Cloud Computing Basics There are three key cloud services: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS providers offer its customers applications over a network PaaS providers offer its customers to deploy their own applications to a cloud IaaS providers offer its customers processing, storage, network capacity, and other fundamental computing resources Some recent branded cloud service providers include Disaster Recovery as a Service (DRaaS), Backup as a service (BaaS), Incident Response as a service (IRaaS), etc. Some key risks to a cloud computing environment include but are not limited to the following: Compliance risks Loss of governance Data protection Security vulnerabilities A-lign is here to assist in selecting the relevant audit to reduce key risks in the cloud service provider environment. Relevant Audits for Cloud Providers It is important for cloud service providers to understand its obligations first when selecting an audit. The key cloud service provider customer obligations include legal, regulatory and contractual. A-lign provides relevant audits for cloud providers that address each and in some cases multiple key obligations. Here are some of the audits, with careful selection, that can meet cloud service provider needs as well as attract additional customers by demonstrating compliance with internationally accepted security standards and controls. FedRAMP: A-lign is one of the few Accredited FedRAMP 3PAO authorized to conduct security assessment to evaluate the cloud based services against the Federal Risk and Authorization Management Program (FedRAMP) certification requirements. A-lign assesses required controls outlined in the National Institute of Standards and Technology Special Publication 800-53 (NIST 800-53) and published by FedRAMP. A-lign will conclude in a Security Assessment Report (SAR) whether or not it will recommend the cloud system for authorization. Then it is up to the federal agency to formalize its decision to authorize the cloud system. 1 ©2015 A-lign. All Rights Reserved. ISO 27001 Certification: A-lign is an ISO / IEC 27001 certification body accredited by the ANSI-ASQ National Accreditation Board (ANAB) to perform Information Security Management System (ISO 27001) 27001 certification for cloud providers. The assessments to certify the cloud provider is broken up into two stages (Stage 1 and Stage 2). The purpose of conducting the Stage 1 audit is to assess the Company’s cloud computing scope and conformance to clauses 4-10 listed below: 4: Context of the organization 5: Leadership 6: Planning 7: Support 8: Operation 9: Performance evaluation 10: Improvement A-lign will plan Stage 2 once A-lign has made a determination at the conclusion of Stage 1 that the cloud computing service provider is prepared to undergo Stage 2. The purpose of the Stage 2 review is for A-lign to meet the following objectives: Perform on-site testing based on Stage 1 scope verification Evaluate effectiveness of control activities identified to be in scope To confirm that the Company adheres to its own policies, objectives and procedures A-lign will conclude in an audit report whether or not it will recommend the cloud system for certification and/or after any nonconforming items identified during the assessment are corrected. An ISO 27001 certification against a cloud computing scope is an internationally recognized accomplishment to managing information security risks that affect the confidentiality, integrity, and availability of cloud computing service providers. SOC Reporting (SSAE 16 and SOC 2) A-lign is a licensed CPA firm that conducts audit reporting of cloud service providers. SSAE 16 / SOC 1: 2 ©2015 A-lign. All Rights Reserved. Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is attestation standards put forth by the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA). A-lign will evaluate these main components of the attestation: Written Assertion, as provided by the cloud computing service provider, that fairly presents the cloud computing system Controls related to the control objectives stated in the Company's description of the cloud computing system are suitably designed Controls related to the control objectives stated in the Company's description of the cloud computing system operated effectively to achieve those control objectives. **Note: This only applies to a SSAE 16/SOC 1 Type 2. AT 101 / SOC 2: Attestation Standard 101 (AT 101) are attestation standards put forth by the ASB of AICPA. The SOC 2 examination can report on the assertions made by the cloud computing service provider in their controls with regards to the AICPA Trust Services Principles and Criteria regarding: Common Criteria/Security Availability Confidentiality Processing Integrity Privacy A-lign will evaluate these three main components of the attestation: Written Assertion, as provided by the cloud computing service provider, that fairly presents the cloud computing system Fairly presents the cloud computing service provider environment related to the AICPA Trust Services Principles and Criteria Controls related to the AICPA Trust Services Principles and Criteria operated effectively At the conclusion of the SSAE 16 or SOC 2 engagement, A-lign will issue a report with a formal opinion against the three main components stated above. The SSAE 16 report for cloud service providers utilize this option in order to comply with customers that may be publicly traded and need to comply with Sarbanes Oxley. SOC 2 reporting is utilized for cloud service providers that may not have publicly