Validating Cloud. June 2012 Merry Danley



Similar documents
Services Providers. Ivan Soto

Clinical Trials in the Cloud: A New Paradigm?

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

SYLOGENT DEDICATED HOSTING

Vendor Audit Questionnaire

Cloud Computing; What is it, How long has it been here, and Where is it going?

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

5 Essential Benefits of Hybrid Cloud Backup

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Commercial Software Licensing

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Cloud Services Overview

SaaS Security for the Confirmit CustomerSat Software

Hosted SharePoint: Questions every provider should answer

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Click to edit Master title style

Cloud Computing for SCADA

Client Security Risk Assessment Questionnaire

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Cloud Computing in a Regulated Environment

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

M6422A Implementing and Managing Windows Server 2008 Hyper-V

Cloud Computing Thunder and Lightning on Your Horizon?

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

CHOOSING A RACKSPACE HOSTING PLATFORM

Call: Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

What is the Cloud, and why should it matter?

Cloud Computing and Records Management

BMC s Security Strategy for ITSM in the SaaS Environment

Securing the Service Desk in the Cloud

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

Managing Cloud Computing Risk

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Computerized System Audits In A GCP Pharmaceutical Laboratory Environment

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Electronic Records Storage Options and Overview

Information Technology Services

StratusLIVE for Fundraisers Cloud Operations

What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT

Security & Trust in the Cloud

Vistara Lifecycle Management

NET ACCESS HIPAA COMPLIANT FLEXCloud

Introduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A

Regulated Applications in the Cloud

White Paper: Vendor Selection for Your Life Science Company Cloud

2014 HIMSS Analytics Cloud Survey

What Cloud computing means in real life

Managed Service Plans

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

IT Assessment Report. Prepared by: Date: BRI Works East Main Street, Suite 200 Charlottesville VA

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.

OECD DRAFT ADVISORY DOCUMENT 16 1 THE APPLICATION OF GLP PRINCIPLES TO COMPUTERISED SYSTEMS FOREWARD

Securing Oracle E-Business Suite in the Cloud

IBM Virtual Server Services. A smarter way to support and grow your business

Seeing Though the Clouds

John Essner, CISO Office of Information Technology State of New Jersey

Qualification Guideline

The Elephant in the Room: What s the Buzz Around Cloud Computing?

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Supplier Security Assessment Questionnaire

See all, manage all is the new mantra at the corporate workplace today.

CLOUD BASED SCADA. Removing Implementation and Deployment Barriers. Liam Kearns Open Systems International, Inc.

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

MS-6422A - Implement and Manage Microsoft Windows Server Hyper-V

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Validating Enterprise Systems: A Practical Guide

6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)

Third Party Security: Are your vendors compromising the security of your Agency?

This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan

CLOUD SERVICES FOR EMS

Security Issues in Cloud Computing

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Virtual Data Centre Public Cloud Simplicity Private Cloud Security

THE BLUENOSE SECURITY FRAMEWORK

Kent State University s Cloud Strategy

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Information Technology: This Year s Hot Issue - Cloud Computing

Transcription:

Validating Cloud June 2012 Merry Danley

Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

Introduction My background includes implementation and support of various laboratory, clinical, statistical and environmental applications including: Cloud Applications (SaaS) COTS Cloud Infrastructure In-House COTS In-House Customized In-House Developed Integrated Websites Internal Non-Cloud Infrastructure In-House COTS In-House Customized In-House Developed

Celerion Celerion is a CRO that provides clinical research solutions with the following services: Clinical Conduct Over 730 Beds in clinics in US and Northern Ireland Bioanalytical Services in US and Zurich, Switzerland Clinical Pharmacology Sciences Drug Development/Regulatory Services

Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

Environments Infrastructure (VM Ware & Hardware) Platform Platform Platform Application Application Application Application Application

Components of Cloud Computing Management Console Storage Options Fiber, SATA, etc. Hypervisor SAN, DAS, or NAS Physical Machines Virtual Machines Database Servers for Production Application Machines

Environments

Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

Definitions Cloud computing is the distribution of computing infrastructure, applications, or services internally or externally Infrastructure routers, hardware, firewalls, security (physical and logical), disaster recovery, HVAC, fire suppression, environmental monitoring Applications hosting software, upgrades, installation qualification, operational qualification, logical security, backups, Services helpdesk, hardware/software monitoring, NIST Defines Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Definitions: Different type of Clouds Private cloud: Here, the cloud hardware is provided solely for a single organization. The private cloud can be owned, managed, and operated by either the organization or a thirdparty provider and can be located on-site or off-site. Public cloud: Access to the cloud infrastructure is for any customer willing to pay the fees. Because of the open access, this delivery model requires careful consideration due to security requirements. Hybrid cloud: combination of different hardware/software options

Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

Manage Risk by Designation of Systems Computerized System A combination of computer hardware, firmware, operating system(s) and utilities, application software, databases, networking component(s) and interface(s), equipment, instrument or instrumentation supported by operating procedures, methods and work or business processes used by trained personnel. This includes Commercial Off-the- Shelf System (COTS) systems and software bought from an external vendor, developed internally, or by a third party for specific purposes.

