SlideShare a Scribd company logo
1 of 18
Auditing in Cloud Computing




SYSTEMATIC THOUGHT LEADERSHIP FOR INNOVATIVE BUSINESS



Jonathan Sinclair
SAP Research, CEC Belfast
SAP (UK) Ltd.

25th March 2010
Agenda




  1. Background
         1.1          Cloud Computing
         1.2          IT Auditing
  2.     Why do Business’ care?
  3.     Traditional view
  4.     Services: The New Delivery Model
  5.     Current Auditing Areas & Problems
  6.     Challenges for Auditing in Cloud




© SAP 2010 / Page 2
Cloud Computing
  a definition framework
   Compliance, Governance, Regulation, Security, Risk




                                                        Reference: “Rational Survivability Blog”. Chris Hoff. http://www.rationalsurvivability.com/blog/?p=519

© SAP 2010 / Page 3
IT Auditing
  setting the scene
 Definition of IT Auditing
 The process of collecting and evaluating evidence to determine whether a computer
 system (information system) safeguards assets, maintains data integrity, achieves
 organizational goals effectively and consumes resources efficiently.
                                                 Definition: Information Systems Control and Audit, Ron Weber


                                      • PCI DSS
                      Financial and   • Gramm-Leach-Bliley Act (US)
                       Commerce
                                      • Sarbanes–Oxley (SOX)
                       Social and     • SAS70
                        Labour        • HIPAA

                                      • EU Directive on Data Security
                      Public Safety   • Data Protection Act (UK)
                                      • Federal Information Security Act (US)

                                      • ISO 27k (International Standards
                        Security        Organisation)



© SAP 2010 / Page 4
Why do Business’ care?


   Auditing for Compliance

 Regulation: A principle, rule, or law designed to control or govern conduct


                                            Legal




                        Co-
                                                               Social
                      operative

                                         Regulation




                                  Self                Market


© SAP 2010 / Page 5
Why do Business’ care?


   Auditing for Governance and Risk

 IT Governance is concerned with how the performance and risk of an IT landscape is
 administered.

                                             Processes




                      Institutions                                  Customs


                                            Governance




                                     Laws                Policies



© SAP 2010 / Page 6
Why do Business’ care?


   Auditing for Security

 IT Security in Cloud is mainly concerned with data access and user privileges, in both
 the physical and virtual layers.

                                        Technical




                       Admin          Security            Physical




                                         Virtual


© SAP 2010 / Page 7
Past
  deep dive
                         User
                             Access Rights
                             Policies
                             Reporting, Logging

                         Network
                             VPN, Firewall, Intrusion Detection
                             Event Logging

                         Application
                             User Privileges
                             Logging (Access, Transactions, Change Management)


                         DB
                             User Privileges
                             Security Policies (Password Encryption, Data Encryption)
                             Logging (Access, Record Management)
                             Data Replication




© SAP 2010 / Page 8
Auditing was hard but now :


   1:1 mapping doesn’t exist anymore

    •     Ex: VMs, Virtual Landscapes, etc..

   What typically used to be static is not anymore

    • Ex: Dynamic change of IP, domain, Datacenter, server etc.

   Audit Analysis – Data Storm problem

    • How to retrieve, correlate and extract meaningful data from a ever increasing
      number of data sources.
    • Tracking change becomes a priority

   Auditing is becoming a service

    • Consumers may need to track the Business Processes across multiples providers,
      an audit trail may span multiple domains


© SAP 2010 / Page 9
Services: The New Delivery Model



                                      • License model
                                      • Customization required
                  Past    Software    • Managed by customer:
                                        • customer buys application.
                         as Product


                                      • Pay per use / Subscription model
                                      • Remote delivery
           Present        Software    • Managed by service provider:
                                        • customer buys access to application
                         as Service


                                      • Composite Services
                                      • Business-process-focused
             Future      Business     • Services provisioned by service provider:
                                        • customer buys a service with no awareness of application.
                         Services



© SAP 2010 / Page 10
Present
  deep dive




                                             (taken from 2006 JavaOne Conference | Session TS-1591)



      Business Continuity
                      Contract of BC Procedures
                      Disaster Recovery Procedures
                      Permissions of External Services
                      Logging (Access, Data Management)


© SAP 2010 / Page 11
Future?
  outlook
                       Adapted from (Chris Hoff - Draft v4.0)




© SAP 2010 / Page 12
Data Confidentiality, Privacy, Integrity


  Problems:
  •  Data stored, transmitted and processed outside of the organisation
  •  Shared computing environments
  •  No physical control of data
  •  Physical and logical access managed by the provider
  •  No controls to prevent data modification
  •  No logging events on data (access, modification, transmission)

