Cloud computing The role of Internal Audit Securities Industry and Financial Markets Association Agenda • • • • • • • • 1 Introductions What is Cloud computing Key attributes Key drivers Cloud security risks, threats, vulnerabilities Cloud maturity model Role of Internal Audit Q&A Cloud computing Cloud computing represents a major shift in information technology architecture, sourcing, and services delivery Cloud computing has emerged based on the convergence of Internet technologies, virtualization, and IT standardization. Network-based applications and data services, decoupled from enterprise data centers, has evolved into a growing "cloud" of software services and methods of computing. Industry analysts have defined capabilities and services offered by cloud computing to include three major qualities: • Abstracted hardware resources Software $15B–2012 Integration Platform Information Process “X-as-aService” Cloud Storage Security Infrastructure • Consumed as variable expense • Increased elastic capacity and capability 2 Testing Management /Governance Database Cloud computing architectures Cloud computing technology is deployed in three general types, based on the level of internal or external ownership and technical architectures 3 Vendor cloud (External) Cloud computing services from vendors that can be accessed across the Internet or a private network, using systems in one or more data centers, shared among multiple customers, with varying degrees of data privacy control. Sometimes called “public” cloud computing. Private cloud (Internal) Computing architectures modeled after vendor clouds, yet built, managed, and used internally by an enterprise; uses a shared services model with variable usage of a common pool of virtualized computing resources. Data is controlled within the enterprise. Hybrid cloud (Mixed) A mix of vendor cloud services, internal cloud computing architectures, and classic IT infrastructure, forming a hybrid model that uses the best-of-breed technologies to meet specific needs. Cloud computing architecture advantages and constraints The optimal cloud computing architecture depends on specific business needs, which can be met by different services capabilities, technology, and vendors Vendor cloud (external) • Quick startup time; limited to no capital investment required • Allows outsourcing of noncore functions to a service provider; yet enterprises may not be ready to turn over control of technical architecture • Leverage scalable vendor infrastructure. • Use a standardized software stack • Lower initial fees, variable costs, billed by usage; however, beware of vendor lock-in 4 Private cloud (internal) Hybrid cloud (mixed) • Quick startup and flexibility of resource allocation; requires capital investment • Quick startup, but integration of vendor and private cloud adds complexity • On-premise data and systems; allows direct support of governance and compliance, security, data privacy, etc; limited opportunities for reduction of staffing • Allows for better control of data and reduction of noncore focus that meets your requirements • Good choice when possible to leverage existing staff and investments; allows control of service levels and operational reporting • Cost savings through leveraging virtualization and grid technology to increase resource utilization and lower internal costs • Allows selection of scalable vendor infrastructure when needed; can allow internal control when required • Allows fine-grained sourcing of technology and cost profiles; integration may constrain savings potential Cloud computing services – X as a Service Different types of cloud computing services are grouped into specific categories: Infrastructure, Platform and Software services Infrastructure as a Service (IaaS) Software as a Service (SaaS) Definition Definition Definition • Delivers computer infrastructure, typically a platform virtualization environment as a service. Service is typically billed on a utility computing basis and amount of resources consumed. • Delivers a computing platform as a service. It facilitates deployment of applications while limiting or reducing the cost and complexity of buying and managing the underlying hardware and software layers • Delivers software as a service over the Internet, avoiding the need to install and run the application on the customer's own computers and simplifying maintenance and support. Customization • Customization where technology being deployed requires minimal configuration Operational Notes • Easier to migrate applications • User of cloud maintains a large portion of the technical staff (Developer, System Administrator, and DBA) 5 Platform as a Service (PaaS) Customization • Moderate customization - build applications within the constraints of the platform Operational Notes • Applications may require to be rewritten to meet the specifications of the vendor • User of the cloud maintains a development staff Customization • Limited customization – existing applications will not be able to migrate Operational Notes • Applications may require to be rewritten to meet the specifications of the vendor • User utilizes the vendors IT staff and has limited to no technical staff Sample services within the 3 categories of cloud computing There is an evolving “ecosystem” of services providers Infrastructure-as-a-Service: • Amazon Web Services – Provide on-demand cloud computing services using variable cost model • Amazon Virtual Private Cloud – Provide fully private cloud services model using the Amazon cloud infrastructure • Mozy.com – Provides backup services over the Internet Platform-as-a-Service: • Google Applications Engine – Allows Web applications to be deployed on Google’s architecture • Microsoft Windows Azure – Cloud Computing architecture that is offered to host .NET applications 6 Software-as-a-Service: • Customer Relationship Management – – – – salesforce.com myERP.com Oracle OnDemand RightNow • Business Intelligence – SAS Suite of On-Demand Applications – Vitria M3O • Human Resources – Oracle Peoplesoft – NetSuite ePayroll – Workday • Productivity and Collaboration – Gmail, Google Apps – Zoho.com Key attributes of Cloud computing Offsite IT resources are accessed from an offsite data center that is not owned by you; thus yielding in cost of ownership, licenses etc. Virtual Software stacks of databases, web servers, operating systems, storage, and networking are assembled virtually and accessed via the web On-demand Pay-per-use Simple Massive scale Use as needed, resources can be turned on or off quickly and as needed including storage capacity, data bases, web servers and operating systems Pay for what you need, not for unneeded capacity Resources can be configured quickly and easily, e.g. leading Cloud Computing platforms have open API’s Access to extremely large infrastructure that would be challenging to build as a single entity The use of Cloud Computing for storage capacity can be ideal, especially for spikes in usage. Because Storage capacity the use of the cloud entails low or no upfront capital cost and low ongoing operational costs, the ability to take advantage of pools of resources on demand in real-time can yield business advantage 7 Elasticity and resizability Ability to be highly flexible – nearly instantaneously – to changes in load. With Cloud Computing, an infrastructure supporting an application, business, or business process can be easily resized and rightsized, depending upon conditions Collaboration Shared environment, IT resources can be consolidated, many users share a common network, allowing costs to be managed Cloud computing – key drivers Globalization & Data Access Cost Pressures • Computing delivered as a borderless utility • Pay for what you use • Accessibility from anywhere via Internet • Repair & maintenance savings • Sharing made easier between disparate offices, remote workers and suppliers • Software and license purchase savings Data Access • Physical space savings Cost pressures Globalization Drivers Green IT • Cloud computing virtualization technology can migrate to where computing power is cheapest or energy is the greenest • Reduces companies consumption of energy and need for multiple data centers Global talent shortage Green IT • Less in-house IT staff required • Highly automated-easy/fast to deploy Availability Availability • 24X7 availability to applications & services from anywhere 8 Global Talent Shortage • Resilience achieved through ultraredundant architecture • Scalable services and applications • Increase in outsourcing to find talent in other countries Cloud computing - incentives to adopt Cloud computing is being driven by many urgent IT priorities: Reduce amounts of IT capital equipment spending • • • • Lower implementation costs compared to on-premise solutions Less hardware to purchase and support; few assets on the balance sheet Fewer IT resources required in-house Costs are treated as operating expense, not capital expenses Gain flexibility and speed in implementations • • • • Allows greater flexibility and shorter time to implementation Shift IT from supporting the infrastructure to innovating Software maintenance and upgrades may be handled by cloud providers Greater ability to flexibly respond to the business as needs change Leverage IT technology evolution • Rapidly changing technology standards and practices are driving enterprise to consider cloud computing as a viable alternative 9 Top cloud consideration & risks Considerations around moving IT components into the cloud: • What corporate security policies are in place? • What type of configuration management is used to protect against accidental changes that could negatively affect security? • How is data backed up? • How will availability objectives, recovery time objectives, and recovery point objectives be met? • How will disaster recovery testing occur and will clients have access to truthful results? • Who will have access to the data? • Where will the data be housed? • Will you have accessibility to the data for audits, etc.? • Consumer users – Privacy, data usage • Enterprise users – Encryption, data integrity • Service providers – Cross-border issues, regulations Security tops cloud concerns How concerned are you with following issues as they relate to cloud computing? 4.3 Security 3.8 Control 3.8 Performance 3.7 Support 3.7 Vendor lock-in 3.3 Speed to activate new services/expand capacity 3.3 Configurability 0 1 2 3 4 5 Data: InformationWeek Analytics Cloud Computing Survey of 453 business technology professionals A recent survey was conducted of 244 IT executives/CIOs about their companies’ use of, and views about, IT Cloud Services. Biggest Cloud Challenge reported was Security. 