Cloud Computing: Risks and Auditing



Similar documents
Cloud Computing. Bringing the Cloud into Focus

Managing Cloud Computing Risk

Security Issues in Cloud Computing

Orchestrating the New Paradigm Cloud Assurance

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Enterprise Architecture Review Checklist

Clinical Trials in the Cloud: A New Paradigm?

Cloud Security Introduction and Overview

SATURDAY, FEBRUARY 28, 2015 CLE 10 (Ethics) 9:30 a.m. 10:30 a.m. Moving to the Cloud - Identifying & Managing Legal, Ethical and Compliance Risks

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

The Keys to the Cloud: The Essentials of Cloud Contracting

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Cloud Computing Policy 1.0 INTRODUCTION 2.0 PURPOSE. Effective Date: July 28, 2015

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Security Issues in Cloud Computing

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

Enterprise Governance and Planning

Assessing Risks in the Cloud

Adopting Cloud Computing with a RISK Mitigation Strategy

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

Security Controls What Works. Southside Virginia Community College: Security Awareness

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Auditing Cloud Computing and Outsourced Operations

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Understanding Financial Cloud Services

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

EXIN Cloud Computing Foundation

Top Ten Technology Risks Facing Colleges and Universities

Cloud Computing; What is it, How long has it been here, and Where is it going?

Addressing Cloud Computing Security Considerations

What Cloud computing means in real life

D. L. Corbet & Assoc., LLC

AskAvanade: Answering the Burning Questions around Cloud Computing

Cloud Computing: Background, Risks and Audit Recommendations

Cloud Security and Managing Use Risks

05.0 Application Development

LEGAL ISSUES IN CLOUD COMPUTING

How To Protect Your Cloud Computing Resources From Attack

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE

Security & Trust in the Cloud

Vormetric Data Security Securing and Controlling Data in the Cloud

The Cloud Computing Revolution: Beyond the Hype

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

Cloud Services Overview

Cloud Computing. What is Cloud Computing?

Information Technology: This Year s Hot Issue - Cloud Computing

Cloud models and compliance requirements which is right for you?

Virtualization Impact on Compliance and Audit

On Premise Vs Cloud: Selection Approach & Implementation Strategies

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

PCI Compliance for Cloud Applications

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Governance and Control in the Cloud. Infrastructure as a Service

Kent State University s Cloud Strategy

10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH Agenda. Security Cases What is Cloud? Road Map Security Concerns

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Top 10 Cloud Risks That Will Keep You Awake at Night

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Cloud Computing An Auditor s Perspective

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Seeing Though the Clouds

Bringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner

CHIS, Inc. Privacy General Guidelines

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

THE BLUENOSE SECURITY FRAMEWORK

Supplier Information Security Addendum for GE Restricted Data

A Survey on Cloud Security Issues and Techniques

Cloud Computing: Legal Risks and Best Practices

NAREIM Session: Dangers and challenges of The Cloud. President, NiceNets Consulting, LLC

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

journey to a hybrid cloud

SaaS Security for the Confirmit CustomerSat Software

How To Achieve Pca Compliance With Redhat Enterprise Linux

Security from a customer s perspective. Halogen s approach to security

Cloud Computing in a Regulated Environment

Cloud Security Alliance New Zealand Contribution to the Privacy Commissioner. 23 February 2012

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Transcription:

IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG

#IIACHI Cloud Computing Overview April 15, 2013 IIA Chicago Chapter 53 rd Annual Seminar 2

Cloud Computing Definition Cloud Computing A model for enabling convenient, on-dem network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisioned released with minimal management effort or service provider interaction.* Cloud Computing is not: Any specific technology, such as VMware or SalesForce Virtualization Outsourcing Grid computing Web hosting Cloud Computing is: An IT delivery approach that binds together technology infrastructure, applications, internet connectivity as a defined, managed service that can be sourced in a flexible way Cloud computing models typically leverage scalable dynamic resources through one or more service deployment models The goal of cloud computing is to provide easy access to, elasticity of, IT services. Characteristics of cloud computing include On-dem self-service Broad network access Resource pooling Rapid elasticity Metered service KPMG s cloud computing definitions align with NIST working definitions * 3

