CSA Guidance Version 3 Domain 4: Compliance and Audit Management As organizations are migrating from traditional data centers to the Cloud, they are facing a number of challenges. Maintaining compliance with a multitude of relevant regulations and security policies is one of them. All parties need to understand and appreciate the differences and the impact on existing compliance and audit procedures, standards, and best practice. Cloud computing permits the centralization of security, audit and compliance this enables end users to achieve greater degrees of assurance than the simple adoption of best practice. Non-corporate entities normally excluded from lines of business with strict compliance burdens may now enter markets that were once cost prohibitive. In audit and compliance it is not possible to transfer the operational risk but it is possible to leverage those more expert and educated to ease the burden. Regulators and auditors are still learning about Cloud Computing and its impact on new and existing auditing activities. Of the many regulations touching upon information technology with which organizations must comply, few were written with Cloud Computing in mind. How should a cloud consumer go about demonstrating to auditors that their company is in compliance? Understanding the nuances of the cloud environment and operational regulatory constrain is a key component of any business strategy. It is important that cloud customers understand the following: Regulatory applicability for the use of a given cloud service, paying attention to cross boarder or multi jurisdictions when relevant Division of compliance responsibilities between cloud provider and cloud customer. This is even more important when third parties are involved. Cloud customers need to clearly understand such responsibilities Cloud provider’s ability to produce evidence needed for compliance. Some customer requirements such as demonstrating compliance will depend on the Cloud service provider Cloud customer’s role in bridging the gap between cloud provider and auditor/assessor. Audits and assessments are key component of governance and Cloud customers need to make sure these activities are not constrained with the chosen service provider. Overview. This domain addresses Compliance and Audit. Compliance Copyright © 2011 Cloud Security Alliance CSA Guidance Version 3 Audit 1.1 Compliance With the Cloud, information technology is increasingly subject to various policies and regulations. Customers, investors, shareholders, employees, partners, regulators and auditors all expect organizations to proactively comply with regulatory requirements and across all jurisdictions. Information technology governance is critical and all companies need a strategy in order to compete in this global market. Governance is the art of establishing processes and policies that enable the smooth execution of business objectives within the constraints of the environment governing the business operations. Governance requires compliance activities to ensure that the policies and processes established to secure operations are followed to the best ability of the people who are task with running the daily operations. For this work, compliance is focused on aligning with external requirements (e.g., law, regulation, industry standards) while governance is focused on aligning with internal requirements (e.g., board decisions, corporate policy) Compliance is the set of processes of complying with customs, guidelines, policies, laws, and institutions affecting the way an enterprise is directed, administered or controlled. Compliance is both about 'following the rules' and showing that the company has done so. In some environments, such as regulated cloud, the transparency aspect can even be dominant, sometimes at the expense of 'actual' compliance. Most IT activities (monitoring, managing, protecting, and disclosing) are requirements for most major guidelines and regulations. IT governance is a supporting element to overall corporate governance and compliance. In this role the cloud permits the ability to centralize IT governance and consolidate the information gathering element of governance and compliance. Compliance should not cause an organization to fail in conducting its business in a productive way. By leveraging a cloud services non-corporate users can achieve the same level of compliance as larger more resourced entities. In this way cloud computing, through Security as a service offering, recognizes the role that third-party organizations play in assessing and communicating compliance. Compliance plays an important role in making sure the organization is able to compete within the rules of its jurisdictions. Compliance should not be ignored. Information technology will continue to play a key role in implementing compliance and delivering on its requirements across all relevant jurisdictions. With Cloud, IT will have a permanent seat at the table; the organization will need to have a cross-functional representation in order to deliver a good compliance strategy. Copyright © 2011 Cloud Security Alliance CSA Guidance Version 3 1.2 Audit Audit is an important component of the proper governance of any organization. Audit has to be conducted in an independent way and has to be robust based on best practice, allocated budget, and test protocols and standards. Both internal and external audit/controls have legitimate role to play for cloud, for both the customer and for the provider. Cloud brings these roles in to crystal focus. In fact, greater transparency may be the best approach while cloud is relatively new, to raise comfort levels for all parties. An audit must provide an assurance that all activities supporting operational risk have been tested and reviewed. An audit plan must be in place and supported by the Board and management. It is important to have regular independent audits of all critical systems and internal controls as well as a complete audit trail with documented recommendations in order to improve efficiency and reliability. To analyze the effectiveness of an audit process, many companies use a maturity model. In some cases a more statistical approach to risk is being adoptied such as that used in the Basil and Solvency accords on financial services and as the field matures more specialized models for risk will be adopted based on the line of business. In the Cloud, these practices will need to be enhanced to fit the requirements of Cloud environments. The business and management will need assurances that strategic initiatives and objectives will be accomplished on the Cloud just like they may have been used to in previous models. 