10 Risks and controls 1. SaaS controls 3. IaaS controls 5. Data management and storage controls 6. ACLs 7. Communication channels Governance 4. Virtualization controls 8. Supporting infrastructure End users, laptops, cell phones, etc. 11 7 Business processes, IT operational processes, information security 1 2. PaaS controls Data Data Data storage storage storage 5 Application Software as a Service (SaaS) Application 2 Application Platform as a Service (PaaS) Application Programming environment 6 Application Application Application Operating system Operating system Operating VIRTUAL system VIRTUAL computer VIRTUAL computer computer Application Application Application Operating system Operating system Operating VIRTUAL system 3 Infrastructure as a Service (IaaS) VIRTUAL computer VIRTUAL computer computer Virtualization 4 Supporting infrastructure (physical hardware, network devices) 8 Virtual layer Cloud supporting infrastructure Risks, Threats, Vulnerabilities (1/6) Security Category Availability Risks, Threats & Vulnerabilities Service Availability and Recoverability • Cloud provider may not be able to match in-house IT service availability, recovery time objectives (RTO), and recovery point objectives (RPO) • Cloud providers may drastically change business model or discontinue cloud services Complexity • Complexity introduced by cloud computing environment results in more pieces that can go wrong, and more complex recovery procedures Single-Points-of-Failure • Even if the cloud environment is architecturally designed for high-availability, singlepoints-of-failure may exist in the access path to the cloud Data Replication • Due to technical architecture complexity and potentially restrictions by the cloud provider, replicating data back to the enterprise or to another provider may be difficult Testing Constraints • Due to concerns about confidentiality and impact to other customers, cloud providers may place heavy constraints on disaster recovery testing activities Over-Subscription Risk • In the event of a disaster, other customers may receive higher priority in recovery activities • As cloud providers shift from investment mode to capture market share to cost cutting mode to reach profitability, capacity may become constrained 12 Risks, Threats, Vulnerabilities (2/6) Security Category Access Risks, Threats & Vulnerabilities Multi-Tenancy • Data is possibly exposed to 3rd parties due to lack of access controls on the cloud , allowing unauthenticated parties access to confidential data Data Access • Cloud stores data without proper customer segregation allowing possible disclosure to 3rd parties Secure Data Deletion • Company data that was deleted is still be retained on servers or storage located on the cloud without knowing 13 Risks, Threats, Vulnerabilities (3/6) Security Category Authentication Risks, Threats & Vulnerabilities External Authentication • Ownership and maintenance of credential repositories is the responsibility of an external party. Security leading practices cannot be guaranteed. Federated Authentication • Organizations implement single sign on applications used by multiple business partners but the SSO also grants access to sensitive internal information due to authentication mashups. Key Management • Any activity related to key generation, exchange, storage, safeguarding, use, vetting, and replacement that results in disclosure will provide access to infrastructure and data. Cloud to Cloud Authentication • One cloud provider will rely on a second cloud provider to authenticate a user’s identity based on the first cloud passing a SAML assertion to the second cloud at the request of a user. Based strictly on the assertion, the second cloud provider will grant the user access to cloud resources. SAML assertions are susceptible to the following attacks: DoS, Man-in-the-Middle, Replay, and Session Hijacking. 14 Risks, Threats, Vulnerabilities (4/6) Security Category Regulatory Risks, Threats & Vulnerabilities Audit Rights • Organizational Rights to perform audits, and review performance against contracts or SLA. Compliance • Migration to the cloud includes a more complex regulatory environment for some corporations. Integrity Shared Environments • Data in cloud is in a shared environment alongside data from other customers. Data Monitoring • Changes made to data without knowledge of the data owners, or accidental overwrites due to collisions with data storage techniques of cloud provider. Data Encryption • Data at rest is not encrypted and accessed by 3rd parties unknowingly due to faulty access controls 15 Risks, Threats, Vulnerabilities (5/6) Security Category Privacy Risks, Threats & Vulnerabilities Legal Uncertainties • Multiple jurisdictions increase regulatory complexity • Conflicting legal provisions create significant uncertainty in assessing compliance and risk • The Privacy and Data Protection legal landscape continues to evolve at a rapid pace • Data sharing agreements may be required before moving data to the cloud –Business associate agreements (HIPAA) –Data controllers and third parties (EU DPD) Individual Rights/Confidentiality • Strict terms of service are particularly important in the cloud to preserve individual privacy/confidentiality and to meet regulatory requirements to which the user is subject • The cloud