Cloud Computing An Auditor s Perspective



Similar documents
Cloud Computing An Internal Audit Perspective. Heather Paquette, Partner Tom Humbert, Manager

Cloud Computing An Internal Audit Perspective Institute of Internal Auditors Topeka Chapter

Cloud Computing Risk Assessment

Orchestrating the New Paradigm Cloud Assurance

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Cloud Security and Managing Use Risks

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

A Flexible and Comprehensive Approach to a Cloud Compliance Program

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Cloud Computing; What is it, How long has it been here, and Where is it going?

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

SAS No. 70, Service Organizations

IT Audit in the Cloud

NCTA Cloud Architecture

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Webtrends Inc. Service Organization Controls (SOC) 3 SM Report on the SaaS Solutions Services System Relevant to Security

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Hans Bos Microsoft Nederland.

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

SECURE CLOUD COMPUTING

THE BLUENOSE SECURITY FRAMEWORK

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey

Cloud Services Overview

Cloud Computing Security Issues

SERVICE ORGANIZATION CONTROL REPORTS SM. Formerly SAS 70 Reports

Auditing Cloud Computing and Outsourced Operations

SECURITY AND EXTERNAL SERVICE PROVIDERS

Cloud Computing: Risks and Auditing

SOC Readiness Assessments. SOC Report - Type 1. SOC Report - Type 2. Building Trust and Confidence in Third-Party Relationships

Cloud Computing: Background, Risks and Audit Recommendations

SSAE 16 Everything You Wanted To Know But Are Afraid To Ask. Kurt Hagerman CISA, CISSP, QSA Managing Director, Coalfire December 8, 2011

White Paper on CLOUD COMPUTING

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

Incident Handling in the Cloud and Audit s Role

Cloud Infrastructure Security

How to ensure control and security when moving to SaaS/cloud applications

Cloud models and compliance requirements which is right for you?

WALKME WHITEPAPER. WalkMe Architecture

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Securing The Cloud With Confidence. Opinion Piece

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Legal Issues in the Cloud: A Case Study. Jason Epstein

Cloud Computing Risks and Considerations for a Successful Implementation. Andrew Ellsweig, Director Nicholas Zaky, Manager


Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Information Security: Cloud Computing

Pharma CloudAdoption. and Qualification Trends

Cloud Computing Technology

Cloud Security Certification

Goodbye, SAS 70! Hello, SSAE 16!

Securing the Microsoft Cloud

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

Cloud computing: benefits, risks and recommendations for information security

Securing Oracle E-Business Suite in the Cloud

Microsoft s Compliance Framework for Online Services

Ayla Networks, Inc. SOC 3 SysTrust 2015

Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Third Party Security: Are your vendors compromising the security of your Agency?

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

Cloud Courses Description

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

Implementing & Developing Cloud Computing on Web Application

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

How To Choose A Cloud Computing Solution

Is a Cloud ERP Solution Right for You?

Cloud Computing in a Regulated Environment

Cloud Computing Trends, Examples & What s Ahead

RSS Cloud Solution COMMON QUESTIONS

Effectively Assessing IT General Controls

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Secure Cloud Computing through IT Auditing

Transcription:

Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP sgadia@kpmg.com December 9, 2010

Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges, and risks Questions for auditors Emerging good practices User auditor assurance SOC1 /SAS 70 and SOC2 compared Auditing the cloud arrangement A case study References Cloud Computing An Auditor s Perspective 1

Tremendous Buzz Around Cloud Computing Spending on IT cloud services to grow almost threefold over the next five years Top barrier to cloud technology according to IT executives: Evaluating and managing security or business continuity risks Gartner EXP Worldwide Survey of 1600 CIOs McKinsey & Co. (November 2010) By 2012, 20 percent of businesses will own no IT 60% of virtualized assets servers will be less secure than the physical servers they replace through h 2012 Gartner Press Release March 2010 Gartner s top predictions for 2010 and beyond Cloud Computing An Auditor s Perspective 2

What is Cloud Computing? http://www.youtube.com/watch?v=bri4vpo4dyy&feature=player_embedded 3

Cloud Service Model Software as a Service (SaaS) Complete applications sold via subscription: CRM, ERP, E-Mail, Calendar, Internet File Stores, Spam Filters E.g. GoogleApps, Microsoft Online Services Platform as a Service (PaaS) Application building blocks: Workflow, APIs, Proprietary Development Languages, Document Management, Data Services, E.g. Google App Engine, Microsoft Azure Infrastructure as a Service (IaaS) Core Infrastructure Services: Operating Systems, Data Storage, Web Servers, Edge Caching Services E.g. Rackspace, GoGrid, Amazon EC2 4

Cloud Deployment Models Public Sold to the public Owned by organization selling cloud services Private Operated solely l for an organization May be managed by the organization or by a third party Community Shared infrastructure for specific community concerns and benefits 5

Why Cloud Computing? The Benefits Pay-as-you-go model Scalable solution that supports rapid business growth Cost transparency to the end-user/business Lower time to market for IT solutions Outsourcing of competencies that are not core to the business No separate cost of tracking and installing Operating System patches Not limited to basic hosting of websites 6

Cloud Computing Challenges Vendor failures notably starts-ups Loss of physical control Security models and standards are still emerging Who is responsible for what when a security breach happens Isolation/security between virtual machines Guest to host communication happens over the Internet Vulnerability of browsers Data privacy implications (e.g., data could be in another country) Availability concerns Implications for e-discovery Customer support practices are evolving 7

Inherent Risks in the Cloud Stack SaaS Data resides with the cloud provider PaaS Co-tenant can impact security IaaS Lots of configuration points 8