Cloud Models Inside the Enterprise Private (Internal) Cloud Deployment Model Hybrid Cloud Public Cloud Service Model SaaS (Software-as-a-Service) PaaS (Platform-as-a-Service) Software, Application Layer Stard Application Platform IaaS (Infrastructure-as-a-Service) Private (External) Cloud Business Rules, Logic, Middleware Servers & Storage Networking Infrastructure External, but owned by the enterprise Private Cloud A private cloud is a closed network of computing resources dedicated to one organization, single-tenant. A private cloud can be internal or external. Private internal cloud is where computing resources are owned maintained by the organization s own IT. Private external cloud is where computing resources are owned maintained by the service providers for a fee to the using organization. Public Cloud The cloud infrastructure is made available to the general public or a large industry group, multi-tenant, is owned by an organization selling cloud services. Software as a Service (SaaS) The capability provided to the consumer is to use the provider s applications ( services) running on a cloud infrastructure. Platform as a Service (PaaS) The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages tools supported by the provider. Infrastructure as a Service (IaaS) The capability provided to the consumer is to provision processing, storage, networks, other fundamental computing resources where the consumer is able to deploy run arbitrary software, which can include operating systems applications. 4

Impact of Cloud Computing on IT Operating Model The Business Service Ownership: Single Point of Contact with the CSPs & IT Dem Capture Services Stards Service Level Monitoring Service Owner IT Risk Manager IT Risk Mgmt: Risk identification analysis across different CSPs Risk library Vendor/CSP Audits Compliance Monitoring IT Service Integration Roles Vendor Manager IT Finance Manager Vendor Mgmt: Vendor certification Contract Negotiations Internal IT Organization (non-cloud retained IT Services) IT Finance Mgmt: Business case Service Costing Chargeback SLA penalty-bonus calculation 5

#IIACHI Cloud Computing Risks Audit Considerations April 15, 2013 IIA Chicago Chapter 53 rd Annual Seminar 6

Dimensions of Risk Operating in a Cloud Environment Presents Risks in Several Dimensions Identify Access User access provisioning Deprovisioning Super user access Financial Vendor Data Data segregation isolation Information security data privacy requirements Malicious insider Financial Vendor Under-estimated start-up costs Exit costs or penalties over-head Run-away variable costs Identify Access Technology Dimensions of Risks Operational Complexity to ensure compliance Lack of industry stards certifications for cloud providers Records management/records retention Lack of visibility into service provider operations ability to monitor for compliance Data Operational Service reliability uptime Disaster recovery SLA customization enforcement Control over quality Technology Evolving technology Cross-vendor compatibility integration Customization limitations Technology choice proprietary lock-in 7

Auditing Cloud Computing in Five Relevant Areas Why auditing Cloud Computing on a periodic basis? To mitigate risks introduced by the Cloud To evaluate efficiency of controls related to the Cloud To continuously improve internal process, procedures tools. Data Protection Assess following security methods mechanisms: Physical Security Logical Security Connection & Data Transmission Authentication & Authorization Intrusion Detection & Protection Technology Risks Assess for the following: Server Virtualization patch management Super users Segregation of duties Identity Access Operations Assess efficiency /or accuracy of: Approval Layers & Controls Granted access Removal of access rights Process for periodic review of access Assess compliance with the following: Sarbanes Oxley compliance Privacy laws State Breach notification laws requirements of other countries Assess policies procedures related to: Incident Problem Change Availability 8

Dimensions of Risk Identity Access Financial Vendor Identify Dimensions of Data Risks Access Operational Technology Risk Dimension Identity Access: It is the risk associated with unauthorized or inappropriate individuals having access to cloud computing resources. Deployment Model Private Public Similar to traditional computing such as In addition to Private cloud computing the following: risks, the following: Unauthorized access by current For web-based applications, former employees that no longer needs access employees might continue to retain Excessive number of individuals have access particularly if the identity access to applications that is not in access management (IAM) for cloud, if accordance with need-to-know basis of there is one utilized for cloud access rights management applications, is not linked with the user s Use of shared accounts to administer the on-premise IAM solution cloud applications resources Potential mitigation considerations Develop integrated identity access management solution for applications hosted on private or public clouds that connect with existing/on-premise solution Periodic access reviews should include applications in the cloud 9

Auditing Cloud Computing in Five Relevant Areas Identity Access Data Protection Technology Risks Operations Audit Objective(s) Identity Access : Verify that only approved personnel are granted access to service based on their roles that access is removed in a timely manner upon the personnel's termination of employment /or change in their roles that does not require the said access. Key Areas to Focus on during Audit Physical Security Hosting & Data Logical Security Segregation of tiers; hosting encryption methods Accessibility from the open Internet, over permissive rules that open wide range of ports Authentication & Authorization Length / strength of passwords, systems to enforce / control password security / reset rules Use of hardware / software token. of key fobs Only authorized users are granted access rights after proper approval Access for transferred employees is modified in a timely manner Unauthorized access to cloud computing resources is removed promptly Periodic review of super-user regular access to cloud applications Connection & Data Transmission Secure connectivity such as VPN IPSec, SSL, HTTPS where secure data is being transmitted for regular users or administrators 10