facilitates the ability to use/share data across organizations and therefore increase secondary uses of data that may require additional consent/authorization • Data is easily accessible by a larger group of users and must be strictly controlled (Protect data at rest) Breach/Disclosure • Centralized data stores are especially prone to security breaches • Timely discovery and reporting of the breach by the cloud provider may be challenging 16 Risks, Threats, Vulnerabilities (6/6) Security Category Operational Security Risks, Threats & Vulnerabilities Vulnerability Management • One vulnerability has the potential to expose large number of corporations critical assets. Asset Management • Assets in the cloud are not properly managed and could leak critical company information or cause data exposures. Incident Response • Ownership, responsibilities, and actions during incident response are not defined. 17 Cloud computing maturity model Charting a migration path to a cloud computing service requires clear understanding of the maturity and viability of current cloud categories, as shown: Cloud computing maturity/viability High ~Software-as-a-Service for niche applications Functional viability ~Physical Infrastructureas-a-Service ~Application Components-as-a-Service ~Software-as-a-Service for Large Scale ERPs (e.g. ,SAP) ~Software Platform-as-a-Service ~Virtual Infrastructure-as-a-Service Low Immature Adoption maturity Mature Concerns about data security, data access, network latency, service levels, vendor lock-in, and service availability have inhibited the more rapid adoption of cloud computing. 18 Targeted approach to adopting cloud computing Enterprises should take on targeted pilot projects for specific services, and adopt a measured approach for adoption of cloud computing services Ease in Work with colleagues Specify services Learn from vendors Build hybrid Test clouds 19 Start experimenting with non–critical applications and services, such as test, development, or overflow capacity Leverage lessons from cloud computing use case from business colleagues; learn from their efforts Let the cloud vendors know your specific requirements, and request customization and specific services characteristics Learn from what the cloud vendors are doing to improve utilization and reusability of your internal infrastructure If you have datacenter resources, develop test clouds within your IT department to determine optimum hybrid models Role of Internal Audit (1/3) Internal Audit can play a role of strategic advisor and assist the business to understand and manage the risks associated with cloud computing Role of IA ►Understanding the business case ►Align requirements to the corporate policies and requirements ►Incomplete requirements ►Poorly designed business case ►Requirements are not aligned within corporate policies and requirements ►Vendor evaluation and selection ►Update business case ►Incomplete selection criteria Implementation ►Prioritization of migration ►Vendor contract ►Controls not considered ►Insecure design Test ►Select area to pilot ►Migrate areas to test cloud ►Non existent/ineffective controls ►Inadequate testing Migration ►Build infrastructure ►Migrate data and processes ►Inadvertent exposure of data ►Business processes don’t work as expected ►Decommission legacy systems ►SAS70, ISO ►Loss of financial records ►Loss due to inadequate monitoring Requirements Vendors Validate and Monitor 20 Risks Involved Role of Internal Audit (2/3) Sample support activities Identify control requirements • Scope – identify controls to be implemented • Value – IA can help the business understand and manage the risks and therefore support their business case Vendor selection support • Scope – support the evaluation of vendors and ensure balanced assessment • Value – manages the significant risk that the selected vendor will not be around tomorrow, internal technology won’t integrate, evidence of reliability Vendor management review • Scope – evaluate controls for managing vendor relationships (SLA’s/OLA’s), invoice review, escalation etc • Value – ensures that appropriate processes are in place to manage the significant new vendor relationship and maximize the value the company gets from it 21 Role of Internal Audit (3/3) Sample support activities Data migration assessment • Scope – assess planned data migration scope and method as well as future state data interface design • Value – helps the business and finance gain comfort around the plans for cut over from old new systems and for the completeness and accuracy of data transferred PMO / Project management assessment • Scope – review project management / PMO capabilities • Value – ensures processes are in place that can support managing this complex and high risk project to the greatest benefit in the shortest time Controls review / assessment / test • Scope – perform review of controls to be put in place, test controls and provide advice on improvement • Value – ensures IT and business have taken appropriate steps to mitigate implementation and business process risk that will arise as part of the implementation 22 Q&A 23 This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this presentation. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Copyright © 2010 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited
© Copyright 2026 Paperzz