Manage Risk by Designation of Systems Tools A program or application used to create, debug, maintain, or otherwise support or automate other computerized programs and applications. Tools may also be applications used to support GxP activities (such as incident management).

Manage Risk by Designation of Systems Regulated Application A computerized system used to generate, produce and report data generated for or in support of GxP studies.

Manage Risk by Designation of Systems Storage or Archiving A storage area network (SAN) in various speeds with different special-purposes that interconnects different kinds of data storage devices with associated data platforms on behalf of a larger network of users. May be local to the hardware and computerized systems, but may also extend to remote locations for backup and/or archival storage

Manage Risk by Designation of Applications Systems on Cloud Regulated Applications Tools Storage/Archiving Chromatography Incident Management File Storage LIMS Email Archiving EDC Financial Environmental Monitoring Websites

Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

Why Go Cloud Cost Provides flexible pricing options Reduces IT headcount required support and monitor server(s) Provides flexible growth options Single Point of Touch (reduces workstations and servers at sites) Single Point of Software (upgrades, configuration, etc.) Only Web Access Required No re-installation required to change hardware

Why Go Cloud Storage Capacity Physical and Logical Security Power consumption and ventilation (HVAC) Availability Competence Location independent Shortened Installation Cycle Pay As You Go easy to forecast Hardware Upgrades easy Disaster Recovery/Business Continuity Options

Cloud Concerns Cost Flexibility Privacy/security (transparency, proprietary) Important to understand data ownership Record retention Bandwidth Maintaining Validated Status Patching Automating not proper change control Application configuration Employees and other Contractors Upgrade forcing Web Availability

Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

Success depends on Vendor Audits - Use Risk Based Approach Quality Program Hiring Process Security Policy Training How is access managed Disaster Recovery capabilities & testing Privileged Logical Access Security on VMs Security from Internet Threats Continuous Improvement Certifications (Sas-70-SSAE-16, SOC Reports, ISO Standards, or other security standards)

Success depends on Have they worked with other clients in the regulated industry what type? Approach for Account Managers, Team Managing Vendors Training Program SOPs for Outsourced Vendor Approach to Risk Management Reporting Understanding Access Security Audit (3 rd Party) Regular Status Meetings Understand your current level of business risk & theirs

Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

Validation of VMs Risk Based Approach High Risk Maintaining Change Control (VMs can proliferate) VM Images Asset Inventory Logical Access Performance (depending on app) Low Risk Hardware they reside on New Hardware they might reside on Hyperviser Performance

Qualification Risk Based Approach Installation Qualification Easy Any hardware that is put into the data center is qualified according to your existing process - as if it was put it one of your sites Configuration, Asset Management, Diagrams, Etc. Any software or configuration done should be in the IQ documentation (hyperviser installation) Baseline information included in regulated application diagram,documentation

Qualification Risk Based Approach Operational Qualification Can be a little more tricky again refer to your risk assessment for your VMs May Require vendor to complete some testing As long as HypverViser software remains the same does not need to be tested on multiple VMs Does it work as intended according to the specs

IQ/OQ Example

Qualified VM Environment now what? Perform Application IQ/OQ/UAT according to normal procedures relating to the application criticality, regulatory requirements, or other designation Baseline information included in regulated application diagram, documentation

Validation Risk Based Approach SOPs Procedures or Policy for Managing your Cloud Providers (may need specific ones depending on how many and what type of providers you have) Procedure or Robust Audit Program (Regulatory Training and Awareness, Security, Compliance to Procedures) Responsibility designed for data reliability, integrity, security Execute regular security assessments Designate Server Owners or Application Owners for clear responsibility

Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

Personal Experience the Good Great Support Models (24 x 7 x 365) Experience of Staff exceeds internal staff Robust Monitoring & Reporting (firewalls, internet infiltration, server performance, troubleshooting, alerting, preventative maintenance)

Personal Experience the Bad Team Changes Privacy Policies between Companies IQ/OQ Sometimes takes reminders It does take time to manage your vendor Maintaining up to date diagrams

Personal Experience the ugly Nothing as long as the right partners are selected

Contact Info & Questions Merry Danley 621 Rose Street Lincoln, NE 68502 merry.danley@celerion.com