traded customers and/or customers that require a third party attestation for the cloud 3 ©2015 A-lign. All Rights Reserved. service provided. Type 2 SOC reporting is unique in that it is the only cloud service provider deliverable that can be assessed over a period of time (typically for at least six months). FISMA Security Assessment: A-lign can perform a security assessment to evaluate the cloud service provider against the Federal Information Security Management Act (FISMA) by assessing the required controls outlined in the NIST 800-53. Cloud service providers utilize FISMA assessments in order to comply with customer requirements in the federal government industry, or those that provide services to the federal government, or want to demonstrate FISMA compliance to potential customers. A-lign will evaluate the Company's security policies, procedures and processes against the NIST 80053 requirements listed below for a cloud computing information system: Access Controls Media Protection Awareness and Training Physical and Environmental Audit and Accountability Planning Security Assessment & Authorization Personal Security Configuration Management Risk Assessment Contingency Planning System and Service Acquisition Identification and Authentication System and Communications Protection Incident Response System and Information Integrity Maintenance Program Management A-lign will conclude in an SAR against the cloud service provider that will include some of the following: Name of the cloud computing information system Security categorization (high, moderate, or low) Assessment finding summary (indicating satisfied or other than satisfied) 4 ©2015 A-lign. All Rights Reserved. A-lign's assessor comments (weaknesses or deficiencies noted) A-lign's assessor recommendations (priorities, remediation, corrective actions, or improvements) PCI DSS: A-lign is a registered Qualified Security Assessor (QSA) company approved by the Payment Card Industry Security Standards Council (PCI SSC) to perform Payment Card Industry Data Security Standard (PCI DSS) security assessments to validate a company’s compliance with the requirements of PCI DSS. Cloud service providers utilize PCI assessments in order to comply with customers in the payment card industry or want to attract customers in the same space. A-lign can conduct the newly required PCI DSS Version 3.0 assessment for cloud computing service providers. The scope of the examination included the relevant controls defined in the PCI DSS requirements listed in below: Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks Requirement 5: Use and regularly update anti-virus software or programs Requirement 6: Develop and maintain secure systems and applications Requirement 7: Restrict access to cardholder data by business need to know Requirement 8: Assign a unique ID to each person with computer access Requirement 9: Restrict physical access to cardholder data passwords and other security parameters Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes Requirement 12: Maintain a policy that addresses information security for all personnel A-lign will deliver the Report on Compliance (ROC) and Attestation of Compliance (AOC) in accordance with the published guidelines from the PCI SSC to include. The ROC and AOC provides evidence from detail testing as well as a comprehensive look at the conformance to the standard. HIPAA / HITECH: A-lign can conduct a security assessment to evaluate the Company’s cloud computing services against the Security and Privacy Rules outlined in the Health Insurance Portability and Accountability 5 ©2015 A-lign. All Rights Reserved. Act (HIPAA) and evaluate the company's breach reporting procedures as required by the Health Information Technology for Economic and Clinical Health (HITECH). Cloud service providers utilize HIPAA / HITECH assessments in order to conform to customer requirements in the healthcare industry or want to demonstrate conformance to potential customers in healthcare. A-lign performs the assessment to evaluate safeguards set forth below including the incident response and breach reporting procedures: A-lign will evaluate the Company’s compliance with the HIPAA Security and Privacy Rules including the safeguards set forth below and will evaluate the Company's incident response and breach reporting procedures against the HITECH requirements. Administrative Safeguards Physical Safeguards Technical Safeguards Organizational, Policies and Procedures and Documentation Requirements Privacy Safeguards Breach Notification The scope of the assessment will include the Privacy Safeguards only if the cloud computing company comes into direct contact with private health information (PHI). The A-lign will issue a HIPAA / HITECH security assessment report against the cloud service provider which will contain the following sections: Scope of the engagement Overview of the procedures performed including the controls assessed Findings of any deficiencies and recommendations to remediate the deficiencies identified Benefits It is important to select the appropriate assessment in order to address the governance affecting cloud computing. Benefits of such assessments include meeting the legal, regulatory and contractual obligations between the cloud service provider and customer(s). A-lign works with service providers in cloud computing in order to assist with the specific audit selection and determining the control issues specific to cloud computing. We are here to help ensure the proper section(s)! 6 ©2015 A-lign. All Rights Reserved.