Cloud Computing Guide & Handbook SAI USA Madhav

Cloud Computing Guide & Handbook SAI USA Madhav

Cloud Computing Guide & Handbook SAI USA Madhav Panwar Background 2010 WGITA approved the cloud computing project with SAI USA as lead and Canada & India as members 2011

A status report was presented and comments solicited 2012 Final project description and common cloud computing risks were presented Members requested that this work be augmented cloud computing guide and audit handbook with a 2013Guide & handbook completed for CC. 2013 Will be incorporated into the overall IT Audit Guide & Handbook in cooperation with IDI

2 What Is Cloud Computing? Generally speaking, cloud computing can be thought of as anything that involves delivering hosted services over the Internet. According to NIST Cloud computing is

a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (Special Publication 800-145) 3 What It Provides

Cloud computing provides shared services as opposed to local servers or storage resources Enables access to information from most web-enabled hardware Allows for cost savings reduced facility, hardware/software investments, support 4 Essential Characteristics On-demand self-service A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically

without requiring human interaction with each service provider. Broad network access Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Source: NIST Special Publication 800-145 5 Characteristics Resource pooling

The providers computing resources are pooled to serve multiple consumers Resources can be dynamically assigned and reassigned according to customer demand Customer generally may not care where the resources are physically located but should be aware of risks if they are located offshore Source: NIST Special Publication 800-145 6 Characteristics

Rapid elasticity Capabilities can be expanded or released automatically (i.e., more cpu power, or ability to handle additional users) To the customer this appears seamless, limitless, and responsive to their changing requirements Measured service Customers are charged for the services they use and the amounts There is a metering concept where customer resource usage can be

monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service Source: NIST Special Publication 800-145 7 Service Models Software/ Application Platform

Infrastructure 8 Service Models Infrastructure-as-a-Service (IaaS) A service model that involves outsourcing the basic infrastructure used to support operations--including storage, hardware, servers, and networking components. The service provider owns the infrastructure equipment and is responsible for housing, running, and maintaining it. The customer typically pays on a

per-use basis. The customer uses their own platform (Windows, Unix), and applications 9 Service Models Platform-as-a-Service (PaaS) A service model that involves outsourcing the basic infrastructure and platform (Windows, Unix)

PaaS facilitates deploying applications without the cost and complexity of buying and managing the underlying hardware and software where the applications are hosted. The customer uses their own applications 10

Service Models Software-as-a-Service (SaaS) Also referred to as software on demand, this service model involves outsourcing the infrastructure, platform, and software/applications. Typically, these services are available

to the customer for a fee, pay-as-yougo, or a no charge model. The customer accesses the applications over the internet. 11 Where Is My Data? Data resides on servers that the customer cannot physically access

Vendors may store data anywhere at lowest cost if not restrained by agreement 12 Cloud Computing Guide The guide is about a 10 page document that describes cloud computing and areas of risk These risks should be managed by the IT organization that chooses to utilize cloud computing For IT Auditors these risks are a roadmap which you can

utilize to create your audit program 13 Cloud Computing Guide 14 Cloud Computing Guide What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited entities still has control over the application and the data.

Outsourcing may also include utilizing the vendors computers to store, backup, and provide online access to the organization data. The organization will need to have a robust access to the internet if they want their staff or users to have ready access to the data or even the application that process the data. In the current environment, the data or applications are also available from mobile platforms (laptops with Wi-Fi or cell/mobile cards, smart phones, and tablets). 15 Cloud Computing Guide Audit Concerns When an organization chooses to utilize cloud computing, they need to

be aware of risks that they may face with the service provider, the risk they face if they are unable to effectively oversee the service provider, and other risks related to management and security weaknesses in the service providers approach. As an auditor you will need to understand what the agency has done to mitigate the risks with cloud computing. When we as auditors are asked to appraise whether an entity or organization getting the benefits of cloud computing are managing the vendor to ensure that they get the required services we need to be aware of the risks that they may face. 16 Cloud Computing Guide

Risk Areas Service Provider Risks Technical Risks External (Overseas) Risks Management/Oversight Risks Security / Connectivity / Privacy Risks

These were discussed at the last meeting along with some mitigation strategies that the IT organization could use The IT auditor would use those as a road map to frame audit questions 17 Cloud Computing Handbook The handbook provides the IT Auditor with some audit related questions that begin to explore whether the organization is managing the risks and the vendor 18

Cloud Computing Handbook 19 Cloud Computing Handbook 20 Cloud Computing Handbook 21 Next Steps

As and when members conduct IT Audits that involve Cloud Computing we would like to receive your audit questions so we may update the guide Members may contact the Chair or SAI USA for additional information 22 Contacts SAI India Jagbans Singh [email protected]

SAI USA Madhav Panwar [email protected] 23

Recently Viewed Presentations

  • HTML Markup and Document Structure

    HTML Markup and Document Structure

    A Doctor has many Patients and an Patient has many Doctors. A Magazine has many Subscribers and a Subscriber has many Magazines. Many-to-many relationships are implemented by introducing a third (join) table with two or three fields: A Foreign Key...
  • Oslo, Microsofts vision for the future of Modelling

    Oslo, Microsofts vision for the future of Modelling

    Declarative text-based Modelling language. Aimed at "curly-brace" programmers. Can be used to define models for repository database ""M" is to TSQL what C is to assembly" - Don Box "Quadrant" Modelling tool (only available on pdc pod) Graphical tool used...
  • Most Inspirational Quotes of the Week August 37-31, 2012

    Most Inspirational Quotes of the Week August 37-31, 2012

    Most Inspirational Quotes of the WeekAugust 27-31, 2012. Jake Benson. Kate Cranney. Julie Ackerson. Presly Bray. Anthony Baeza. Kaden Hardy. Nestor Chavez. Business
  • Machine Learning from Big Datasets

    Machine Learning from Big Datasets

    MF is like multiple-output multi-variable linear regression. ?1=?∙?1 ...
  • Contractual Commitments, Bargaining Power, and Governance ...

    Contractual Commitments, Bargaining Power, and Governance ...

    governance inseparability - " a condition in which a firm's past governance choices significantly influence the range and types of governance mechanisms that it can adopt in future periods." The basic behavioral assumptions of TCE (such as bounded rationality and...
  • Pro - Tar Sands

    Pro - Tar Sands

    Economic Benefits of Alberta Oil Sands. 136,000 Albertans are directly employed in the oil and gas sector, and will require more than 400,000 people in the next 25 years (CERI) Oil sands are forecasted by CERI (Canadian Energy Research Institute)...
  • Managing Money Managing Money: The Source of Money

    Managing Money Managing Money: The Source of Money

    Managing Money Managing Money: The Source of Money Problems Most money problems result from spending more than is available Managing Money: The Solution to Money Problems Don't spend more than you have Three Steps to Financial Independence Tell the truth...
  • Propellant stimulation tool for Mature Oil Wells in Meotian ...

    Propellant stimulation tool for Mature Oil Wells in Meotian ...

    The propellant stimulation tool technique, applied at Meotian III reservoir, has proven that this technique can offer a highly effective stimulation in these mature oil fields to improve in oil production. Additionally, its usage eliminates the need of conventional, separate...