Cloud Computing: Compliance and Client Expectations

Similar documents
Cloud IT, Privacy, and Security. June 13, 2013

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Computing; What is it, How long has it been here, and Where is it going?

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Security Issues in Cloud Computing

Managing Cloud Computing Risk

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.


SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

Cloud Security Introduction and Overview

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Cloud models and compliance requirements which is right for you?

White Paper on CLOUD COMPUTING

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

AskAvanade: Answering the Burning Questions around Cloud Computing

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Cloud Computing Security Issues

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

IS PRIVATE CLOUD A UNICORN?

Cloud Computing An Auditor s Perspective

Orchestrating the New Paradigm Cloud Assurance

Security & Trust in the Cloud

Cloud Computing. Bringing the Cloud into Focus

Key Considerations of Regulatory Compliance in the Public Cloud

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

LEGAL ISSUES IN CLOUD COMPUTING

East African Information Conference th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

Cloud Security and Managing Use Risks

ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC

Cloud Services Overview

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

The Elephant in the Room: What s the Buzz Around Cloud Computing?

OVERVIEW Cloud Deployment Services

Kent State University s Cloud Strategy

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

6 Cloud computing overview

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing: Background, Risks and Audit Recommendations

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

Cloud Computing. What is Cloud Computing?

Anypoint Platform Cloud Security and Compliance. Whitepaper

Enterprise Architecture Review Checklist

Things You Need to Know About Cloud Backup

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

BUSINESS MANAGEMENT SUPPORT

Cloud Computing. Benefits and Risks. Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Enhancing Operational Capacities and Capabilities through Cloud Technologies

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

How To Run A Cloud Computer System

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Electronic Records Storage Options and Overview

How To Protect Your Cloud Computing Resources From Attack

Architecting the Cloud

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Assessing Risks in the Cloud

Leveraging the Private Cloud for Competitive Advantage

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

John Essner, CISO Office of Information Technology State of New Jersey

Flying into the Cloud: Do You Need a Navigator? Services. Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government

Auditing Cloud Computing and Outsourced Operations

Cloud Computing Paradigm Shift. Jan Šedivý

Cloud Computing: Legal Risks and Best Practices

How to ensure control and security when moving to SaaS/cloud applications

OIT Cloud Strategy 2011 Enabling Technology Solutions Efficiently, Effectively, and Elegantly

Information Security: Cloud Computing

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

SECURE CLOUD COMPUTING

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Cloud Essentials for Architects using OpenStack

How To Choose A Cloud Computing Solution

HOW SECURE IS YOUR PAYMENT CARD DATA?

The Keys to the Cloud: The Essentials of Cloud Contracting

The NIST Definition of Cloud Computing (Draft)

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

The silver lining: Getting value and mitigating risk in cloud computing

IBM Spectrum Protect in the Cloud

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

CLOUD COMPUTING. A Primer

Top 10 Cloud Risks That Will Keep You Awake at Night

SATURDAY, FEBRUARY 28, 2015 CLE 10 (Ethics) 9:30 a.m. 10:30 a.m. Moving to the Cloud - Identifying & Managing Legal, Ethical and Compliance Risks

Security Considerations for Public Mobile Cloud Computing

Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald

The HIPAA Security Rule: Cloudy Skies Ahead?

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Transcription:

Cloud Computing: Compliance and Client Expectations February 15, 2012 MOSS ADAMS LLP 1

TODAY S PRESENTERS Moderator Kevin Villanueva, CPA, CISA, CISM, CITP, CRISC Sr. Manager, Infrastructure and Security Leader Presenter Chris Kradjan, CPA, CITP, CRISC Partner, National IT Practice Leader SLIDE 2 MOSS ADAMS LLP 2

SPEAKER BIO Chris Kradjan, CPA, CITP, CRISC Chris Kradjan is the National Leader for IT Consulting and the SSAE 16 Practice of Moss Adams. With more than 16 years of experience, he serves a variety of complex technology-based service organizations. His practice areas include SSAE 16 auditing, internal controls reviews, Sarbanes-Oxley compliance services, PCI-DSS services, SysTrust/WebTrust audits, and independent technology assessments. Chris is responsible for quality assurance involving IT audits performed by Moss Adams. Chris has developed and continues to maintain oversight of the firm's SSAE 16 audit and technology review compliance practices. SLIDE 3 MOSS ADAMS LLP 3

AGENDA Define cloud computing terms Outline risks and benefits Talk about challenges of compliance in the cloud Consider issues from provider and consumer perspective Best practices for success Questions MOSS ADAMS LLP 4