  Implementation Challenges:
  •  Data logging and monitoring
  •  Separation of user directories and access control
  •  Data security (encryption, key management, digital signatures)
  •  Access control & reviews (firewalls, VPN)
  •  Data Isolation
  •  Define standards (information classification, encryption)
  •  Procedural reviews (redundancy, error recovery)




© SAP 2010 / Page 13
Service Availability


  Problems:
  Network connectivity
     Bottlenecking
     Multi-tenancy
     Availability
  Limited ability for change control
  Provider viability
  Reliance on provider’s disaster recovery procedures

  Implementation Challenges:
  Caching to address potential network issues
  SLAs
     ISP Network Availability
  Change Control Process
  Multiple Providers
  Data Retrieval Process




© SAP 2010 / Page 14
Regulations and Compliance


  Problems:
  Data subject to new laws
  Exposure to foreign governments and subpoenas
  Retention requirements vary among jurisdictions
  Audit of provider’s environment
  Increased complexity to comply with standards

  Implementation Challenges
  Storage and transmission policies for jurisdictions
  Agreement for privacy laws
  Provider security certifications
  External Audit review
  Limit types of data transmission




© SAP 2010 / Page 15
Problems arising from Cloud for Auditing

                                                              Compliance,
                                              IT Auditing     Governance,
                                                              Regulation,
                                                             Security & Risk




                                Application                   Change              Patch
    Licensing          SLAs                   Networking                                      Fraud
                                 Controls                   Management         Management




                                                                                 Privacy      Identity       Access




                                         Outsourcing                                 Compensation
                       Assurance
                                                            Prevention
                                                                                                      Business
                              Management
                                                   Improve                        Assess              Continuity
             Responsibility                      Performance                     Deficiency

                               Risk
                                                      Regulation
© SAP 2010 / Page 16
Challenges for Auditing in Cloud




           Federation of
                            Architecture
            audit logs                       Compliance      Audit-based
                           and protocols
               from                          analysis of      access of
                             for storage
            distributed                       federated       physical /
                            and retrieval
             sources                        audit logs for     network-
                              of secure
              across                          SLA’s and         based
                             distributed
             multiples                       Regulation       resources
                              audit logs
             domains




© SAP 2010 / Page 17
Thank you!

                       Jonathan Sinclair
                       Research Associate
                       SAP Research CEC Belfast

                       SAP [UK] Ltd
                       The Concourse, Queen‘s Road
                       Queen‘s Island, Titanic Quarter
                       Belfast BT3 9DT

                       T +44 (0)28 9078 5749
                       F +44 (0)28 9078 5777
                       E jonathan.sinclair@sap.com
                       www.sap.com/research




© SAP 2010 / Page 18

More Related Content

What's hot

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
Iam presentation
Iam presentationIam presentation
Iam presentationAWS UG PK
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to SecurityDr. Ahmed Al Zaidy
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Introduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerIntroduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerAmazon Web Services
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Edureka!
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Introducing AWS Certificate Manager Private Certificate Authority (CA) - AWS ...
Introducing AWS Certificate Manager Private Certificate Authority (CA) - AWS ...Introducing AWS Certificate Manager Private Certificate Authority (CA) - AWS ...
Introducing AWS Certificate Manager Private Certificate Authority (CA) - AWS ...Amazon Web Services
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingJithin Parakka
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdfPencilData
 
Too Many Tools - How AWS Systems Manager Bridges Operational Models
Too Many Tools - How AWS Systems Manager Bridges Operational ModelsToo Many Tools - How AWS Systems Manager Bridges Operational Models
Too Many Tools - How AWS Systems Manager Bridges Operational ModelsAmazon Web Services
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 

What's hot (20)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Chapter 1 Introduction to Security
Chapter 1 Introduction to SecurityChapter 1 Introduction to Security
Chapter 1 Introduction to Security
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Introduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerIntroduction to AWS Secrets Manager
Introduction to AWS Secrets Manager
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Cloud Migration Workshop
Cloud Migration WorkshopCloud Migration Workshop
Cloud Migration Workshop
 
Introducing AWS Certificate Manager Private Certificate Authority (CA) - AWS ...
Introducing AWS Certificate Manager Private Certificate Authority (CA) - AWS ...Introducing AWS Certificate Manager Private Certificate Authority (CA) - AWS ...
Introducing AWS Certificate Manager Private Certificate Authority (CA) - AWS ...
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdf
 
