Cloud Computing Handbook

advertisement
Refresher on cloud computing
Cloud computing is a form of outsourcing where the organization outsources data processing to
computers owned by the vendor. Outsourcing may also include utilizing the vendor’s computers to
store, backup, and provide online access to the organization data. The organization will need to have a
robust access to the internet if they want their staff or users to have ready access to the data or even
the application that process the data. In the current environment, the data or applications are also
available from mobile platforms (laptops with Wi-Fi or cell/mobile cards, smart phones, and tablets).
Risks for the audited entity
When an agency chooses to utilize cloud computing, they need to be aware of risks that they may face
with the service provider, the risk they face if they are unable to effectively oversee the service provider,
and other risks related to management and security weaknesses in the service providers approach. As
an auditor you will need to understand what the agency has done to mitigate the risks with cloud
computing. When we as auditors are asked to appraise whether an entity or organization getting the
benefits of cloud computing are managing the vendor to ensure that they get the required services we
need to be aware of the risks that they may face. In order analyze whether the audit entity is both
aware of and is managing or mitigating the common risks with cloud computing the following matrix
provides a way to look for certain documents and activities that will provide the data that the auditor
can analyze.
A representative set of audit related questions if provided here in this guide. The auditor may augment
these with other questions as appropriate. For example, managing cloud computing also requires
project management discipline similar to those when managing any other contractor. However, since
cloud computing does not typically entail development of new capability the management activities are
more specific to monitoring SLA requirements and taking action when the vendor is not performing to
contractual requirements.
Audit Issues
Criteria (Basis of
evaluation)
Information
required 1
Analysis
Method
Audit
Conclusion 2
Cloud Computing Policy
Audit Objective: To assess whether the organization has a policy on cloud computing or has given it some
thought prior to engaging in the activity.
Does the organization have a
policy on whether they will
utilize cloud computing?
Is there an organizational policy
that addresses the use of cloud
computing? This may also be
called a policy on outsourcing.
Who approved the policy?
Does the policy lay out which
functions or services can be
performed utilizing cloud
computing and which ones should
be retained via existing IT
infrastructure?
Organizational IT
Policy or other
which addresses
cloud computing.
Organizational
policy on cloud
computing or
outsourcing
Interviews
and review
of
documents
Whether the
organization has
considered
cloud computing
as an option and
whether they
have decided
what can and
cannot be
implemented via
the cloud.
How does the organization ensure
that this policy is enforced?
1
if possible the source of info should be indicated
Audit conclusions could lead to possible audit recommendations. For further guidance see
Chapter ____( Reporting)
2
Who approves the solicitation of
cloud computing services?
CSP Selection
Audit Objective: To assess how the agency selected the CSP who is most qualified and is able to meet their
specific requirements.
How did you ensure that the
Cloud Service Provider (CSP) is
best qualified to meet your
requirements?
What data do you have on the
Cloud Service Provider’s (CSP)
past experience?
All services must
be ensured its
continuity by the
provision of
adequate
resources and
supported by
adequate
proficiency
Have you received a list of the
CSP's current or past customers?
Have you discussed the CSP's
performance with their customers
or references?
CSP contract or
SLA.
How did you determine whether
the CSP is able to meet your data
security, integrity, protection,
backup, privacy, and other critical
requirements?
Agency Data
Protection Policy,
IT governance
Data on the CSP
past performance
on other contracts
for other customers
(this may not
always be available
to the audited
entity but talk to
the contracting
officer who should
know the vendor’s
track record).
Agency document
of requirements,
visit vendor and or
conduct audit, look
at vendor controls,
etc
Interview
and
document
review.
Whether the
organization has
reviewed the
CSP’s past
performance
prior to
selecting them
as their vendor.
CSP Monitoring
Audit Objective: To assess that the selected CSP is meeting the requirements of the agency.
What are you doing to ensure
that the CSP is providing services
that are responsive to your
needs?
What are some key parameters
that you have defined for the CSP
vendor? Examples include, up
time, mobile access interface,
simultaneous users, and data
transfer rates, etc.
Have you defined how often they
will be measured and reported?
Have you defined how they will
be measured?
All works must be
supervised to
ensure full
compliance with
the SLA’s
requirements
CSP contract or
SLA.
Assess the
adequacy of
SLA
parameter
SLA with key
parameters or
indicators, monthly
or other periodic
reports from the
CSP on the
reportable
parameters,
Whether the
organization has
specific
requirements in
the SLA for the
cloud service.
Whether the
organization is
monitoring and
taking action
when SLA
parameters are
not being met.
Review and actions
items or notices to
CSP on noncompliant issues.
How often does your team meet
to discuss the vendor's
performance?
What actions have you taken
when a performance deviations
occurs?
What is your strategy if the CSP
sub-contracts some of the work?
Agency strategy or
view on use of
Whether the
agency has
stipulated that
What is your strategy if the CSP is
acquired by a different company
during the performance period of
your contract?
subcontractors by
the CSP, (get by
interviewing
officials, this may or
may not be
documented)
the vendor not
subcontract any
of the services
to another
vendor without
notifying the
agency.
Record of
analysis of
interview or
documentati
on of
strategy in
meeting
minutes.
Security
Audit Objective: To assess whether the agency is periodically monitoring the vendor to ensure that security
requirements are being met.
What are your security
requirements and how are you
ensuring that the CSP is meeting
them?
What security standards are you
requiring that the CSP follow?
Security
requirements ,
CSP Infomartion
security
management
policy and
procedures
What portions of your data
requires encryption?
Who is responsible for this
encryption?
Agency adopted
security standards.
Whether the
agency has
thought about
security controls
and standards
and has
required the CSP
to follow the
same.
Have you tested security controls
at the CSP?
Contract or SLA
CSP audit reports.
How often does the CSP report to
you if there is a security issue
with your data?
What actions have you taken
when such items are reported?
Data Access
Audit Objective: To assess whether the agency has plans in place for data access if there are issues with the
vendor or connectivity.
What have you done to ensure
that you do not lose access to
your organizational data in a
cloud computing environment?
How are you ensuring that your
data and applications are
portable if you switch CSP?
What are your plans for service
continuity if you are unable to
access the CSP’s site for an
extended period?
Have you tested your (or the
CSP’s if they are responsible)
backup and archive retrieval
processes?
Use of cloud
computing must
satisfy the
principle of
reliability,
integrity, and
availability, as well
as ensuring that
the information is
not disseminated
deliberately
Continuity of cloud
computing
environment
should be covered
by a BCP / DRP
Whether the
agency is able to
access their data
if they switch
contracts or are
locked in for a
single CSP for an
extended time.
SLA or contract.
Review
contract or
SLA. Look for
what is
stated about
access to
data and
how readily
it can be
made
available to
be moved to
new location
How often do you test the
systems reliability and
performance?
CSP reports on DRP
testing, reports on
periodic backup
and other reports
or information on
data backup or
retention.
Do you have access to the data?
Where are the data backups
located?
Do you have a non-disclosure
agreement with your CSP to
ensure your data and other
information assets are suitably
protected?
Applicable laws
and regulations on
data protection,
privacy, etc.
or vendor as
appropriate.
Download