SlideShare a Scribd company logo
1 of 13
Cloud Availability
Implications and Recommendations for
Corporate Governance, Vendors, and
Assurance Professionals
Agenda
1. Introduction
2. Business in the Cloud Environment
3. Availability- Risks and Implications
4. Recommendations for Risk Mitigation
5. Conclusion
1. Introduction
• No longer a trend, but a “landrush”
• Cloud revenue to reach $14.0M this year
• Many benefits, but also risks
• CEOs, CFOs CIOs have roles
– Budget
– Strategy planning
2. Business in the Cloud
• NIST categorizes cloud services as 3
categories:
– Software as a Service (eg. Salesforce)
– Platform as a Service (eg. Sun Microsystem)
– Infrastructure as a Service (eg. Microsoft SQL
Azure)
2. Business in the Cloud
• Many benefits:
– Lower capital expenditures
– Focus resources on core activities
– Attractive pricing model
– Scalable with demand
3. Availability
• Outages, downtimes
– Damaged reputation
– Lost revenue
3. Availability
• Amazon Web Services:
– 2011, 2012, Jan 2013 outages
– Human error, lightning storm
– 49 minutes downtime in 2013 = $5M lost
revenue
4. Recommendations
• 3 Levels:
– Corporate Governance
– Cloud Vendors
– Assurance Professionals
4. Recommendations
• Corporate governance:
– Business case reviews
– Risk Assessment
– Evaluate vendors/contracts (service-level
agreements)
– Test it out!
– Monitoring
– Continue disaster recovery
4. Recommendations
• Cloud vendors:
– System architecture
• Data redundance
• Virtualizatoin
• Load balancing
– Transparency
– Award programs/certifications
4. Recommendations
• Assurance professionals:
– Assist in standardization of cloud vendors
– Trust services
– No existing accreditation
– Existing control frameworks offer some
guidance:
• ISACA- ITAF
• COSO
• COBIT
4. Recommendations
• Assurance professionals:
– Cloud-specific framework needed for clear
guidance in:
• Trans-border information flow
• Certification
– Cloud Security Alliance attempting to bridge
gap
– Implications for financial audits
Conclusion
• Cloud computing comes with many
benefits but also risks
• Unavailable service can be costly
• Risk mitigation done by management and
vendors
• “Current issue”: lack of audit and control
frameworks

More Related Content

Similar to Cloud Availability (ACC 626 Slidecast)

C cloud organizational_impacts_big_data_on-prem_vs_off-premise_john_sing
C cloud organizational_impacts_big_data_on-prem_vs_off-premise_john_singC cloud organizational_impacts_big_data_on-prem_vs_off-premise_john_sing
C cloud organizational_impacts_big_data_on-prem_vs_off-premise_john_singJohn Sing
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Lss cloud computing a boon for smb-interop-2011
Lss cloud computing a boon for smb-interop-2011Lss cloud computing a boon for smb-interop-2011
Lss cloud computing a boon for smb-interop-2011L S Subramanian
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Steve Markey
 
Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)GICTTraining
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Frans van Leuven - The security aspects of Cloud Services
Frans van Leuven - The security aspects of Cloud ServicesFrans van Leuven - The security aspects of Cloud Services
Frans van Leuven - The security aspects of Cloud ServicesVNU Exhibitions Europe
 
Cloud computing arma_nnj
Cloud computing arma_nnjCloud computing arma_nnj
Cloud computing arma_nnjscm24
 
How to Realize the Benefits of Cloud Services Brokerage
How to Realize the Benefits of Cloud Services BrokerageHow to Realize the Benefits of Cloud Services Brokerage
How to Realize the Benefits of Cloud Services Brokeragejamcracker4677
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
 
Notes_from_a_clouds_security_journey
Notes_from_a_clouds_security_journeyNotes_from_a_clouds_security_journey
Notes_from_a_clouds_security_journeyOlivier Busolini
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...ptaglephd
 
Victor Chang: Cloud computing business framework
Victor Chang: Cloud computing business frameworkVictor Chang: Cloud computing business framework
Victor Chang: Cloud computing business frameworkCBOD ANR project U-PSUD
 
cloud economics - Toronto FSI Symposium - October 2016
cloud economics - Toronto FSI Symposium - October 2016cloud economics - Toronto FSI Symposium - October 2016
cloud economics - Toronto FSI Symposium - October 2016Amazon Web Services
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
 