Too Many Tools - How AWS Systems Manager Bridges Operational Models
Too Many Tools - How AWS Systems Manager Bridges Operational ModelsToo Many Tools - How AWS Systems Manager Bridges Operational Models
Too Many Tools - How AWS Systems Manager Bridges Operational Models
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 

Viewers also liked

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudnexgentech15
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Jonathan Sinclair
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageMustaq Syed
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
POLICY MAKING PROCESS
POLICY MAKING PROCESSPOLICY MAKING PROCESS
POLICY MAKING PROCESSYammie Daud
 
The [social] future of public financial management
The [social] future of public financial managementThe [social] future of public financial management
The [social] future of public financial managementFreeBalance
 
thwackCamp 2013: Leveraging the Power of Custom Properties
thwackCamp 2013: Leveraging the Power of Custom PropertiesthwackCamp 2013: Leveraging the Power of Custom Properties
thwackCamp 2013: Leveraging the Power of Custom PropertiesSolarWinds
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
 
Financial Systems Design Framework
Financial Systems Design FrameworkFinancial Systems Design Framework
Financial Systems Design FrameworkIFMR
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersMichael Davis
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...Nexgen Technology
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditingvmshimavm
 

Viewers also liked (20)

Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Sample of Minutes of meeting
Sample of Minutes of meetingSample of Minutes of meeting
Sample of Minutes of meeting
 
POLICY MAKING PROCESS
POLICY MAKING PROCESSPOLICY MAKING PROCESS
POLICY MAKING PROCESS
 
Review_2013
Review_2013Review_2013
Review_2013
 
The [social] future of public financial management
The [social] future of public financial managementThe [social] future of public financial management
The [social] future of public financial management
 
Towards Indicators of Strength of Public Management Systems
Towards Indicators of Strength of Public Management SystemsTowards Indicators of Strength of Public Management Systems
Towards Indicators of Strength of Public Management Systems
 
thwackCamp 2013: Leveraging the Power of Custom Properties
thwackCamp 2013: Leveraging the Power of Custom PropertiesthwackCamp 2013: Leveraging the Power of Custom Properties
thwackCamp 2013: Leveraging the Power of Custom Properties
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Financial Systems Design Framework
Financial Systems Design FrameworkFinancial Systems Design Framework
Financial Systems Design Framework
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 
Privacy preserving public auditing
Privacy preserving public auditingPrivacy preserving public auditing
Privacy preserving public auditing
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 

Similar to Cloud Auditing

SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011Satish Hemachandran
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise CloudIndu Kodukula
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
Introduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source FrameworkIntroduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source FrameworkThanachart Numnonda
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide shareSunera
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1Khazret Sapenov
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudVISI
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011IBM Sverige
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloudInterop
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAsAdvisorAssist, LLC
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking
 
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropPCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropIBM Danmark
 

Similar to Cloud Auditing (20)

SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise Cloud
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Introduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source FrameworkIntroduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source Framework
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk Consulting
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide share
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the Cloud
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
 
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropPCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat Wardrop
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Cloud Auditing

