Auditing Cloud Services

Slides:



Advertisements
Similar presentations
SERVICE LEVEL AGREEMENTS The Technical Contract Within the Master Agreement.
Advertisements

Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
Developing a Records & Information Retention & Disposition Program:
Performance Monitoring All All Contracts require basic monitoring once awarded. The Goal of contract monitoring is to ensure that the contract is satisfactorily.
Purpose of the Standards
Network security policy: best practices
Department of Economic Opportunity WelcomeTo Contract Review Form Training.
Internal Auditing and Outsourcing
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
A SOUND INVESTMENT IN SUCCESSFUL VR OUTCOMES FINANCIAL MANAGEMENT FINANCIAL MANAGEMENT.
Due Diligence - The Regulator’s Perspective ABA Telephone/Webcast Briefing August 14, 2001 Cynthia Bonnette, Assistant Director FDIC Bank Technology Group.
MnSCU Audit Reports Presentation to the MnSCU Audit Committee Office of the Legislative Auditor September 21, 2004.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Creating an Effective Policy Central Missouri Chapter Jesse Wilkins April 16, 2009.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
James Aiello PricewaterhouseCoopers Africa Utility Week 06 International Good Practice in Procurement.
Assistant VP of IT *Cloud Computing* Some Guidelines Kelly McDonald Dec. 8, 2011.
Why the Office of Compliance and Ethics was Created
Brette Kaplan, Esq. Erin Auerbach, Esq. Brustein & Manasevit, PLLC Spring Forum 2013
Webinar for FY 2011 i3 Grantees February 9, 2012 Fiscal Oversight of i3 Grants Erin McHughJames Evans, CPA, CGFM, CGMA Office of Innovation and Improvement.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Click on Next to continue Next Introductio n Inputs Tools and Techniques Outputs The process of managing procurement relationships, monitoring contract.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
1 PARCC Data Privacy & Security Policy December 2013.
Connecting for Health Common Framework: the Model Contract for Health Information Exchange Gerry Hinkley com July 18, 2006 Davis Wright.
0 Due Diligence Monitoring and Auditing of Third Party Vendors October 28, 2008 Pharmaceutical Regulatory and Compliance Congress and Best Practices Forum.
Introduction To Procurement Cards and Sales Tax Gregory L. Anderson.
Wisconsin Department of Health Services Purchase of Services Contract Guide Julie Anstett and Lucinda Champion Friday, May 6, 2016 Wisconsin Department.
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
An exposure to COMPLIANCE AUDIT By- Vishal Chawre DAG(A/c & VLC) O/o AG(A&E), Nagpur.
Incorporating Privacy Into Systems Development Methodology Phil Moleski Director Corporate Information Technology Branch Saskatchewan Health
ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM.
Compliance in practice: setting up a multinational joint venture Compliance – Challenges and opportunities for the legal profession October 29, UIA.
General Data Protection Regulation (EU 2016/679)
HR Policy Updates: Executive Summary
PCard Sensitive and Protected Information Procedures
Vendor Statements of Work: Your Role as an IT Professional
ISO/IEC
12.3 Control Procurements The process of managing procurement relationships, monitoring contract performance and making changes or corrections as needed.
Microsoft 365 Get help with regulatory compliance
Introduction to the Federal Defense Acquisition Regulation
Contract Review and Processing
2 Selecting a Healthcare Information System.
BYU-IDAHO Contracts, Negotiations & Signing Authority
Air Carrier Continuing Analysis and Surveillance System (CASS)
G.D.P.R General Data Protection Regulations
Disability Services Agencies Briefing On HIPAA
RECORDS AND INFORMATION
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Model Contract for Health
Welcome!.
Tips on Privacy Audits and Assessments Insurance Consumer Affairs Exchange October 2, 2005 Kirk Herath, CPO & Associate General Counsel, Nationwide Insurance.
Purchasing Contracts Training
Presentation to The Fourth National HIPAA Summit
Lesson 1  7 Basic Components of an Effective Compliance Plan
Roles and Responsibilities
Managing Federal grants
United Nations Voluntary Fund on Disability (UNVFD)
Roles and Responsibilities
GDPR PERSONDATAFORORDNINGEN I PRAKSIS
A JOINT PRESENTATION BY
The Freedom of Information and Data Protection Legislation An Overview
Briefing to the Portfolio Committee on Police Audit outcomes of the Police portfolio for the financial year 13 October 2015.
PERSONALLY IDENTIFIABLE INFORMATION: AUDIT CONSIDERATIONS
Radiopharmaceutical Production
SADC PPP Network PPPs in SADC
Presentation transcript:

Auditing Cloud Services Brian Daniels, CISA, GCFA David Crotts, CISA June 27, 2018

Overview Introduction to cloud services in a decentralized environment Audit perspective of cloud service risks Conducting the audit Outcomes Questions or comments

Introduction Why Utilize Cloud Services? Who Uses Cloud Services? How Can You Identify Cloud Service Implementations? What is Virginia Tech’s Cloud Service Environment Like? Introduction

Why Use Cloud Services Collaboration Need for excess storage Lack of resources to manage internally Cost effective

Who Uses Cloud Services Researchers IT Professionals Administrators Students Alumni EVERYONE!