CLOUD COMPUTING Cloud Computing Visual Diagram from Wikipedia on Cloud Computing MOSS ADAMS LLP 5

HAZE OF TERMINOLOGY Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Public, private, hybrid and community clouds Application Service Provider (ASP) Third-party hosting Co-locations Vendor managed solutions MOSS ADAMS LLP 6

CLOUD COMPUTING VISUAL MODEL Cloud Security Alliance from the Security Guidance for Critical Areas of Focus in Cloud Computing v2.1 pg.14 MOSS ADAMS LLP 7

CLOUD DEPLOYMENT MODELS Public Cloud (External) The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Private Cloud (Internal) Hybrid Cloud (Mixed) Community Cloud (Shared) The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or a third party, and may exist on-premises or off-premises. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability. Shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, or compliance considerations). It may be managed by the organizations or a third party and may exist on-premises or off-premises. Cloud Security Alliance from the Security Guidance for Critical Areas of Focus in Cloud Computing v2.1 pg.17 MOSS ADAMS LLP 8

ESSENTIAL CHARACTERISTICS Characteristic On-Demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service Definition The cloud provider should have the ability to automatically provision computing capabilities, such as server and network storage, as needed without requiring human interaction with each service s provider. According to NIST, the cloud network should be accessible anywhere, by almost any device (e.g., smart phone, laptop, mobile devices, PDA). The provider s computing resources are pooled to serve multiple customers using a multitenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence. The customer generally has no control or knowledge over the exact location of the provided resources. However, he/she may be able to specify location at a higher level of abstraction (e.g., country, region or data center). Examples of resources include storage, processing, memory, network bandwidth and virtual machines. Capabilities can be rapidly and elastically provisioned, in many cases automatically, to scale out quickly and rapidly released to scale in quickly. To the customer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. Cloud systems automatically control and optimize resource use by leveraging a metering capability (e.g., storage, processing, bandwidth and active user accounts). Resource usage can be monitored, controlled and reported, providing transparency for both the provider and customer of the utilized service. MOSS ADAMS LLP 9

KEY ATTRIBUTES Offsite Virtual On-Demand Pay-Per-Use Simple IT resources are accessed from an offsite data center that is not owned by you; thus yielding savings in cost of ownership, licenses etc. Software stacks of databases, web servers, operating systems, storage, and networking are assembled virtually and accessed via the web Use as needed, resources can be turned on or off quickly and as needed including storage capacity, databases, web servers and operating systems Pay for what you need, not for unneeded capacity Resources can be configured quickly and easily, e.g. leading cloud computing platforms have open API s Massive Scale Access to extremely large infrastructure that would be challenging to build as a single entity Storage Capacity Elasticity and Resizability Collaboration The use of cloud computing for storage capacity can be ideal, especially for spikes in usage. Because the use of the cloud entails low or no upfront capital costs and low ongoing operational costs, the ability to take advantage of pools of resources on demand in real-time can yield business advantage Ability to be highly flexible nearly instantaneously to changes in load. With cloud computing, an infrastructure supporting an application, business, or business process can be easily resized and right-sized, depending upon conditions Shared environment, IT resources can be consolidated, many users share a common network, allowing costs to be managed AICPA Webinar Cloud Computing Security and Governance - What Auditors Need to Know? MOSS ADAMS LLP 10

CLOUD DRIVERS On demand storage, CPU, and servers Hardware failure and upgrades eliminated Gain flexibility and speed in implementations Scalability Quickly provision capacity as needs change Sustainability Availability zones for disaster recovery Leverage IT technology evolution Professional infrastructure management MOSS ADAMS LLP 11

BENEFITS OF CLOUD COMPUTING Cost containment Immediacy Availability Scalability Efficiency Resiliency MOSS ADAMS LLP 12

ALLURE OF COST SAVINGS Economies of scale Reduced capital to build IT capability Manageable monthly costs MOSS ADAMS LLP 13

ANOTHER PERSPECTIVE MOSS ADAMS LLP 14

CLOUD LEADERS MOSS ADAMS LLP 15

MARKET DIRECTION U.S. powerhouses Multi-national footprint Massive leverage Centralized consumer data Powerful data analytics MOSS ADAMS LLP 16

CASE STUDY: AMAZON IAAS o Amazon Elastic Compute Cloud (EC2) o Amazon Elastic MapReduce o Amazon Virtual Private Cloud (Amazon VPC) o Amazon Route 53 PAAS o Amazon DynamoDB o Amazon Relational Database Service (RDS) SAAS o Does not provide SAAS solutions o Other SAAS providers can leverage IAAS and PAAS players like Amazon to move into the cloud MOSS ADAMS LLP 17

