OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT
|
|
|
- Douglas Webster
- 10 years ago
- Views:
Transcription
1 County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor: Mady Cheng, CPA, CIA, CISA, MSBA Auditor II: Wasim Akand, MPA Report No. A March 2015
2 Intentionally Left Blank
3
4 INTRODUCTION Audit Objective Background The Office of Audits & Advisory Services (OAAS) completed an audit of Cloud Computing. The objective of the audit was to assess the cloud computing strategy and governance functions to ensure effective management processes, risk management practices, and monitoring of cloud provider performance. The cloud computing model is a method of procuring and deploying information technology (IT) resources and applications using only a network connection. According to the National Institute of Standards and Technology (NIST), 1 cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The NIST definition lists five essential characteristics of cloud computing, including on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, and measured service. The NIST also lists three "service models" (software, platform, and infrastructure), and four "deployment models" (private, community, public, and hybrid) that together categorize ways to deliver cloud services. The County of San Diego (County) utilizes a hybrid cloud approach. Primary uses of cloud computing within the County are for software as a service (SaaS) and/or infrastructure as a service (IaaS), in which applications, servers and storage are hosted in a cloud service provider (CSP) data center and where County data is processed and/or stored. In February 2013, the Cloud Review Committee (CRC), a subgroup of the IT Governance Group (ITGG), which is part of the County s IT governance hierarchy, established a governance framework over the acquisition of CSP services. The CRC is comprised of Group Information Technology Managers (GITMs) and County Technology Office (CTO) staff. The purpose of this Board is to review new cloud services requested by County departments, assess risk against established and agreed-to criteria and processes, and, if appropriate, make recommendations to the IT Management Committee (ITMC) for acceptance or rejection of those CSP requests considered high-risk. It is not the role of the CRC to manage the acquisition of cloud services, review or approve contract documents, or to monitor the service providers. These responsibilities are owned by Purchasing & Contracting (DPC), County Counsel, and the County departments acquiring the services. 1 NIST Special Publication , The NIST Definition of Cloud Computing, dated Sept
5 The CRC created a 2-Track Process to eliminate inconsistencies and streamline the CSP approval process, and to ensure that contract documentation is sufficient to pass certain technical reviews. The 2- Track process establishes separate approval procedures for new and renewed CSP contracts, depending on the risk level. For the CRC, risk under their purview is directly related to the nature of the data and the services to be provided. The CRC does not evaluate risk against the presence or absence of certain CSP contract provisions. Low risk CSPs must be approved only by the CRC, while high risk CSPs must be approved by both the CRC and the ITMC. All CSPs, regardless of procurement method, must be vetted through the 2-Track Process. Audit Scope & Limitations The scope of the audit included the County s IT governance structures, risk management practices, and monitoring processes over CSPs for fiscal year The CRC, DPC, County Counsel, and selected County departments were included in this assessment. Required CSP forms and approval processes, as documented in the CSP Request Procedure (CoSD-C001), were evaluated as of the control effective date of February This audit was conducted in conformance with the International Standards for the Professional Practice of Internal Auditing prescribed by the Institute of Internal Auditors as required by California Government Code, Section OAAS also based their assessment on recommended IT controls from the IT Governance Institute s Control Objectives for Information and related Technology (COBIT) framework 2 and the NIST SP Guide for Assessing the Security Controls in Federal Information Systems and Organizations. 3 Methodology OAAS performed the audit using the following methods: Reviewed IT control frameworks such as COBIT and NIST and best practices relating to cloud computing deployment. Reviewed the CTO Cloud Computing Strategy Recommendation Document, and CSP policies and procedures related to cloud computing governance and security. Interviewed the CRC and CTO management on processes and procedures relevant to CSP contract inventory maintenance and risk management practices. Reviewed IT Project Management Office (ITPMO) Cloud Service Provider List maintained by the CRC and interviewed County 2 COBIT is ISACA s framework for the management and governance of business-driven IT-based projects and operations. 3 NIST SP The NIST IT security controls standards contain a controls framework required to address cloud security. 2
