2. Governance and Enterprise risk management - DONE Flashcards
• Tools of Cloud Governance • Enterprise Risk Management in the Cloud • Effects of Various Service and Deployment Models • Cloud Risk Trade-offs and Tools
What is governance?
Includes the policy, process, and internal controls that direct how an organization is run; it includes everything from structures and policies to leadership and other mechanisms for management. You can consider governance as assigning directive controls. The policies to be implemented will often be built from the corporate mission statement and will address the laws, regulations, and standards faced by a company that must be followed in order to continue operations. Governance relies on the compliance function to ensure that directives are being followed throughout the enterprise
What is enterprise risk management?
Includes managing overall risk for the organization, aligned with the organization’s governance and risk tolerance. Enterprise risk management (ERM) includes all areas of risk, not merely those concerned with technology.
What is information risk security?
Addresses managing risk to information, including information technology (IT). Organizations face all sorts of risks, from financial to physical, and information is only one of multiple assets an organization needs to manage. If you work in IT, you are likely most acquainted with this area of risk management.
What is information security?
Includes the tools and practices used to manage risk to information. Information security isn’t the be-all and end-all of managing information risks; policies, contracts, insurance, and other mechanisms also have roles to play (including physical security for nondigital information). However, a—if not the—primary role of information security is to provide the processes and controls required to protect electronic information and the systems we use to access it.
What is the only time governance won’t be altered by the cloud?
the only time that governance won’t be altered as a result of using the cloud is a scenario in which your own people have implemented automation and orchestration software in your own data centre and your company fully manages it like any other system in your data centre today.
What is the primary issue to remember about governing cloud computing?
although an organization can outsource responsibility (authority over actions) for governance, a company can never outsource liability, even when using external providers. As such, the organization will always retain accountability (liability for actions, or lack of actions) if anything goes wrong. This is always true, with or without the cloud
With some cloud providers having more than a million customers, it is simply impossible for providers to give every customer everything they need from the contract, service level agreement, and security control perspectives.
What is the solution?
providers will supply customers with extremely standardized services (including contracts and service level agreements) that are consistent for all customers.
Governance models cannot necessarily treat cloud providers the same way they’d treat dedicated external service providers, such as co-location or web hosting providers, which typically customize their offerings, including custom contracts, background screening of employees, and legal agreements, for each client.
so how can we go about choosing a cloud provider?
The contract between the customer and the provider will identify the responsibilities and mechanisms for governance; the customer needs to understand both and identify any process gaps. If a gap is identified, the customer needs to adjust their own processes to close the gap or accept the associated risks.
Governance gaps don’t necessarily exclude using the provider. If you excluded every provider that didn’t completely address everything you needed, you’d find yourself unable to use any provider. Identifying gaps and addressing them is the CSA way to address governance challenges.
Describe the following tool of governance:
Contracts
The contract is the number one tool of governance. The legally binding contract agreement is your only “guarantee” of any level of service or commitment. Simply put, if it’s not in the contract, it doesn’t exist.
If the provider breaks the terms of the contract or doesn’t fulfil the terms of a service level agreement, you’re looking at a legal dispute.
contracts define the relationship between providers and customers, and they are the primary tool for customers to extend governance to their suppliers.
What does a contract include?
Terms and Conditions - This is the main document that describes aspects of the service, how customer data will be used, termination clauses, warranties, applicable laws etc.
Acceptable Use Policy - This states what you can and cannot do when consuming the service.
Services Terms - This contains service-specific contractual agreements by the provider.
Service Level Agreements - This details items such as availability uptime commitments and penalties for not meeting those commitments. Quite often, the penalties to the provider for failing to meet monthly service level agreements (such as 99.9 per cent availability) take the form of extra service credits—and the customer usually needs to submit a claim and show evidence of unavailability.
