Cloud-Computing-Course-Description

advertisement
The Essentials of Cloud Computing for Audit Professionals
CPE Credits: 7 (one-day version) 14 (two-day version) 28 (four-day version)
Description:
We can argue that it is not a matter of whether cloud computing will become ubiquitous—
because the economic forces are inescapable—but rather what can we do to assess enterprise
governance, risk assessment and development of strong internal controls, in the implementation
and management of ever increasing cloud computing environments.
This program will begin by first establishing the definition of cloud computing, then describing
the various service delivery models of a cloud computing architecture, and the ways in which
clouds can be deployed as public, private, hybrid, and community clouds, followed by a much
deeper review of the security and privacy issues related to cloud computing environments.
We will examine cloud computing models, look into the threat model and security issues related
to data and computation outsourcing, and explore practical applications of secure cloud
computing. Using the confidentiality, integrity, and availability of data (CIA) model we will
examine the threats and security implications to befall poorly established and maintained cloud
computing environment. Audit approaches and methodologies for assessing internal control
exposures within cloud computing environments will also be fully discussed and examined.
Participants will develop a cloud ICQ as part of the multiple exercises included in the multi-day
presentation.
Audience:
This presentation is intended for Internal and external auditors (IT, financial, operational), Chief
Technology Officers, General Counsels, Chief Information Officers, Chief Security Officers,
Controllers, and persons charged with establishing or reviewing the implications of establishing
strategies that embrace cloud computing and coordinate the role of organizational IT in
substantiating organizational compliance to today’s (and tomorrow’s) governance regulations, as
well as professionals who generally want to learn more about cloud computing and assessing
their organization’s implementation of cloud computing technologies.
Prerequisites:
There is no prerequisite for this seminar.
Objectives:
After completing this seminar, participants will be able to:
1. Discuss, with confidence, what is cloud computing and what are key security and control
considerations within cloud computing environments.
2. Identify various cloud services.
3. Assess cloud characteristics and service attributes, for compliance with enterprise
objectives.
4. Explain the four primary cloud category “types”.
5. Evaluate various cloud delivery models.
6. Contrast the risks and benefits of implementing cloud computing.
7. Specify security threat exposure within a cloud computing infrastructure.
8. Recognize steps and processes used to perform an audit assessment of a cloud computing
environment.
9. Summarize specific environments that would benefit from implementing cloud
computing, contrasted against those environments that might not benefit.
10. Weight the impact of improperly controlled cloud computing environments on
organizational sustainability.
Course Outline:
PART 1
Cloud Computing Definition
What are Cloud Services
Cloud Service Attributes
Access to the Cloud
Cloud Hosting
Information Technology Support
Provisioning
Pricing
Underestimated costs
User Interface
System Interface
Shared Resources/Common Versions
Characteristics of Cloud Computing
Rapid elasticity
Pay per use
Independent resource pooling
Network access
On-demand self-service
The Five Levels of Redundancy
Physical
Virtual resource
Availability zone
Region
Cloud
Cloud Categories
Public Cloud
Private Cloud
Hybrid Cloud
Community Cloud
Cloud Delivery Models
SaaS
PaaS
Iaas
Cloud Architectural Models
Design for Failure (DFF)
Traditional
Cloud Architecture Summary
Customization
Service Reliability and Disruptions
Integration Challenges
Loss of Control
Emerging Technology
Vendor Choices
Infrastructure Limitations
Negligence
Cloud Scenarios and Considerations
Would you want the computer that controls safety local or in the cloud
Someone you know is in a hospital. Do you want there respirator and medical dosage managed
in the cloud or locally
Weapons control system
Corporate web server
Satellite navigation system
DNS, Firewall rules, Active Directory
ERP
Workforce management
The Evolution of the Cloud
Advantages
Savings
Benefits
PART 2
Security in the Cloud
Data Security and Control
Provider Loss
Subpoenaed Data
Lack of Provider Security
Encryption
Regulatory Compliance
Directive 95/46/EC
HIPPA
PCI/PCI DSS
SOX
21CFR11
Cloud Threats
Threat Mitigation
Cloud Security
Cloud Security vs. Traditional IT
Ponemon Study Discussion
Cloud Security Attributes
Security as a Service from the Cloud
Cloud and Security Risks
Risk Areas
Privileged User Access
Data Location and Ownership
Data Segregation
Data Recovery
Investigative Support
Long Term Viability
Data Confidentiality and Privacy
Service Availability
Cloud Risk Summary
Real World Issues with Cloud Computing
Cloud Security Alliance
National Institute of Standards and Technology
Strategy
Security Model
Process Maturity Model
Core Technologies
Information Assurance Framework
Cloud Leverage for IA
.
Roadmap
Next Steps
Expanding to New Markets
Small and Medium Enterprises
Adjacent Markets
New Acquisitions
Expansion
Cloud Computing and Business Commerce
Cloud Movement
Financial Services
Media
Automotive
High Tech
Google.com
Amazon.com
Microsoft.com
PART 3
Cloud Audit
Value
Tactics
Cloud Management Audit/Assurance Program
Internal Audit Role
Minimum Audit Skills
Planning for a Cloud Audit
Support Activities
Cloud Business Continuity Planning
Retention and E-Discovery
Privacy Requirements
Portability and Interoperability
Cloud Sourcing
Cloud Impacts
Realities of Cloud Services
Defining Cloud Services
Cloud Performance Limitations
Determining the Cloud Category
Your Environment
Optimize
Consolidate
Web Security
Addressing Web Threats
Web Threats in the Cloud
Risks of Web Threats
Web Threat Mitigation
Web Security Summary
Conclusion
Download