Dimensions of Risk Data Financial Vendor Identify Dimensions of Data Risks Access Operational Technology Risk Dimension Data: It is the risk associated with loss, leakage or unavailability of data. This can cause interruption to business, loss of revenue, loss of reputation, or even regulatory noncompliance in some cases. Private Similar to traditional computing such as the following: Data leakage from malicious insider Lack of flexibility for segregation of duties Deployment Model Public Unauthorized data access /or modification by the service provider Data co-mingling with other cloud tenants, particularly in case of SaaS Data leakage across shared infrastructure, particularly in case of IaaS Non-portability of data metadata after termination of contract with cloud service provider Potential mitigation considerations Classify data applications include any encryption, co-location, policy requirements as part of the classification scheme Access to data should be controlled in a manner consistent with your business security requirements. For sensitive application data, opt for dedicated capacity Consider options such as data at home, application in the cloud 11

Auditing Cloud Computing in Five Relevant Areas Identity Access Data Protection Technology Risks Operations Audit Objective(s) Data Protection: Sufficiency of the data protection policies, procedures practices at the Cloud Service providers as well as the user organization. Key Areas to Focus on during Audit Type sensitivity of Data sent to potentially stored in the cloud Data protection requirements (business confidential information etc.) Your (user) organization s policies procedures to protect data stored at third-parties Co-mingling of your data with others tenants of the cloud application Vendor s overall capability maturity to meet the requirements Underst the level of access (create/read/update/delete) that the vendor s personnel have to the data, particularly for confidential information. For e.g. Microsoft has access to email content for the following: a) Operating Troubleshooting the Services, b) Security, Spam Malware Prevention If the vendor is unable to provide the right level of data protection, has your (user) organization put mitigating controls in place, such as removing sensitive data elements before sending it to the cloud or encrypting sensitive data Underst the circumstances, if any, in which the vendor may disclose your data without your prior consent. Is that acceptable to your organization? After potential termination of contract, portability of data metadata (for e.g. format of the output/extract from the vendor) purging of data by the service provider 12

Dimensions of Risk Technology Financial Vendor Identify Dimensions of Data Risks Access Operational Technology Risk Dimension Technology: Technology risk is associated with constantly evolving technologies lack of stardization in how they integrate or interoperate. Technology risks could lead to costly re-architecture efforts for adoption or integration with new technology. Deployment Model Private Public Emerging/evolving technologies Limitations on customization of service present a lot of unknowns takes offerings time to mature. It will require re-tooling Compatibility with other cloud retraining of employees providers Lack of technology choice Potential mitigation considerations Define a technology roadmap that stardizes the technologies used within an organization supports decision on when to move to new technologies Maintain awareness continually research monitor developments by stards organizations, information security organizations (e.g. CSA), technology vendors Stardize on integration methods such as web services API (most cloud providers use /or support web services API) ensure that data can be imported/exported in stard formats such as XML, CSV, etc. 13

Auditing Cloud Computing in Five Relevant Areas Identity Access Data Protection Technology Risks Operations Audit Objective(s) Technology Risks: Unique risks related to the use of virtual operating system with cotenants. Key Areas to Focus on during Audit Is your primary service provider utilizing another sub-service provider? For e.g. there are several examples where a SaaS provider is utilizing an IaaS provider. Do you know whether your primary service provider is protecting you adequately from the risks inherent with utilizing an IaaS provider? Hypervisor technology utilized whether it is patched Process for monitoring patching for known vulnerabilities in hypervisor technology Segregation of duties (SoD) considerations both from a technology as well as business perspective, for e.g. from a technology SoD perspective does one person have access to the host guest operating systems as well as the guest database. From a business perspective, for financially significant applications, just because an application is in the cloud does not diminish the importance of segregating access within the application Logging of access to the applications data, where relevant Protection of access logs from inadvertent deletion or unauthorized access 14

Dimensions of Risk Operational Financial Vendor Identify Dimensions of Data Risks Access Operational Technology Risk Dimension Operational: Operational risk is associated with execution of business activities services that rely on IT systems. Deployment Model Private Public Failover availability concerns due Connection response times network to new unproven technology bwidth constraints, particularly if Lack of integration with existing internet connection is used to access cloud service management tools Notification by the service provider of processes planned outages status/resolution of unplanned outages Lack of Service Level Agreement (SLA) definition or enforcement with service provider Reduced control on application availability disaster recovery Potential lack of service reliability uptime due to prohibitive costs Potential mitigation considerations Prioritize applications data that require High Availability Clearly define service level requirements service level agreements with cloud service providers Establish availability performance thresholds with service providers request email alerts on threshold breaches Clearly define mutually accept responsibilities between cloud service providers client 15