1.3 Recommendations Involve Legal and Contracts Teams together with your IT. The cloud provider’s standard terms of service may not address your compliance needs; therefore it is beneficial to have both legal and contracts personnel involved early to ensure that cloud services contract provisions are adequate for compliance and audit obligations Specialized compliance requirements for highly regulated industries (e.g., finance, health care): organizations need to consider what are current requirements? How well are they meeting them now? What geographic- or jurisdiction specific requirements may make leveraging true cloud scale difficult? Analyze Compliance Scope. Determining whether the compliance regulations which the organization is subject to will be impacted by the use of cloud services, for a given set of applications and data. This is especially important for organizations operating in multiple jurisdictions Copyright © 2011 Cloud Security Alliance CSA Guidance Version 3 Analyze Impact of Regulations on Data Security. Potential end users of Cloud Computing services should consider which applications and data they are considering moving to cloud services, and the extent to which they are subject to compliance regulations. Review Relevant Partners and Services Providers. This is general guidance for ensuring that service provider relationships do not negatively impact compliance. Assessing which service providers are processing data that is subject to compliance regulations, and then assessing the security controls provided by those service providers, is fundamental. Several compliance regulations have specific language about assessing and managing third party vendor risk. As with non-cloud IT and business services, organizations need to understand which of their cloud business partners are processing data subject to compliance regulations. Understand Contractual Data Protection Responsibilities and Related Contracts. The cloud service model to an extent dictates whether the customer or the cloud service provider is responsible for deploying security controls. In an IaaS deployment scenario, the customer has a greater degree of control and responsibility than in a SaaS scenario. From a security control standpoint, this means that IaaS customers will have to deploy many of the security controls for regulatory compliance. In a SaaS scenario, the Cloud service provider must provide the necessary controls. From a contractual perspective, understanding the specific requirements, and ensuring that the cloud services contract and service level agreements adequately address them, are key. Analyze Impact of Regulations on Provider Infrastructure. In the area of infrastructure, moving to cloud services requires careful analysis as well. Some regulatory requirements specify controls that are difficult or impossible to achieve in certain cloud service types. Analyze Impact of Regulations on Policies and Procedures. Moving data and applications to cloud services will likely have an impact on policies and procedures. Customers should assess which policies and procedures related to regulations will have to change. Examples of impacted policies and procedures include activity reporting, logging, data retention, incident response, controls testing, and privacy policies. Prepare Evidence of How Each Requirement Is Being Met. Collecting evidence of compliance across the multitude of compliance regulations and requirements is a challenge. Customers of cloud services should develop processes to collect and store compliance evidence including audit logs and activity reports, copies of system configurations, change management reports, and other test procedure output. Depending on the cloud service model, the cloud provider may need to provide much of this information. Copyright © 2011 Cloud Security Alliance CSA Guidance Version 3 Auditor Qualification and Selection. In many cases the organization has no say in selecting auditors or security assessors. If an organization does have selection input, it is highly advisable to pick a “cloud aware” auditor since many might not be familiar with cloud and virtualization challenges. Asking their familiarity with the IaaS, PaaS, and SaaS nomenclature is a good starting point. Cloud Provider’s SSAE 16 SOC2 Providers should have this audit statement at a minimum, as it will provide a recognizable point of reference for auditors and assessors. 1.3 Requirements Right to Audit Clause. Customers will need the ability to audit the cloud provider, given the dynamic natures of both the cloud and the regulatory environment. This is one of the most important components of the relationship as it will affect traceability and transparency. A Right to Audit clause should be a requirement of any service level agreement Use of a normative audit specification in the right to audit. A right to audit contract clause should be obtained, particularly when using the cloud provider for a service for which the customer has regulatory compliance responsibilities. Over time, the this right should be supplemented by appropriate cloud provider certifications, related to the recommendation for ISO/IEC 27001/27017-1 certification. Right to Transparency Clause should be obtained when using the cloud provider for a service for which the customer has regulatory compliance responsibilities for which criminal prosecution is a possibility. A contract should distinguish between automated/direct access to information (e.g., logs, reports) and 'pushed' information (e.g., system architectures, audit reports) Mutual selection of third party auditors and SLA metrics to be audited. Third-party auditors should be mutually selected in advance, jointly between provider and customer. Mediators should evaluate service level agreements (SLA) for metrics and audit events that embody the intent of the SLA and those SLA metric interpretations should be contractually agreed to by both parties when implementing and engaging the third party auditor. Copyright © 2011 Cloud Security Alliance