6 department personnel to verify completeness and adequacy of the inventory. Judgmentally selected a sample of six CSP contracts from the ITPMO Cloud Service Provider List for detailed review. Sample selection was based on risk level (high, medium, low), cost of service, and cloud service type. Reviewed relevant documentation such as CSP contracts, terms of service, and service level agreements (SLA) 4 to determine if cloud service contracts defined CSP security and performance requirements. Interviewed County department personnel responsible for each sampled CSP contract to verify whether the department: Monitored CSP performance and security as outlined in contract and SLA. Obtained and reviewed third-party assessment reports, such as the American Institute of Certified Public Accountants (AICPA) Statement on Standards for Attestation Engagements (SSAE) 16 5 report, and/or security assurances, such as ISO Certification. 6 AUDIT RESULTS Summary Finding I: The County has made significant progress towards adopting cloud computing technologies; however, opportunities exist to further strengthen the IT governance framework over cloud computing. Improvement opportunities were identified in the areas of CSP contract management, monitoring of CSP performance, and CSP risk management. CSP Contract Terms Should Be Strengthened The CSP contracts sampled did not always address certain recommended key contract provisions including: Contractual Audit Rights Right-to-Audit Clause: Of the six contracts sampled, two did not include a right-to-audit clause, including one high risk contract. The right-to-audit clause ensures that the County has access to audit the CSP and verify the existence and effectiveness of controls specified in the CSP contract and associated SLA. 4 A service level agreement is a contract between a service provider and customer that specifies, in measurable terms, what services the provider will furnish. 5 SSAE 16 is a regulation created by the AICPA defines how service companies report on compliance controls. 6 ISO27001 Certification provides service provider security assurance. 3
7 COBIT recommends assess the status of external service providers internal controls. Confirm that controls comply with legal and regulatory requirements and contractual obligations. Without a right-to-audit clause included in the CSP contract, the County may not be able to obtain assurance that the vendor is in compliance with the contract or SLA if the need arises. Independent Third-Party Review and Security Certification: The CSP contracts for all six sampled CSPs did not include a requirement that CSPs periodically provide an independent third-party assessment, such as an SSAE 16 report or an ISO security certification. COBIT recommends that independent audit and assurance of the completeness and effectiveness of internal controls at the outsourced providers be obtained to confirm that agreed-on requirements are being adequately addressed. Failure to ensure appropriate internal controls at the CSP could result in higher costs, fines, service interruption, or unauthorized access to County data resulting in data loss or compromise. Service Level Agreements Two CSP contracts sampled did not include SLAs. Three other contracts that had SLAs defined did not specify penalties should CSP performance fall below required SLA thresholds. SLAs define, in measurable terms, the acceptable service levels to be provided by the CSP, service quality, and timeliness of services provided under the contract. SLAs provide the basis against which the County is able to manage service provider performance. COBIT recommends that SLAs should be defined and agreed to by the service provider and the customer for all critical IT services based on customer requirements. The County takes on increased risk if the contract does not hold the CSP accountable for substandard or non-performance based on the SLA requirements. The consequences to the County if an SLA is not met could seriously impact services provided by the County. Other than the SLAs defined in the IT Outsourcing Agreement, there was no other contract template or defined criteria for County departments to reference when reviewing CSP contracts to ensure that appropriate SLAs and other recommended contract provisions are included. When provided to Counsel; however, Counsel does review the agreements against certain County requirements (e.g., liability) to ensure adequate protections are in place. Without guidance on recommended provisions for inclusion in CSP contracts, the lack thereof in the contract terms and conditions may 4
8 increase the risk that cloud services will not meet County requirements potentially resulting in inadequately performing and unsecure or unavailable services. Recommendation: To improve management and oversight of cloud computing services, OAAS recommends that the CRC, together with DPC and County Counsel identify standard recommended contract provisions and key criteria and provide those to County departments when they are evaluating providers and reviewing subsequent CSP contracts and SLAs. This will help ensure that the departments procuring the services are aware of these recommended provisions in their CSP agreements and understand and accept the risks should they decide not to include them. At a minimum, the following provisions should be addressed by the departments: 1. A right-to-audit clause that allows the County to conduct specific security and internal control audits at a CSP location that cannot be restricted or curtailed by the CSP. 2. An annual independent third-party assessment and/or security certification provided to the County upon request. County departments should ensure that: a. The CSP contract commits to an annual security certification such as ISO and/or an annual independent third-party audit such as an SSAE 16. b. The third-party assessment provided by the CSP includes a description of the IT controls in place at the CSP and an assessment of the design; operating effectiveness of the controls; and CSP follow-up action plans to address issues reported. 3. Specific, measurable, and enforceable SLA performance and availability requirements and thresholds are defined in the contract and include defined penalties should CSP performance fall below required SLA thresholds. The CRC, in its role, should ensure that departments are apprised of the need for the above, consider them in their evaluation of the CSP, and, if the department determines that any of the provisions are not needed, that decision by the department is documented and maintained in the records of the CRC. Finding II: CRC Documentation of Risk Management Practices Can Be Strengthened Although the CRC performs an informal risk assessment for each procured cloud service, there is no risk assessment document produced to evidence the risks identified, the results of the assessment, 5