Questions for Auditors to Ask How much security is enough? Criticality of the application being sent to the cloud Outsourcer s experience with SLA and vendor management Country/regional regulations (for e.g., SOX and Europe s data privacy laws), and Industry Regulations (for e.g., GLBA and HIPAA) Does your present security model need to be altered? Cloud vendor s policy on vulnerability management reporting (beyond basic Contact Us links), commitment to following up, promptly responding to reports etc. Is there an independent auditor s report? 9

Some Emerging Good Practices Conduct a proper risk assessment before jumping into the cloud Store only non-private data in the cloud Data-at-rest encryption Document who is responsible for what Highly customized and transaction heavy applications are retained inhouse Secure network connections for cloud administration Use more than one cloud provider or use provider with multilocation/country presence (depending on need) Auditing and Logging 10

Third-party Assurance Cloud Service provider relationships need ongoing monitoring Several attestation products are available One or more products may be relevant The attestation products serve as efficient means of obtaining comfort 11

Comparison Between SAS 70/SSAE 16/SOC 1 Report and SOC 2 Report Pre-established control objectives Scope exclusions No SAS 70 /SSAE 16 / SOC 1 Report Privacy, business continuity and disaster recovery and any other subject matter not relevant to users financial statement assertions SOC 2 Report Yes (Security, Confidentiality, Availability, Privacy, and Processing Integrity) No exclusions as long as it relates to one of the five key system attributes Nature Provides a report on the cloud Controls over the security, availability and provider s controls related to financial statement assertions of user organizations processing integrity of a system and the confidentiality and privacy of information processed by the system Types of systems Distribution of report Systems that process transactions or data for the user organization that are relevant for user organization s financial statements Limited distribution report: User organizations and user auditors only Systems that are not relevant /material for user organization s financial statements but relevant for compliance and operations. Limited distribution report: User organizations and user auditors only 12

Recap Use of cloud computing is expanding at a rapid pace Cloud computing has tangible business benefits Cloud computing leads to new risks Risks can be managed It can be a strategic differentiator 13

Auditing Cloud Computing Arrangements How do We Audit the Cloud?

Cloud Outsourcing Lifecycle Phase 1 Business Case Phase 1 Phase 2 Vendor due diligence Phase 2 Phase 5 Phase 5 Closing the relationship Phase 3 Phase 3 Phase 4 Establishing vendor relationship Phase 4 Ongoing monitoring 15

Risk IT Framework There are broad risk management frameworks such as COSO ERM There are domain-specific frameworks such as ISO 27001 and ITIL The Risk IT framework from ISACA fills the gap between generic risk management tframeworks and ddomain-specific ifi frameworks IT risk is not purely a technical issue The Risk IT framework is about business risk related to the use of IT 16

Linkage Between Risk and Controls Top down Risk scenarios: Business Objective Risk Response Options 1. Avoid 2. Transfer Combine and Refine Refined and specific IT Risk scenarios Risk Response 3. Mitigate Bottom up Risk scenarios: Generic scenarios COBIT Controls 4. Accept 17

Case Study Background about the organization: Organization ABC is a Healthcare provider (runs a network of hospitals and clinics), payer (Health Plan), and offers disease management solutions. It has recently outsourced the hosting of its data warehouse by utilizing an external cloud service provider (CSP) to host its data warehouse containing claims processing and summary health information for its care recipients and plan participants. The CIO and CFO have engaged the internal auditor/co-sourced internal audit provider to conduct a review of the cloud computing arrangement. 18

Case Study Illustration Healthcare Organization s nternal network from the internet s firewall separating it s in 19

Risk-based Audit Scoping Utilizing RiskIT and COBIT Risk IT Ref # and corresponding High-level Risk Scenarios COBIT processes and corresponding control objectives that influence all given Risk IT high-level risk scenarios Phases 1, 2 Phases 2, 3 Phase 3 Phases 4, 5 Plan and Organize (PO) 3. Technology Selection PO 3.2 AI 1.2 Acquire and Implement (AI) Deliver and Support (DS) 10. Regulatory compliance ME 3.1 16. Selection/performance of third-party suppliers PO 5.5 AI 5.2 DS 2.4 27. Logical Attacks AI 2.4 DS 5.10, DS 5.3 28. Information Media DS 5.11 31. Database Integrity DS 11.6 32. Logical Trespassing DS 5.4, DS 5.55 34. Contract Compliance ME 3.4 Monitor and Evaluate (ME) 20

References The Risk IT Framework from ISACA http://www.isaca.org/template.cfm?section=risk p _ IT7&Template=/TaggedPage/TaggedPageDisplay.cfm& g g p TPLID=79&ContentID=48749 ENISA Cloud Computing: Benefits, Risks and recommendations for information security, November 2009 Virtual Machine Security Guidelines by The Center for Internet Security http://www.cisecurity.org/tools2/vm/cis_vm_benchmark_v1.0.pdf Forrester Research "Database-as-a-Service Explodes on the Scene" Gartner Research http://www.gartner.com/it/products/research/cloud_computing/cloud_computing.jsp American Institute of Certified Public Accountants (AICPA) http://www.infoq.com/articles/nasdaq-case-study-air-ands3;jsessionid=e61f6dc4d149e05b27c933f5f37312ba Cloud Security Alliance: Security Guidance for critical areas of focus in cloud computing v2.1 InformationWeek http://www.informationweek.com/cloudcomputing/blog/archives/2009/02/lessons_from_th.html?catid=cloud-computing McKinsey & Company How IT is managing new demands d (November 2010) 21

Presenter s C Contact Details Sailesh Gadia KPMG LLP +1 (612) 305 5087 sgadia@kpmg.com www.kpmg.com k

2010 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved. 43713CHI The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International Cooperative ( KPMG International ).