Auditing Cloud Computing in Five Relevant Areas Identity Access Data Protection Technology Risks Operations Audit Objective(s) IT Support: Assess procedures related to incident management, problem management, change access management in context of use of Cloud services. Key Areas to Focus on during Audit Operational process documentation: policy, procedures, roles responsibilities Effectiveness of Service Level Agreement (SLA) monitoring Appropriate use of monitoring tools reports Communication protocol/who at your (user) organization is notified by the vendor during scheduled outage windows non-scheduled outages In case of SaaS, coordination of release schedule sign-off/approval for change management testing of new functionality within the application Does your organization (user) have a periodic backup of data at the cloud service provider, particularly in case of SaaS Assignment of responsibility at the user organization for periodic review of Availability performance reports provided by the service provider 16

Dimensions of Risk Financial Vendor Identify Dimensions of Data Risks Access Operational Technology Risk Dimension : risk is associated with noncompliance to various legal, government, regulatory requirements. Private Similar to traditional computing Deployment Model Public Lack of visibility into cloud operations ability to monitor for compliance with regulations such as State-level privacy breach notification laws HIPAA Lack of monitoring notification to user organization of breach in confidentiality of information in the cloud leading to regulatory sanctions Dependence on service provider to help ensure adequate internal controls Potential mitigation considerations Work closely with internal audit, risk, security organizations from the start of any cloud computing Ask cloud service providers for relevant certifications such as SOC reports, ISO 27001 certification, etc. Reserve the right to audit the cloud service providers Monitor developing regulations stards as they mature to proactive assess their impact of your cloud-based operations 17

Auditing Cloud Computing in Five Relevant Areas Identity Access Data Protection Technology Risks Operations Audit Objective(s) : Compliance with regulatory requirements over the protection of information Key Areas to Focus on during Audit requirements, such as Sarbanes Oxley Act (controls over initiation, authorization, processing recording of transactions) or privacy, such as Health Insurance Portability Accountability Act (HIPAA) or State Privacy Breach notification laws Intrusion Detection & Protection practices at the cloud service provider Does the vendor know whom to notify when a breach happens? For e.g. from Microsoft's Office365 website 1 : Our notice will typically be delivered by email to one or more of the administrator(s) the customer has listed in the online services portal. It is the customer s responsibility to ensure contact information remains up to date. Do you want important legal notices served to your system administrators? 1. http://www.microsoft.com/online/legal/v2/?docid=23 18

Sample Approach for Auditing Cloud Service Providers Prep Develop Audit Plan, Control Objectives Review Steps Interview IT business leaders to underst company s position / vision of Cloud Select relevant Cloud services / projects as audit samples Fieldwork Gather documentation evidence via DRLs in regards to Audit Objectives Interview Stakeholders Analysts Perform Tests of Design Operational Effectiveness against Audit Review Steps Findings Document gaps with Controls Objectives related risks Provide recommendations to address issues identified during audit 19

Common Observations When Auditing Cloud Computing Password settings for cloud resources (applications, virtual servers etc.) does not comply with user organization s password policies. Sometimes the cloud vendor resources do not support the user organization s policy requirements, but several times, the cloud administrators at the user organizations are not aware Port settings on Cloud server instances not appropriately configured (administrator added exceptions to administer cloud from their home computer mobile device) Lack of policy procedures for appropriate hling of security privacy incidents Terminated users found to be active on applications in the cloud (even though the individual s network access was terminated) there was no IP range restriction Employees transferred out of a certain department had access to Cloud resources even though they transferred to another department a few months ago Service provider s SOC report was not reviewed for impact to user organization Sensitive data (PII) in the cloud was found to be not encrypted. Sometimes the user organization is not aware that sensitive data resides in the cloud. Most commonly, with the use of cloud for test environments, sensitive data is not scrambled/de-identified before being sent to the cloud. It might even be your third-party development vendor doing that Use of shared accounts to administer the cloud 20

Good Practices in Cloud Computing Sensitive data (PII) is encrypted before sending to the cloud Making sure that multiple people receive notifications from the cloud service provider that list of individuals/email id is periodically reviewed updated. This is simple to implement very beneficial Several cloud service providers offer the option of IP range restriction. That could be a great tool in utilizing a cloud-based services but having the security comfort of in-house IT Use of secure connection when connecting to the cloud, anytime sensitive data is exchanged Access to cloud computing resources is integrated with the user organization s identity access management process instead of being hled one-off Use of multi-factor authentication (MFA) such as hardware/software tokens, mobile authentication (particularly if the mobile phone is a company resource) for administration of cloud resources. This could also protect in case the user organization s employees are subject to phishing attack Review proper independent review report/certification: sometimes a SOC report is not sufficient 21

What do you think? Share your thoughts about this presentation on Twitter using the hashtag #IIACHI Follow us on Twitter @IIAChicago Not on Twitter? Visit our Social Media booth in the Exhibit Hall to join the conversation today!