Similar to Cloud Availability (ACC 626 Slidecast) (20)

C cloud organizational_impacts_big_data_on-prem_vs_off-premise_john_sing
C cloud organizational_impacts_big_data_on-prem_vs_off-premise_john_singC cloud organizational_impacts_big_data_on-prem_vs_off-premise_john_sing
C cloud organizational_impacts_big_data_on-prem_vs_off-premise_john_sing
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Lss cloud computing a boon for smb-interop-2011
Lss cloud computing a boon for smb-interop-2011Lss cloud computing a boon for smb-interop-2011
Lss cloud computing a boon for smb-interop-2011
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Frans van Leuven - The security aspects of Cloud Services
Frans van Leuven - The security aspects of Cloud ServicesFrans van Leuven - The security aspects of Cloud Services
Frans van Leuven - The security aspects of Cloud Services
 
Cloud computing arma_nnj
Cloud computing arma_nnjCloud computing arma_nnj
Cloud computing arma_nnj
 
How to Realize the Benefits of Cloud Services Brokerage
How to Realize the Benefits of Cloud Services BrokerageHow to Realize the Benefits of Cloud Services Brokerage
How to Realize the Benefits of Cloud Services Brokerage
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Notes_from_a_clouds_security_journey
Notes_from_a_clouds_security_journeyNotes_from_a_clouds_security_journey
Notes_from_a_clouds_security_journey
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
 
Victor Chang: Cloud computing business framework
Victor Chang: Cloud computing business frameworkVictor Chang: Cloud computing business framework
Victor Chang: Cloud computing business framework
 
cloud economics - Toronto FSI Symposium - October 2016
cloud economics - Toronto FSI Symposium - October 2016cloud economics - Toronto FSI Symposium - October 2016
cloud economics - Toronto FSI Symposium - October 2016
 
Forecast odcau3 100_posttech
Forecast odcau3 100_posttechForecast odcau3 100_posttech
Forecast odcau3 100_posttech
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Cloud Availability (ACC 626 Slidecast)

  • 1. Cloud Availability Implications and Recommendations for Corporate Governance, Vendors, and Assurance Professionals
  • 2. Agenda 1. Introduction 2. Business in the Cloud Environment 3. Availability- Risks and Implications 4. Recommendations for Risk Mitigation 5. Conclusion
  • 3. 1. Introduction • No longer a trend, but a “landrush” • Cloud revenue to reach $14.0M this year • Many benefits, but also risks • CEOs, CFOs CIOs have roles – Budget – Strategy planning
  • 4. 2. Business in the Cloud • NIST categorizes cloud services as 3 categories: – Software as a Service (eg. Salesforce) – Platform as a Service (eg. Sun Microsystem) – Infrastructure as a Service (eg. Microsoft SQL Azure)
  • 5. 2. Business in the Cloud • Many benefits: – Lower capital expenditures – Focus resources on core activities – Attractive pricing model – Scalable with demand
  • 6. 3. Availability • Outages, downtimes – Damaged reputation – Lost revenue
  • 7. 3. Availability • Amazon Web Services: – 2011, 2012, Jan 2013 outages – Human error, lightning storm – 49 minutes downtime in 2013 = $5M lost revenue
  • 8. 4. Recommendations • 3 Levels: – Corporate Governance – Cloud Vendors – Assurance Professionals
  • 9. 4. Recommendations • Corporate governance: – Business case reviews – Risk Assessment – Evaluate vendors/contracts (service-level agreements) – Test it out! – Monitoring – Continue disaster recovery
  • 10. 4. Recommendations • Cloud vendors: – System architecture • Data redundance • Virtualizatoin • Load balancing – Transparency – Award programs/certifications
  • 11. 4. Recommendations • Assurance professionals: – Assist in standardization of cloud vendors – Trust services – No existing accreditation – Existing control frameworks offer some guidance: • ISACA- ITAF • COSO • COBIT
  • 12. 4. Recommendations • Assurance professionals: – Cloud-specific framework needed for clear guidance in: • Trans-border information flow • Certification – Cloud Security Alliance attempting to bridge gap – Implications for financial audits
  • 13. Conclusion • Cloud computing comes with many benefits but also risks • Unavailable service can be costly • Risk mitigation done by management and vendors • “Current issue”: lack of audit and control frameworks