9 or agreed upon mitigating controls that address and manage the risks identified. Effective risk management requires that CSP contracts address how contractor and subcontractor performance will be managed and security, privacy, and data management requirements will be met. COBIT recommends that risk relating to a suppliers ability to continually provide secure, efficient, and effective service delivery should be identified and managed. Relevant data that could play a significant role in the management of IT risk should be recorded and an inventory of known risk and the control activities maintained to manage risk. Without a documented risk assessment, it may be difficult to determine if all risks have been identified, appropriate actions taken to mitigate the risks or evidence of County management approval of action plans to address risks. County data may be at risk of being hosted by a CSP with inadequate controls over data security, availability, integrity, confidentiality and privacy. Recommendation: The CRC review and approval process for CSP contracts should include documenting identified risks and agreed upon mitigating controls established by the CSP vendor and subcontractors, and approved by department management. 6
10 DEPARTMENT S RESPONSE 7
11 8
12 9
OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT Chief of Audits: Juan R. Perez Senior Audit Manager:
OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia, CISA, CRISC Senior
COMPUTER OPERATIONS - BACKUP AND RESTORATION
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES COMPUTER OPERATIONS - BACKUP AND RESTORATION FINAL AUDIT REPORT Chief of Audits: Julie Nieminski, CPA, CIA, CFE, CISA, MPA
OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia,
OFFICE OF AUDITS & ADVISORY SERVICES IT DISASTER RECOVERY AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES IT DISASTER RECOVERY AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
COMPUTER OPERATIONS AUDIT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES COMPUTER OPERATIONS AUDIT FINAL AUDIT REPORT Chief of Audits: James L. Pelletier, CIA, CICA IT Audit Manager: Lynne Prizzia,
OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT. County of San Diego Auditor and Controller
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA,
Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services
O F F I C E O F IN S P E C TO R GENERAL Audit Report 2014-IT-C-016 Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services September 30, 2014 B O A R D O F G O V E R
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
Management of Cloud Computing Contracts and Environment
Management of Cloud Computing Contracts and Environment Audit Report Report Number IT-AR-14-009 September 4, 2014 Cloud computing contracts did not comply with Postal Service standards. Background The
OFFICE OF AUDITS & ADVISORY SERVICES BEHAVIORAL HEALTH SERVICES CONTRACT MONITORING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES BEHAVIORAL HEALTH SERVICES CONTRACT MONITORING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Laura R.
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Vendor Management Best Practices
23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion
IT Insights. Managing Third Party Technology Risk
IT Insights Managing Third Party Technology Risk According to a recent study by the Institute of Internal Auditors, more than 65 percent of organizations rely heavily on third parties, yet most allocate
The Elephant in the Room: What s the Buzz Around Cloud Computing?
The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton
Specific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
Auditing Cloud Computing and Outsourced Operations
Session 136 Auditing Cloud Computing and Outsourced Operations Monday, May 7, 2012 3:30 PM 5:00 PM Mike Schiller Director of Sales & Marketing IT, Texas Instruments Co Author, IT Auditing: Using Controls
9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania
Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of
Cloud Computing Thunder and Lightning on Your Horizon?
Cloud Computing Thunder and Lightning on Your Horizon? Overview As organizations automate more and more of their manual processes, the Internet is increasingly becoming an important tool in the delivery
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
INFORMATION SECURITY Humboldt State University
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY Humboldt State University Audit Report 14-50 October 30, 2014 EXECUTIVE SUMMARY OBJECTIVE The objectives of
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
Cloud Computing Risk Assessment
Cloud Computing Risk Assessment A Case Study Sailesh Gadia, CISA, ACA, CPA, CIPP, is a director/senior manager at KPMG s advisory practice in Minneapolis, Minnesota, USA. He has an extensive background
Clinical Trials in the Cloud: A New Paradigm?
Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS Jeff Cook November 2015 Summary Service Organization Control (SOC) reports (formerly SAS 70 or
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies
IT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
Cloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased
Manage Third Party Information Technology Services
Manage Third Party Information Technology Services City of Tulsa Internal Auditing June 2013 MANAGE THIRD PARTY INFORMATION TECHNOLOGY SERVICES City of Tulsa Internal Auditing Ron Maxwell, CIA, CFE Chief
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive
INFORMATION SECURITY California Maritime Academy
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
STATE OF NORTH CAROLINA
STATE OF NORTH CAROLINA PERFORMANCE AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES STATE TERM CONTRACT FOR MICROCOMPUTERS AND PERIPHERALS JULY 2013 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE
Hans Bos Microsoft Nederland. [email protected]
Hans Bos Microsoft Nederland Email: Twitter: [email protected] @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Auditing Cloud Computing and Outsourced Operations
14 CHAPTER Auditing Cloud Computing and Outsourced Operations In this chapter, we will discuss key controls to look for when you are auditing IT operations that have been outsourced to external companies,
Refresher on cloud computing
Refresher on cloud computing Cloud computing is a form of outsourcing where the organization outsources data processing to computers owned by the vendor. Outsourcing may also include utilizing the vendor
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
Cloud Computing A NIST Perspective & Beyond. Robert Bohn, PhD Advanced Network Technologies Division
Cloud Computing A NIST Perspective & Beyond Robert Bohn, PhD Advanced Network Technologies Division ISACA National Capital Area Chapter Arlington, VA, USA 17 March 2015 Cloud Program Overview Launch &
Pharma CloudAdoption. and Qualification Trends
Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for
CFPB Readiness Series: Compliant Vendor Management Overview
CFPB Readiness Series: Compliant Vendor Management Overview Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must be tailored to the
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
Information for Management of a Service Organization
Information for Management of a Service Organization Copyright 2011 American Institute of Certified Public Accountants, Inc. New York, NY 10036-8775 All rights reserved. For information about the procedure
NSW Government. Data Centre & Cloud Readiness Assessment Services Standard. v1.0. June 2015
NSW Government Data Centre & Cloud Readiness Assessment Services Standard v1.0 June 2015 ICT Services Office of Finance & Services McKell Building 2-24 Rawson Place SYDNEY NSW 2000 [email protected]
CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance
United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
Federal Aviation Administration. efast. Cloud Computing Services. 25 October 2012. Federal Aviation Administration
efast Cloud Computing Services 25 October 2012 1 Bottom Line Up Front The FAA Cloud Computing Vision released in 2012 identified the agency's road map to meet the Cloud First Policy efast must provide
Data Privacy, Security, and Risk Management in the Cloud
Data Privacy, Security, and Risk Management in the Cloud Diana S. Hare, Associate General Counsel and Chief Privacy Counsel, Drexel University David W. Opderbeck, Counsel, Gibbons P.C. Robin Rosenberg,
10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015
10 Considerations for a Cloud Procurement Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015 www.lbmctech.com [email protected] Purpose: Cloud computing provides public sector organizations
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB
Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service
Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing
Cloud Computing An Internal Audit Perspective Institute of Internal Auditors Topeka Chapter
Cloud Computing An Internal Audit Perspective Institute of Internal Auditors Topeka Chapter Bernard Wieger, Partner Cassie Meschke, Senior Manager December 6, 2011 Discussion Agenda Introduction to cloud
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Healthcare Payment Processing: Managing Data Security and Privacy Risks
Moderator: Linda A. Malek Chair, Healthcare Moses & Singer LLP Healthcare Payment Processing: Managing Data Security and Privacy Risks Thursday, September 13, 2012 Panelists: Beth L. Rubin Senior Counsel
[SUBPART 239.99 CLOUD COMPUTING (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.
Attachment #1 [SUBPART 239.99 CLOUD COMPUTING (DEVIATION 2015-O0011) 239.9900 Scope of subpart. (DEVIATION 2015-O0011) Prescribes policies and procedures for the acquisition of cloud computing services.
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region
Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
Information Technology: This Year s Hot Issue - Cloud Computing
Information Technology: This Year s Hot Issue - Cloud Computing Presented by: Alan Sutin Global IP & Technology Practice Group GREENBERG TRAURIG, LLP ATTORNEYS AT LAW WWW.GTLAW.COM 2011. All rights reserved.
Cloud Computing: Background, Risks and Audit Recommendations
Cloud Computing: Background, Risks and Audit Recommendations October 30, 2014 Table of Contents Cloud Computing: Overview 3 Multiple Models of Cloud Computing 11 Deployment Models 16 Considerations For
Customer-Facing Information Security Policy
Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: 03/23/2015 Symantec Corporation Table of Contents Compliance Framework... 1 High-Level Information Security
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
