and tracking processes are recommended: Periodic collection and review of third-party security audits unless otherwise determined by a documented risk assessment. Logging issues in a centralized system. Process for monitoring the provider identified as not demonstrating adequate assurance of internal security practices. Management Response: Contract monitoring responsibilities for external IT services requires more attention than it has been given, especially with more focus on external cloud services. Providing more active contract management is time consuming and without dedicated staff focused on this function, it does not receive the attention it deserves due to the press of business in IS to keep systems running effectively and efficiently Council-wide. IS management will work with Executive management to determine how to effectively implement improved monitoring and tracking processes, and the type of staffing that is necessary to implement this recommendation. Staff Responsible: Dave Hinrichs, Pancho Henderson and Sue Hauge 8

Timetable: Since it will be necessary to inventory and identify that all cloud service IT service contracts have the necessary contractual language to ensure that security, continuity of operations and service level agreements are in written form, this recommendation will not be completed until the end of 2016. 5. (Significant) An inventory of all cloud service providers across the agency, with associated service level agreements and contracts should be created. Procurement, IS and business unit representatives should collaborate in developing the processes for creation and maintenance of the inventory. Management Response: We agree that an electronic inventory of the Council s cloud based services needs to be created, and Procurement and IS will collaborate with business partners on how to best develop, create and maintain this inventory. Staff Responsible: Pancho Henderson and Sue Hauge Timetable: End of third quarter 2016. 9

Appendix 1: Cloud Service Provider Questionnaire Results Criteria CSP 1 CSP 2 CSP 3 CSP 4 Audit rights in contract? N Y Y Y Received questionnaire? Y Y Y Y Received third-party audit N, will send Y Y, cover page Y reports? when complete Received CSP internal security policies? Y Y Y, PCI" Y Received certifications or attestations? Adequate evidence of CSP internal security processes? N Y, PCI Y, PCI N N Y Y Y Appendix 2: Relation of audit recommendations to Thrive MSP 2040 principles Recommendation Integration Collaboration Accountability 1 X 2 X 3 X 4 X 5 X 10

390 Robert Street North St Paul, MN 55101-1805 651.602.1000 TTY 651.291.0904 public.info@metc.state.mn.us metrocouncil.org