Cloud Computing: Audit Challenges

advertisement
Cloud Computing:
Implementation Challenges
Marco Ramos
KPMG
marcoramos@kpmg.com
787-367-9057
Stay-or-go: In-House vs. The Cloud
•
•
•
•
Power consumption
Data Center Management
Storage Management
Ensuring availability
– Redundancy = $$$$$ x 2
• Virtualization
• Carbon footprint
Service Organizations vs. The Cloud
Service Organization
The Cloud
Pay-per-user
Fixed Fee
Pay-as-you-go
Transactional Basis
Independent Auditor’s Report SSAE #16
(formerly known as SAS70)
Approaches
In-house
Salary
Hardware
+ Upgrade
+ Maintenance
Licenses
Backup
Off-site
Development
Configuration
Storage
Network
SaaS
PaaS
IaaS
Large scale
standardization
Cost-effective and
time saving to app
development
Cost-effective
Public vs. private:
collaboration
solutions
Faster set-up of
development and
testing
environments
Manage peak loads
Business can focus
on core activities
Green IT
Implementation Challenges
• Data Privacy
• Security
• CAPEX vs. OPEX (fixed costs
vs. variable costs)
• Tax-related issues
• Regulatory ambiguity
• Cross-country: transfer of
data across borders
• Reliability and availability
• Transition and execution
risks
• Limited scope for
customization
•
•
•
•
Cultural resistance (IT!)
SLAs
Ownership of data
What happens at the
end of the contract?
• What information The
Cloud provider returns,
on what format and if it
is readable
• Performance
(response time)
• Hardware
decommissioning
More Challenges…
• Limited IT Budget: initial set-up & upgrades
• Scalability of systems: manage peak demands
investing in additional hardware & software
under utilized in non-peak loads.
• Larger time setting up IT infrastructure
• Need for mobility
Larger benefits to
industry and market segments
•
•
•
•
Government
Healthcare
Education
SME/PyMes – competitive edge to reach IT
resources of global companies: affordable,
reliable, and flexible computing solutions,
enabling them to compete more effectively
with larger organizations
Cross-country Cloud:
Data transfer across borders
• Is the Cloud provider ensuring where data is
hosted? i.e. Data Centers in Chicago, LA & NY
or India, China, and Mexico?
• Canada’s Patriot Act does not allow IT projects
to use US-based hosting environments
• Germany and UK have regulations related to
email
Cloud DOES NOT MEAN
Dissolve IT staff!!!
The Company still needs:
• Technical support
• Network, provisioning, and user certification
• Increased bandwidth
• Training and On-boarding
Cloud Strategy
• Sponsored by the CIO
• Shift focus from configuration,
implementation, and maintenance of in-house
applications to implementing strategy and
meeting business needs
• It is a strategic business decision rather than a
purely technology decision
Green Computing:
Green IT
Axel E. Robert
Company
email@email.com
787-XXX-XXXX
Placeholder
• PLACEHOLDER
Cloud Computing:
Security Challenges
Rory Rivera, PE, MSEE, MSM
Deep Logistics
email@email.com
Security is the Major Issue
14
Analyzing Cloud Security
• Some key issues:
– trust, multi-tenancy, encryption, compliance
• Clouds are massively complex systems can
be reduced to simple primitives that are
replicated thousands of times and common
functional units
• Cloud security is a tractable problem
– There are both advantages and challenges
Former Intel CEO, Andy Grove: “only the paranoid survive”
15
General Security Challenges
•
•
•
•
•
•
Trusting vendor’s security model
Customer inability to respond to audit findings
Obtaining support for investigations
Indirect administrator accountability
Proprietary implementations can’t be examined
Loss of physical control
16
Security Relevant Cloud
Components
•
•
•
•
•
•
Cloud Provisioning Services
Cloud Data Storage Services
Cloud Processing Infrastructure
Cloud Support Services
Cloud Network and Perimeter Security
Elastic Elements: Storage, Processing, and
Virtual Networks
17
Cloud Network and Perimeter
Security
• Advantages
– Distributed denial of service protection
– VLAN capabilities
– Perimeter security (IDS, firewall, authentication)
• Challenges
– Virtual zoning with application mobility
18
Security and Data Privacy Across
IaaS, PaaS, SaaS
• Many existing standards
• Identity and Access Management (IAM)
– IdM federation (SAML, WS-Federation, Liberty ID-FF)
– Strong authentication standards (HOTP, OCRA, TOTP)