IAAS AND PAAS Align with the major players Determine service offerings Establish tiers of clients Define service levels by tier Link usage to revenue Institute metrics Implement tools to efficiently track usage Architect for security and privacy protections Institutionalize controls and compliance functions MOSS ADAMS LLP 18

SAAS Migrate existing solutions to the cloud Partner with IAAS and PAAS providers Find smartphone and internet applications Establish external facing connections Embed analytical capabilities Adopt similar service levels, metrics, revenue models and control measures as IAAS and PAAS MOSS ADAMS LLP 19

CONSUMERS Understand your IT portfolio and service needs Evaluate options in the market Determine which cloud deployment model(s) are a fit Define a cloud strategy At a minimum, look where private clouds are viable Require SLAs Assess the costs factors Build in rate increase limits Look at full lifecycle of data management Be mindful of transition and/or exit strategy if a provider ceases to operate MOSS ADAMS LLP 20

NEGATIVE PERCEPTIONS Loss of control Hidden costs renewal rates rise, obscure cost provisions, etc. Integration costs and vendor lock-in Service reliability (emerging vendors) Physical location of data storage (crossing state and national borders, with varying privacy laws) Unclear who owns rights to the data Inability to customize Infrastructure limitations Brand management MOSS ADAMS LLP 21

RISKS, THREATS & VULNERABILITIES Availability Access Authentication Regulatory Integrity Privacy Operational Security Service availability and recoverability, complexity, single-points-of-failure, data replication, testing constraints, and over-subscription risk Multi-tenancy, data access, and secure data deletion External authentication, federated authentication, key management, cloud to cloud authentication Audit rights and compliance Shared environments, data monitoring, and data encryption Legal uncertainties, individual rights/confidentiality, and breach/disclosures Vulnerability management, asset management, and incident response AICPA Webinar Cloud Computing Security and Governance - What Auditors Need to Know? MOSS ADAMS LLP 22

RISKS, THREATS, VULNERABILITIES (1/6) Security Category Availability Risks, Threats & Vulnerabilities Service Availability and Recoverability Cloud provider may not be able to match in-house IT service availability, recovery time objectives (RTO), and recovery point objectives (RPO) Cloud providers may drastically change business model or discontinue cloud services Complexity Complexity introduced by cloud computing environment results in more pieces that can go wrong, and more complex recovery procedures Single-Points-of-Failure Even if the cloud environment is architecturally designed for high-availability, single-points-offailure may exist in the access path to the cloud Data Replication Due to technical architecture complexity and potentially restrictions by the cloud provider, replicating data back to the enterprise or to another provider may be difficult Testing Constraints Due to concerns about confidentiality and impact to other customers, cloud providers may place heavy constraints on disaster recovery testing activities Over-Subscription Risk In the event of a disaster, other customers may receive higher priority in recovery activities As cloud providers shift from investment mode to capture market share to cost cutting mode to reach profitability, capacity may become constrained AICPA Webinar Cloud Computing Security and Governance - What Auditors Need to Know? MOSS ADAMS LLP 23

RISKS, THREATS, VULNERABILITIES (2/6) Security Category Access Risks, Threats & Vulnerabilities Multi-Tenancy Data is possibly exposed to 3rd parties due to lack of access controls on the cloud, allowing unauthenticated parties access to confidential data Data Access Cloud stores data without proper customer segregation allowing possible disclosure to 3rd parties Secure Data Deletion Company data that was deleted is still be retained on servers or storage located on the cloud without knowing AICPA Webinar Cloud Computing Security and Governance - What Auditors Need to Know? MOSS ADAMS LLP 24

RISKS, THREATS, VULNERABILITIES (3/6) Security Category Authentication Risks, Threats & Vulnerabilities External Authentication Ownership and maintenance of credential repositories is the responsibility of an external party. Security leading practices cannot be guaranteed Federated Authentication Organizations implement single sign on applications used by multiple business partners but the SSO also grants access to sensitive internal information due to authentication mashups Key Management Any activity related to key generation, exchange, storage, safeguarding, use, vetting, and replacement that results in disclosure will provide access to infrastructure and data Cloud to Cloud Authentication One cloud provider will rely on a second cloud provider to authenticate a user s identity based on the first cloud passing a SAML assertion to the second cloud at the request of a user. Based strictly on the assertion, the second cloud provider will grant the user access to cloud resources. SAML assertions are susceptible to the following attacks: DoS, Man-in-the-Middle, Replay, and Session Hijacking AICPA Webinar Cloud Computing Security and Governance - What Auditors Need to Know? MOSS ADAMS LLP 25