How to Identify Cloud Services Request info from Central IT Request info from Departments Query technology related expenditures Account Codes MCC Unlikely to identify all

Control Environment at VT Departmental purchasing authority. Difficult to identify all purchases. Purchase records only show vendor, not product detail. What about free services? Mobile device apps?

Control Environment at VT Guidelines suggest reviews by: Central IT (Security, Network) Data Stewards Legal Counsel Is it realistic?

Risk Environment Risk Assessment Contract Risks Cloud Services Risks

Risk Environment Risks of outsourcing are similar to risks of operating internally . Additional risks exist when the system is outside of your control. Low cost/free services vs. high cost? How do you monitor these risks?

Risk Assessment A need has been identified. What could go wrong utilizing a cloud service provider? What is the worst possible outcome? What is a more likely outcome? What am I exposing myself to?

Risk Assessment What data elements will be utilized? Are there any regulatory requirements? FERPA HIPAA ITAR PCI PII

Risk Assessment What risks are significant enough to warrant special consideration in contract negotiations?

Contract Risks Who has signature authority? Click through agreements? Does the defined service adequately represent the identified need? How complete is the audit clause? Client access to audit vendor performance. Client access to review third party audits.

Contract Risks Does the agreement require acknowledgement of regulatory compliance? Who owns the data once it’s in the cloud?

Contract Risks What invokes the termination clause and what does it address? Access to data upon termination. Secure removal of data. Termination fees or waiver of fees. Responsibilities of each party upon termination.

Contract Risks Service Level Agreements Are they complete? Are they reasonable? What is the measurement period? What is the penalty for non-compliance?

Contract Risks Are the specific obligations explicitly stated in the contract? If not, where are they located? Policies, procedures, or privacy statements are typically subject to change without notice. Click through agreements may also change without notice.

Contract Risks Do the elements of the contract apply to any subcontracted vendors? Negotiation of appropriate contract terms is an effective means to reducing risk exposure. It is often not possible to get all desired terms and conditions in the contract.

Sampling Document Requests Audit Testing Conducting the audit

Sampling What factors exist in the population? Users Type of service Functional Use Cost

Sampling Select a cross section Single user to organization wide Application or storage Administrative, teaching, research High cost, low cost

Documentation Request Planning Documentation Risk assessments Steering committee minutes Product reviews Security reviews

Documentation Request Original and most recently executed contract. Most recent SLA performance review Most recent third party audit report Preferred report is the SOC 2 Type 2

Testing Risk assessment Centrally created questionnaire Only required for purchases greater than $2,000 Yes/No responses Developed in 2011

Testing Steering Committee Minutes No steering committee for most department specific purchases Expected for central systems purchases (i.e. email, business intelligence software)

Testing Security Reviews Performed on 4 of 5 services with a cost greater than $2,000 Not performed on smaller dollar purchases IT Security Office provides an opinion on the security architecture of the service Has resulted in corrective action by the vendor.

Testing Signature Authority Department and Central authorization OK Data steward review was often absent Based on the data utilized by the service Legal Counsel review was often absent

Testing Terms and Conditions Audit Clauses Termination agreements One audit clause gave the vendor the right to audit Virginia Tech! Termination agreements Beware of data retrieval and removal provisions Definition of adequate and robust SLAs

Testing Terms and Conditions Subcontractors Use of subcontractors permitted? Enforcement of parent contract to subcontractors? Regulatory compliance requirements? Personnel vetting?

Testing Contract Monitoring Periodic review of Terms and Conditions Still reflect current operating environment? What changes have occurred? SLA Performance Third party audit reviews Identified one subcontractor who had significant data breaches occur in 2009.

outcomes

Outcomes Risk assessment questionnaire Revised questions to target specific risks and help assess data elements used and need for ongoing monitoring. Expanded scope to include items under $2,000.

Outcomes Communication and Training Ensure adequate knowledge of the risks of outsourcing for department staff. Focus on training business staff and IT professionals.

Outcomes Assess the impact of restricting use of certain MCC codes on selected Pcard holders. Manage the risk at the point of procurement by limiting the number of people able to purchase such services.

Outcomes Establishment of preferred standard contract language. Joint effort led by IT Acquisitions in collaboration with Procurement, Legal Counsel, and Central IT.

Outcomes Processes and procedures designed to help manage and monitor contracts. Led by IT Acquisitions with input from Central IT or other administrative functions.

Questions or comments?