– Entitlement management (XACML)
• Data Encryption (at-rest, in-flight), Key Management
– PKI, PKCS, KEYPROV (CT-KIP, DSKPP), EKMI
• Records and Information Management (ISO 15489)
• E-discovery (EDRM)
19
Cloud Security Challenges
Part 1
•
Data dispersal and international privacy laws
–
–
–
•
•
•
•
•
EU Data Protection Directive and U.S. Safe Harbor
program
Exposure of data to foreign government and data
subpoenas
Data retention issues
Need for isolation management
Multi-tenancy
Logging challenges
Data ownership issues
Quality of service guarantees
20
Cloud Security Challenges
Part 2
•
•
•
•
•
Dependence on secure hypervisors
Attraction to hackers (high value target)
Security of virtual OSs in the cloud
Possibility for massive outages
Encryption needs for cloud computing
–
–
–
–
•
•
Encrypting access to the cloud resource control
interface
Encrypting administrative access to OS instances
Encrypting access to applications
Encrypting application data at rest
Public cloud vs internal cloud security
Lack of public SaaS version control
21
Additional Issues
•
Issues with moving PII and sensitive data to the
cloud
–
•
Using SLAs to obtain cloud security
–
–
•
•
Privacy impact assessments
Suggested requirements for cloud SLAs
Issues with cloud forensics
Contingency planning and disaster recovery for
cloud implementations
Handling compliance
–
–
–
–
–
FISMA
HIPAA
SOX
PCI
SAS 70 Audits
22
Cloud Migration and Cloud Security
Architectures
• Clouds typically have a single security architecture
but have many customers with different demands
– Clouds should attempt to provide configurable security
mechanisms
• Organizations have more control over the security
architecture of private clouds followed by
community and then public
– This doesn’t say anything about actual security
• Higher sensitivity data is likely to be processed on
clouds where organizations have control over the
security model
23
Putting it Together
• Most clouds will require very strong security
controls
• All models of cloud may be used for differing
tradeoffs between threat exposure and
efficiency
• There is no one “cloud”. There are many
models and architectures.
• How does one choose?
24
Cloud Computing:
Audit Challenges
John R. Robles
John R. Robles and Associates
www.johnrrobles.com
jrobles@coqui.net
787-647-3961
Cloud Computing: Audit Challenges
• Must
– Audit,
– Review, and
– Report
on the Internal Controls System surrounding the
implementation and operations of Cloud Technology
• You must have an ICS, so lets determine if it is
effective and efficient (effective & efficient
internal controls)
Cloud Computing: Audit Challenges
So you want to go to the Cloud or are already there? Then
• How did you identify the assets selected for cloud
deployment
• Did you evaluate risks related to those assets?
• For each asset, did you analyze risks to organization if:
–
–
–
–
–
–
Assets became widely public and widely distributed?
Employees of our cloud provider accessed the assets?
Cloud processes or functions were manipulated by an outsider?
Cloud processes or functions failed to provide expected results?
Information/data were unexpectedly changed?
Asset were unavailable for a period of time?
Cloud Challenges: Audit Challenges
• How did you map assets to potential cloud deployment models
–
–
–
–
Public
Private, internal/on-premises
Private, external (including dedicated or shared infrastructure)
Community; taking into account the hosting location, potential service
provider, and identification of other community members
– Hybrid. To effectively evaluate a potential hybrid deployment, you
must have in mind at least a rough architecture of where components,
functions, and data will reside
• Did you evaluate relevant potential cloud service models and
providers
• Did you documentation the potential data flow
Internal Control Framework
• Review internal control framework
– Control Environment (set up by BOD &
management)
– Organization's risk appetite
– Risk Assessments
– Control Activities
– Information and Communications Management
Systems
– Operations Monitoring
Cloud Computing – Maturity Model
Maturity Model for Internal Control
Maturity
Level
Status of the Internal Control
Environment
0 - Non- There is no recognition of
existent the need for internal control.
