Managing the risks associated with cloud computing By Mike Small, CEng, FBCS, CITP. A recent survey by KuppingerCole showed that cloud security issues (84.4 percent) and cloud privacy and compliance issues (84.9 percent) are the major inhibitors preventing organizations from moving to a private cloud. But are the fears justified? Can an organization trust an IT service provided through the cloud? Using a cloud service means moving from a ‘hands on’ management model to one of indirect governance. How can an organization use an indirect governance to assure trust in the service provided? The answer can be found in the old Russian maxim, which was often quoted by US President Ronald Regan: “trust but verify.” Risks
Using the cloud may outsource the IT service but it does not outsource responsibility. The cloud user remains responsible for the security of their information and for the continuity of their enterprise. When moving to the cloud, it is essential that steps are taken to manage these risks. Manage risk through understanding needs
Assurance frameworks
However, a survey by ENISA of SLAs across EU Public Sector in Dec 2011 showed that, while 60-70 percent of respondents had adopted standards like ISO27001 and ITIL for internally produced IT services, only 22 percent required external IT providers to adhere to the same standards. COBIT: IT control objectives for cloud computing Independent auditing and certification SOC Reports: The auditing standard SSAE no. 16 (Statement on Standards for Attestation Engagements) is intended to satisfy the need for independent checking of service organizations. This is based on International Standard on Assurance Engagements no. 3402, Assurance Reports on Controls at a Service Organization. Using these standards, an auditor can examine a service and produce a report. This report is based on the statement of the service that the organization claims to provide. Note: This is not an assessment against best practice. The auditor examines how the service is performed and the controls the organization has in place. The auditor is able to produce two types of reports (often referred to as SOC 1 and SOC 2 reports):
An example of a cloud provider that offers such a report is Amazon Web Services. WebTrust/SysTrust: As mentioned above, one kind of auditor’s report on service organizations is based on what the service provider states that they offer and not an assessment against best practice. It is also possible for a service organization to obtain an auditor’s report based on established criteria (e.g., Trust Services). Trust Services (including WebTrust and SysTrust) are a set of professional assurance and advisory services based on a common framework to address the risks and opportunities of IT. The Trust Services Principles and Criteria were established by the AICPA for use when providing attestation services on systems in the areas of:
For each of these areas, these principles provide criteria and illustrative controls. An example of a cloud provider that offers such a report is SalesForce.com. ISO/IEC 27001 Certification: ISO/IEC 27001 sets out standards that require management to examine the information security risks associated with a specific part of the organization’s assets. (Note: Certification is limited to the specified area within the organization). The objectives of this process are to ensure confidentiality, integrity and availability of information. The process must consider the vulnerabilities, threats and their potential impact, and plan a response to the identified risks. This response may be to avoid the risk, to transfer the risk or to implement a set of controls to manage the risks. The standard identifies 134 controls and provides detailed advice on this subject. These controls cover the following areas:
A complete list of organizations certified to ISO/IEC 27001:2005 is available. An example of cloud a provider offering ISO27001 certification is Microsoft. Conclusion Author Mike Small will provide a presentation on this subject at the RSA Europe conference in London at session GRC-301 on October 11th, 2012. •Date: 27th Sept 2012 • UK/World •Type: Article • Topic: Cloud computing
|
To submit news stories to Continuity Central, e-mail the editor. Want an RSS newsfeed for your website? Click here |
||||||||