Clauses Based on Your Subscription and/or Renewal - These would be specific legal agreements based on your particular subscription. With cloud services, the commitments from a provider to the customer are largely based on the customer’s subscription level. Consider an extreme example: a free version of a product may have clauses that state that the provider can access your usage data, while the paid version doesn’t allow the provider to access your data.
Describe the following tool of governance:
Cloud provider assessments
Assessment is part of the due diligence a customer must perform in advance of using a cloud provider. The assessment should leverage all available information, ranging from contract reviews to provider-supplied audit reports and reviews of technical documentation of the system. Technical assessments may be limited by the provider (for example, no physical access because of security concerns).
How the provider supplies technical documentation is up to them: they may post detailed information online, or they may make it available only in person at their offices for your review.
Aside from a technology perspective, most supplier assessments are performed as part of a cloud provider’s assessment. Assessed items generally include financial viability, history, feature offerings, third-party attestations, feedback from peers, and so on.
Describe the following tool of governance:
Compliance Reporting
Two simple words summarize this governance tool—standards and scope.
Leading cloud providers will spend vast sums of money to ensure that they can promote compliance with a wide multitude of standards.
All of the standards have one issue in common, the scope of the engagement. Take, for example, the scope of the ISO/IEC audit could be only the IT department. Where does that leave you if you’re looking for a cloud provider with the ISO/IEC certification that you want to use to make your provider selection decisions? It leads you to understand that “merely being “certified” doesn’t mean anything if the service you are consuming is not within the scope of the audit.
What are some popular standards that providers often promote:
*NIST 800-53 - This control set is part of the bigger NIST Risk Management Framework. If you work for a government agency, this is likely the control set that you are most familiar with.
*FedRAMP - The Federal Risk and Authorization Management Program tailors the NIST 800-53 control set for cloud services. Providers must be FedRAMP authorized (known as an Authority to Operate, or ATO) to offer their services to the US government.
*ISO/IEC 27017 - The “code of practice for information security controls based on ISO/IEC 27002 for cloud services” standard is essentially the control set from ISO 27002, tailored for cloud services.
*COBIT - The Control Objectives for Information and Related Technology (yeesh!) is a governance and risk management framework owned by ISACA. its focus is on enterprise governance and management of IT, not just security. it’s brought up in the guidance and it’s a mapping in the CCM.
*PCI - The Payment Card Industry and its Data Security Standard (DSS) is a very popular industry standard because of penalties associated with noncompliance. Just a note on this one: A provider being “PCI compliant” does not mean your applications are automatically “PCI compliant.” This is a perfect example of the shared responsibility of all cloud models, and you will need to assess your applications if they are part of the PCI cardholder data environment.
*HIPAA - The Health Insurance Portability and Accountability Act is US public law that requires data privacy and security provisions for safeguarding medical information. It is not cloud-specific, but it does apply to the cloud if medical information is stored in a cloud environment.”
What is System and Organization Controls (SOC)
“is used by the vast majority of service providers to report on controls at a service organization. The SOC report is generated by an independent CPA and is available from the provider via a nondisclosure agreement (NDA). Although multiple report types are available (SOC 1, SOC 2, SOC 3), these “reports are based on the AICPA Statements on Standards for Attestation Engagements 18 (SSAE 18) (previously SSAE 16) standard.
providers aren’t forced to use a standard like SOC reporting or ISO to supply third-party assessment of controls. They could offer you a self-assessment they created that is based on a standard such as the CCM and CAIQ or they may even allow potential clients to perform their own audits—but this is rare
What are the different levels of SOC
*SOC 1 This SOC report is used for Internal Control over Financial Reporting (ICFR) and is used for entities that audit financial statements.
*SOC 2 This SOC report is titled “Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy.” It deals with ensuring that controls at an organization are relevant for security, availability, and processing integrity of systems.
*SOC 3 This publicly available high-level SOC report contains a statement from an independent CPA that a SOC engagement was performed, plus the high-level result of the assessment (for example, it could indicate that the vendor statement of security controls in place is accurate).