Welcome!

Containers Expo Blog Authors: Liz McMillan, Pat Romanski, Yeshim Deniz, Elizabeth White, Zakia Bouachraoui

Related Topics: Cloud Security, @CloudExpo

Cloud Security: Article

A Service Auditor’s Letter to the Cloud

As an auditor (and former auditee), I will never be complacent about cloud security

SAS 70 Solutions Session at Cloud Expo

Dear Cloud:

Hello! Can you hear me? I know you can. Yes, yes...no one likes an auditor and I am even worse. I am that CPA who spent the last decade working in information security, both as a security consultant and as someone who managed the product lines of a global managed services business. So whether or not you want to open up those big APIs of yours and listen to me, this is what I have to say...

I know who you are and where you live.

Your name is "the cloud." I will admit that you are the catchiest IT buzzword since Java. Although you claim to live in the gated community called Web 2.0, I know better. You actually live in an unmarked windowless datacenter, with complex networks, servers, applications, policies, contracts, and worst of all, people!

You are unique, just like everyone else.

Your predecessors, such as the ASP, SaaS, and MSSP providers, have been providing customers with a vast array of multi-tenant solutions using the same underlying technology we now call "the cloud" for over a decade. I know because I was responsible for a managed security platform and your shared architecture model was our only path to profitability. From where I am standing, you look a lot like your predecessors, the only major exception being the amount of publicity you get from technology marketers as well as the security community as evidenced by the RSA Security Conference a few weeks ago.

You can be audited.

I have never met a technology that could not be audited...and you aren't going to be the first. Although I believe that many of my traditional methods are sufficient to gauge your control environment, my auditor and security friends are feverishly issuing new methods for assessing you. With time, there will be an army of IT auditors who will find very little about you to be "cloudy."

Like it or not... SAS 70 is the most widely adopted approach for Cloud Assurance

You know I work for a SAS 70 audit company. I do not claim independence on this matter. But lacking independence does not inherently make me wrong. You will also agree that there is no generally accepted standard for auditing you.

Contrary to what the security consultants tell you, Statement on Auditing Standard (SAS) No. 70 is not a weak security standard. It is not a security standard at all! It contains no mention of encryption, network segmentation, or password settings. It is, in fact, an auditing standard. Rather than attempt to tell you what to do, the standard tells you how to describe your services and related controls and tells me how I should test that description for the purposes of issuing results and an opinion. Security topics are normally included in the scope of SAS 70 audits (the extent of which is up to you, cloud), but security is not the primary objective of the audit. My security consulting friends continue to give themselves heartburn over this misconception.

What about the others standards and certifications?

ISO 27001 certification is sometimes mentioned as an alternative. However, with less than 100 certified companies in the United States, this certification has yet to hit mainstream service providers. Make no mistake, aligning with ISO 27001 and ISO 27002 will be both comprehensive and resource intensive. Vendor-specific certifications and seals are great for their specified purposes, but you must remember that they are focused on gauging compliance with static criteria. Such standards are prone to miss the forest for the trees and will disregard worthwhile controls beyond those contemplated by the standard.

PCI cannot provide cloud assurance either as it has a very specific application for providers who process or store credit card data. It is also a prescriptive standard, well liked by the security community but prone to the same cost issues as the ISO 27001/2 standards, which is why providers work so hard to reduce their card data footprints. The good news is that you can incorporate those commodity controls (such as physical security, access control, etc.) for PCI and other such standards into the SAS 70 audit scope such that if you have a comprehensive set of controls, you can potentially save significant time and assessment fees.

Why is SAS 70 more adopted than the others? One, it can adapt to your environment without excessive compliance cost that your end customers have not shown a willingness to share. In addition, it has utility. Only the SAS 70 audit can be leveraged for the purposes of customer assurance, financial auditor, Sarbanes Oxley compliance, regulators, and more. Last and unlike other assessments, the SAS 70 audit is regulated by both law and professional standards, so don't believe for a second that this is an easy undertaking for someone who maintains a CPA license along with CISSP, QSA, and other certifications!

There is always room for improvement.

As an auditor (and former auditee), I will never be complacent about cloud security. I was very excited about the Cloud Security Alliance announcement of the cloud controls matrix at RSA and anxiously await its release. I am also an active participant with Chris Hoff in the newly formed CloudAudit group. Even the AICPA and ISACA are working to make strides by updating their standards and modernizing with offerings such as WebTrust and SysTrust and an update to SAS 70 (SSAE 16), which also includes an international counterpart (ISAE 3402).

You see Cloud, it is unlikely that I will write any new standards, but I will contribute to groups that are focused on harnessing your potential (and addressing your risks). Most important, my day-to-day efforts will be focused on helping my clients understand, improve, and communicate the state of their internal controls to whoever needs to know and all within the bounds of economic reasonableness.

In the meantime, see you at 20,000 feet!

Yours Truly,

Doug

P.S. Want to discuss cloud assurance? Come find us at the 5th International Cloud Computing Expo in New York City. We will be at the SAS 70 Solutions booth in the exhibit hall and I am also presenting "Cloud Computing? There's an Audit for That!" on the Hot Topics! track (http://cloudcomputingexpo.com/event/session/768). Come by the booth or the presentation to register for a drawing for $200+ gift cards from Apple, American Express and more!

More Stories By Douglas Barbin

Doug Barbin is a Director at SAS 70 Solutions, a company that provides assurance and technology compliances services with an emphasis on SAS 70 audits, PCI validation, and ISO 27001/2 compliance. After starting his career with a "Big 4" global accounting firm, Doug has spent the last ten years working in the trenches of a wide variety of information security topics, and thus, understands the perspective of both the security consultant and the managed services / SaaS provider. Prior to joining SAS 70 Solutions, Barbin was Director of Product Management for VeriSign's Managed Security Services business, where he was responsible for the MSS "SaaS" platform architecture and compliance (including overseeing the conduct of the SAS 70 audit, PCI validation, and other types of compliance assessments). Prior to that, Doug was in charge of VeriSign's western US security consulting practice, where among other projects, he led some of the prototype PCI assessments. He has BS degrees in Accounting and Criminal Justice from Penn State University and an MBA from Pepperdine University.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...