Editor's Notes

  1. Welcome to the slidecast titled Cloud AvailabilityImplications and Recommendations for Corporate Governance, Vendors, and Assurance ProfessionalsMy name is Henry Hsu, and this presentation is prepared as part of my research paper submission for the ACC 626 course at the University of Waterloo.
  2. As an overview of my presentation, I will start with background information of the cloud business environment, highlighting the benefits and risks through illustrating the implications of security failures with an emphasis on availability concerns. Then, mitigation of availability risks will be discussed at three levels: how corporate governance and management of the company receiving cloud services can mitigate risks internally, how cloud vendors can prevent security breaches and promote best practices, and how assurance professionals may be able to assist in providing trust services between vendors and customers in light of a current lack of frameworks and guidance.
  3. Doing business in the cloud is no longer a trend but could be described as a “land rush,” where Gartner Inc. has predicted that cloud computing revenue will reach $14.0 billion by the end of 2013. This is not surprisingocnsidering the many benefits the cloud service model offers to businesses, but the very model that conveys convenience through the Internet also carries many unique risks. These risks need to be considered by corporate executives as they budget and plan on outsourcing functions to cloud vendors.
  4. IT experts, such as those at the National Institute of Standards and Technology, generally classify the cloud services in to three categories: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS providers such as Salesforce.com offer a thin-client interface to use a specialized software, usually with multiple clients at the same time (“multi-tenancy”) and accessible on demand; PaaS such as Sun Microsystems offers a computing platform whereby database management and security functions can be carried out; IaaS such as Microsoft SQL Azure offers components such as processors, memory, network firewalls and storage capacity
  5. The value prop that cloud vendors offer business customers is resources that are dynamically scalable on-demand as needed, and this comes at lower initial capital investments, siginficant because IT represents on average 50% of capital budgets, allows businesses to focus their resources on core activities, potentailly offer cost savings since the user pays for only what they need and not excess capacity, and the services can be easily scaled upwards or downwards as needed.
  6. Moving to a cloud infrastrucutre doesn’t mean that the threats of outages, downtimes and ultimately lost revenue from using a traditional data centre have gone away . Downtimes of only a few hours, as I will demonstrate, can lead to losses in the thousands of dollars. This underlines the importance for firms to carefully evaluate the reliability of the vendor’s availability. Several notable examples of outages have already occurred. Although infrequent, when they do happen the consequences are significant.
  7. Amazon is one such vendor where there is abundant negative publicity. There were highly publicized outages in each of the last three years. The causes include both human error, as well as sever weather. The outage in 2013 of only 49 minutes represented approximately a $5.0M loss in revenue for Amazon. Amazon web services outage in 2012 affected major sites such as Netflix and Instagram. The Amazon examples demonstrate that even an otherwise solid infrastructure built by a reputable company can be prone to a single unpredictable act of nature, or a single act of human error within the highly automated environment.
  8. Risks of availability also include malware given the service is received through the Internet. Considering the risks and implications of service outages, clearly there needs for work done to ensure that enterprises subscribing to cloud services are getting what they’ve asked for.In the context of a cloud service arrangement, I have identified three levels at which the risk of unavailable service can be mitigated: internally the management and corporate governance of the user company, externally at the cloud vendors, and also through the use of assurance professionals.
  9. Management should conduct a thorough case review of a cloud service proposal, As with any investment decision, the opportunity cost of planning and deploying cloud services in relation to other existing investment opportunities need to be evaluated. The entity itself need to be assessed for readiness to use a cloud service including a review of existing busines processes and the competencies of the relevant individuals. The user entity should also carefully conduct a risk assessment, to identify data and applications that the business cannot afford to have rendered unavailable for even short periods of time.Assessing the reputation of the vendor is an area where certifications discussed later may be helpful. Additionally, management should carefully review and insist on a service level agremeent to gain protection and set mutual expectations. Setting the appropriate terms will be crucial in obtaining the protection it seeks. [perhaps add more]Testing out the cloud environment before commitments is also advisable. An ISACA white paper suggests that testing can be done at three layers ofcommunication: the Wide Area Network (WAN) that connects the customer to a “data communicationservice” such as an internet service provider, Local Area Network (LAN) which is the connection betweena data communication service and the data centre, and finally at the specific data centre’s performance. The SLA should also address monitoring requirements and determine which party will be responsible for monitoring, and also include right-to-audit clausesAgain, considering the risks and implications of unavailable service, relying solely on the vendor’s backup controls may not be wise. A recommendation would be to consider the vendor’s facilities as just another layer of redundancy.