RISKS, THREATS, VULNERABILITIES (4/6) Security Category Regulatory Risks, Threats & Vulnerabilities Audit Rights Organizational Rights to perform audits, and review performance against contracts or SLA Compliance Migration to the cloud includes a more complex regulatory environment for some corporations Integrity Shared Environments Data in cloud is in a shared environment alongside data from other customers Data Monitoring Changes made to data without knowledge of the data owners, or accidental overwrites due to collisions with data storage techniques of cloud provider Data Encryption Data at rest is not encrypted and accessed by 3rd parties unknowingly due to faulty access controls AICPA Webinar Cloud Computing Security and Governance - What Auditors Need to Know? MOSS ADAMS LLP 26

RISKS, THREATS, VULNERABILITIES (5/6) Security Category Privacy Risks, Threats & Vulnerabilities Legal Uncertainties Multiple jurisdictions increase regulatory complexity Conflicting legal provisions create significant uncertainty in assessing compliance and risk The Privacy and Data Protection legal landscape continues to evolve at a rapid pace Data sharing agreements may be required before moving data to the cloud Business associate agreements (HIPAA) Data controllers and third parties (EU DPD) Individual Rights/Confidentiality Strict terms of service are particularly important in the cloud to preserve individual privacy/confidentiality and to meet regulatory requirements to which the user is subject The cloud facilitates the ability to use/share data across organizations and therefore increase secondary uses of data that may require additional consent/authorization Data is easily accessible by a larger group of users and must be strictly controlled (Protect data at rest) Breach/Disclosure Centralized data stores are especially prone to security breaches Timely discovery and reporting of the breach by the cloud provider may be challenging AICPA Webinar Cloud Computing Security and Governance - What Auditors Need to Know? MOSS ADAMS LLP 27

RISKS, THREATS, VULNERABILITIES (6/6) Security Category Operational Security Risks, Threats & Vulnerabilities Vulnerability Management One vulnerability has the potential to expose large number of corporations critical assets Asset Management Assets in the cloud are not properly managed and could leak critical company information or cause data exposures Incident Response Ownership, responsibilities, and actions during incident response are not defined AICPA Webinar Cloud Computing Security and Governance - What Auditors Need to Know? MOSS ADAMS LLP 28

TOP CONSIDERATIONS & RISKS Security Tops Cloud Concerns How concerned are you with following issues as they relate to cloud computing? Security Control Performance Support Vendor lock-in 3.3 Speed to activate new services/expand capacity 3.8 3.8 3.7 3.7 4.3 A recent survey was conducted of IT executives/cios about their companies use of, and views about, IT cloud services. The biggest cloud challenge reported was security. 3.3 Configurability 0 1 2 3 4 5 Data: InformationWeek Analytics Cloud computing Survey of 453 business technology professionals AICPA Webinar Cloud Computing Security and Governance - What Auditors Need to Know? MOSS ADAMS LLP 29

REGULATORS PERSPECTIVE Personally Identifiable Information o Federal requirements NIST 800-53 o State data breach and privacy laws o Healthcare and patient data: HIPAA Security Rule o FERPA compliance o Safe Harbor Internal Controls over Financial Reporting: o SOC/SSAE 16 audits (previously SAS 70 audits) o Sarbanes-Oxley ISO 27002 Payment Card Data: PCI-DSS o QSA audit of service provider Document retention, e-discovery, and public records o Retention policies and practices MOSS ADAMS LLP 30

MAKING THE BUSINESS CASE Have a clear and upfront understanding of: Decision drivers to enter the cloud Current state of your IT True costs Economies of scale Integration needs Risk NACUBO Whitepaper: Capturing the Cloud, Defining the Business Case (http://www.nacubo.org) MOSS ADAMS LLP 31

PROPER PREPARATION Embrace the cloud, but only where it makes sense Have an organization-wide solution Define requirements Perform proper due diligence Select good vendors with solid track records Review contracts carefully Have an exit strategy Own the implementation and the system use Monitor vendor performance and outcomes Enforce client controls Consider regulatory compliance MOSS ADAMS LLP 32

SUMMARY Cloud computing is an increasing trend Significant benefits will drive adoption, despite the concerns Avoid the hype and focus on where it has value for you Institute solutions with sufficient demand and market scale Focus on vendor selection, management, and due diligence Know and manage the risks Do not transfer all control responsibility MOSS ADAMS LLP 33

QUESTIONS Chris Kradjan, CPA, CITP, CRISC Partner, National IT Practice Leader (206) 302-6511 / (415) 677-8343 chris.kradjan@mossadams.com MOSS ADAMS LLP 34