Control is not part of the
organization’s culture or
mission. There is a high risk
of control deficiencies and
incidents.
Establishment of Internal
Controls
There is no intent to assess
the need for internal
control. Incidents are dealt
with as they arise.
Cloud Computing – Maturity Model
Maturity Model for Internal Control
Maturity
Level
Status of the Internal Control
Environment
1Initial/ad
hoc
There is some recognition of the
need for internal control.
The approach to risk and control
requirements is ad hoc and
disorganized, without
communication or monitoring.
Deficiencies are not identified.
Employees are not aware of their
responsibilities.
Establishment of Internal
Controls
There is no awareness of the
need for assessment of what is
needed in terms of IT controls.
When performed, it is only on an
ad hoc basis, at a high level and
in reaction to significant
incidents. Assessment addresses
only the actual incident.
Cloud Computing – Maturity Model
Maturity Model for Internal Control
Maturity
Level
Status of the Internal
Control Environment
2Controls are in place but are
Repeatable not documented.
but
Intuitive
Their operation is dependent on
the knowledge and motivation
of individuals. Effectiveness is
not adequately evaluated. Many
control weaknesses exist and
are not adequately addressed;
the impact can be severe.
Establishment of Internal
Controls
Assessment of control needs occurs
only when needed for selected IT
processes to determine the current
level of control maturity, the target
level that should be reached and the
gaps that exist.
An informal workshop approach,
involving IT managers and the team
involved in the process, is used to
define an adequate approach to
controls for the process and to
motivate an agreed-upon action plan.
Cloud Computing – Maturity Model
Maturity Model for Internal Control
Maturity Status of the Internal Control Establishment of Internal Controls
Level
Environment
3 - Defined Controls are in place and
adequately documented.
Operating effectiveness is
evaluated on a periodic basis and
there is an average number of
issues. However, the evaluation
process is not documented. While
management is able to deal
predictably with most control
issues, some control weaknesses
persist and impacts could still be
severe
Critical IT processes are identified
based on value and risk drivers.
A detailed analysis is performed to
identify control requirements and the
root cause of gaps and to develop
improvement opportunities. In
addition to facilitated workshops, tools
are used and interviews are performed
to support the analysis and ensure
that an IT process owner owns and
drives the assessment and
improvement process.
Cloud Computing – Maturity Model
Maturity Model for Internal Control
Maturity
Level
Status of the Internal Control
Environment
4 - Managed There is an effective internal
and
control and risk management
Measurable environment.
A formal, documented evaluation
of controls occurs frequently. Many
controls are automated and
regularly reviewed. Management is
likely to detect most control issues,
but not all issues are routinely
identified.
Establishment of Internal
Controls
IT process criticality is regularly
defined with full support and
agreement from the relevant
business process owners.
Assessment of control requirements
is based on policy and the actual
maturity of these processes,
following a thorough and measured
analysis involving key stakeholders.
Cloud Computing – Maturity Model
Maturity Model for Internal Control
Maturity
Level
Status of the Internal Control
Environment
5An enterprise-wide risk and control
Optimized program provides continuous and
effective control and risk issues
resolution.
Internal control and risk management
are integrated with enterprise
practices, supported with automated
real-time monitoring with full
accountability for control monitoring,
risk management and compliance
enforcement.
Establishment of Internal Controls
Business changes consider the
criticality of IT processes and cover
any need to reassess process control
capability.
IT process owners regularly perform
self-assessments to confirm that
controls are at the right level of
maturity to meet business needs and
they consider maturity attributes to
find ways to make controls more
efficient and effective.
Cloud Computing: Now What?
• During the year, PRCCUG will:
– Have periodic meetings to discuss these
challenges
– Discuss solutions
– Present solutions from 1st Level vendors
– Provide networking among professionals
interested in Cloud Computing
Cloud Computing: Now What?
• Join us and the Puerto Rico Cloud Computing
and Green Computing User Group.
Questions and Answers!!
Download