  10. Given the inherent risk of failure existing inhardware components, the challenge of maintaining a large cloud infrastructure and delivering service aspromised lies in recovery from failure with no effect noticeable to the client. Being able to offer superb uptimescould be a way a vendor differentiates from competitors. To assist users with the unavailability concerns, vendors should implement key elements in to the infrastructure such as data-redundancy to allow uninterrupted service, virtualization to allow quick recovery, and load balancing to accommodate times of high usage.Having the proper infrastructure is not enough, the vendor also needs to work with its customers in a transparent manner in order to give them comfort they will deliver the services as promised. The previous discussion recommended managers to take an active role in monitoring and obtaining audit reports from cloud vendors is only possible if the vendor has open and transparent operations.Lastly, there are award programs that demonstrate the industry’s commitment to providing reliable service. Participating and matching its services offered to the standards of award winners will be a way for vendors to gain the trust of customers. Although there is currently little guidance for assurance professionals on providing attestations to cloudavailability, there is the speculation that in the near future audit reports similar in concept to SAS 70.
  11. Assurance professionals have a major opportunity to improve the confidence the business community has in cloud vendors. They can provide services for both cloud vendors and their customers over subject matters including verifying contractual claims, processing integrity, controls over security of information and compliance with the relevant regulations. Currently, there is a lack of such standards and if one can be developed, systems auditors can provide uniform assessments.Although there are existing frameworks, they offer limited guidance, and are not specific to challenges of the cloud environment. For example, ISACA’s ITAF includes a section that addresses outsourcing to third parties, while cross-referencing COBIT sections but it is not specific to a cloud vendor. Additionally, COSO released an exposure draft in December 2011 acknowledging evolving technology, but it doesn’t mention control policies, procedures or processes for risk management that relate to cloud computing
  12. Clearly, there is much work to be done in coming up with a useful framework.An ISACA white paper has called for a suitable cloud computing control framework to address issues in trans-border information flow, given that the Internet flows through multiple geographical jurisdictions, and also develop certification programs to help customers make an informed choice.One entity that has been established to bridge this gap between existing frameworks and the cloud model is the Cloud Security Alliance, but there is plenty of work to do in this area. Asides from trust services, financial statement audits will also change as businesses use cloud vendor modules that relate to financial reporting. The current audit standards are not yet up to date to reflect the emerging cloud technology. Existing guidance require auditors to understand business processes and internal controls, but are not specific enough to guide IT auditors in understanding the impact of cloud services on financial statements. Since understanding the entity’s control environment is a requirement for any audit, the profession clearly has a duty to acknowledge the emerging technology’s impact on the financial reporting process.
  13. To conclude, Cloud computing as an alternative computing model has proven to be attractive because of the cost saving and flexibility it confers. However, the risks and implications of outsourcing processes and entrusting data to a third party need to be evaluated.This slidecastdiscussed the benefits of cloud computing in relation to the risks (with an emphasis on service outages) which those in charge with corporate governance need to evaluate while considering outsourcing. Methods of improving availability of cloud services by mitigating risks are discussed, for both cloud vendors and their customers. The role of assurance professionals is discussed as they can provide trust services where cloud security is concerned, noting that there is substantial development to be done by IT control framework setters as well as assurance standards setters. Future work by the standard setters is called upon to develop frameworks that specifically address the dynamics of the cloud environment, acknowledging the cloud computing model’s impact on the business environment in both operations and financial reporting. Thank you for listening.