  • 1. Auditing in Cloud Computing SYSTEMATIC THOUGHT LEADERSHIP FOR INNOVATIVE BUSINESS Jonathan Sinclair SAP Research, CEC Belfast SAP (UK) Ltd. 25th March 2010
  • 2. Agenda 1. Background 1.1 Cloud Computing 1.2 IT Auditing 2. Why do Business’ care? 3. Traditional view 4. Services: The New Delivery Model 5. Current Auditing Areas & Problems 6. Challenges for Auditing in Cloud © SAP 2010 / Page 2
  • 3. Cloud Computing a definition framework Compliance, Governance, Regulation, Security, Risk Reference: “Rational Survivability Blog”. Chris Hoff. http://www.rationalsurvivability.com/blog/?p=519 © SAP 2010 / Page 3
  • 4. IT Auditing setting the scene Definition of IT Auditing The process of collecting and evaluating evidence to determine whether a computer system (information system) safeguards assets, maintains data integrity, achieves organizational goals effectively and consumes resources efficiently. Definition: Information Systems Control and Audit, Ron Weber • PCI DSS Financial and • Gramm-Leach-Bliley Act (US) Commerce • Sarbanes–Oxley (SOX) Social and • SAS70 Labour • HIPAA • EU Directive on Data Security Public Safety • Data Protection Act (UK) • Federal Information Security Act (US) • ISO 27k (International Standards Security Organisation) © SAP 2010 / Page 4
  • 5. Why do Business’ care? Auditing for Compliance Regulation: A principle, rule, or law designed to control or govern conduct Legal Co- Social operative Regulation Self Market © SAP 2010 / Page 5
  • 6. Why do Business’ care? Auditing for Governance and Risk IT Governance is concerned with how the performance and risk of an IT landscape is administered. Processes Institutions Customs Governance Laws Policies © SAP 2010 / Page 6
  • 7. Why do Business’ care? Auditing for Security IT Security in Cloud is mainly concerned with data access and user privileges, in both the physical and virtual layers. Technical Admin Security Physical Virtual © SAP 2010 / Page 7
  • 8. Past deep dive  User  Access Rights  Policies  Reporting, Logging  Network  VPN, Firewall, Intrusion Detection  Event Logging  Application  User Privileges  Logging (Access, Transactions, Change Management)  DB  User Privileges  Security Policies (Password Encryption, Data Encryption)  Logging (Access, Record Management)  Data Replication © SAP 2010 / Page 8
  • 9. Auditing was hard but now : 1:1 mapping doesn’t exist anymore • Ex: VMs, Virtual Landscapes, etc.. What typically used to be static is not anymore • Ex: Dynamic change of IP, domain, Datacenter, server etc. Audit Analysis – Data Storm problem • How to retrieve, correlate and extract meaningful data from a ever increasing number of data sources. • Tracking change becomes a priority Auditing is becoming a service • Consumers may need to track the Business Processes across multiples providers, an audit trail may span multiple domains © SAP 2010 / Page 9
  • 10. Services: The New Delivery Model • License model • Customization required Past Software • Managed by customer: • customer buys application. as Product • Pay per use / Subscription model • Remote delivery Present Software • Managed by service provider: • customer buys access to application as Service • Composite Services • Business-process-focused Future Business • Services provisioned by service provider: • customer buys a service with no awareness of application. Services © SAP 2010 / Page 10
  • 11. Present deep dive (taken from 2006 JavaOne Conference | Session TS-1591)  Business Continuity  Contract of BC Procedures  Disaster Recovery Procedures  Permissions of External Services  Logging (Access, Data Management) © SAP 2010 / Page 11
  • 12. Future? outlook Adapted from (Chris Hoff - Draft v4.0) © SAP 2010 / Page 12
  • 13. Data Confidentiality, Privacy, Integrity Problems: • Data stored, transmitted and processed outside of the organisation • Shared computing environments • No physical control of data • Physical and logical access managed by the provider • No controls to prevent data modification • No logging events on data (access, modification, transmission) Implementation Challenges: • Data logging and monitoring • Separation of user directories and access control • Data security (encryption, key management, digital signatures) • Access control & reviews (firewalls, VPN) • Data Isolation • Define standards (information classification, encryption) • Procedural reviews (redundancy, error recovery) © SAP 2010 / Page 13
  • 14. Service Availability Problems: Network connectivity Bottlenecking Multi-tenancy Availability Limited ability for change control Provider viability Reliance on provider’s disaster recovery procedures Implementation Challenges: Caching to address potential network issues SLAs ISP Network Availability Change Control Process Multiple Providers Data Retrieval Process © SAP 2010 / Page 14
  • 15. Regulations and Compliance Problems: Data subject to new laws Exposure to foreign governments and subpoenas Retention requirements vary among jurisdictions Audit of provider’s environment Increased complexity to comply with standards Implementation Challenges Storage and transmission policies for jurisdictions Agreement for privacy laws Provider security certifications External Audit review Limit types of data transmission © SAP 2010 / Page 15
  • 16. Problems arising from Cloud for Auditing Compliance, IT Auditing Governance, Regulation, Security & Risk Application Change Patch Licensing SLAs Networking Fraud Controls Management Management Privacy Identity Access Outsourcing Compensation Assurance Prevention Business Management Improve Assess Continuity Responsibility Performance Deficiency Risk Regulation © SAP 2010 / Page 16
  • 17. Challenges for Auditing in Cloud Federation of Architecture audit logs Compliance Audit-based and protocols from analysis of access of for storage distributed federated physical / and retrieval sources audit logs for network- of secure across SLA’s and based distributed multiples Regulation resources audit logs domains © SAP 2010 / Page 17
  • 18. Thank you! Jonathan Sinclair Research Associate SAP Research CEC Belfast SAP [UK] Ltd The Concourse, Queen‘s Road Queen‘s Island, Titanic Quarter Belfast BT3 9DT T +44 (0)28 9078 5749 F +44 (0)28 9078 5777 E jonathan.sinclair@sap.com www.sap.com/research © SAP 2010 / Page 18