SlideShare a Scribd company logo
Cloud computing usa
2
2
2010 WGITA approved the cloud computing project with SAI USA
as lead and Canada & India as members
2011 A status report was presented and comments solicited
2012 Final project description and common cloud computing risks
were presented
Members requested that this work be augmented with a
cloud computing guide and audit handbook
2013Guide & handbook completed for CC.
2013 Will be incorporated into the overall IT Audit Guide & Handbook
in cooperation with IDI
 Generally speaking, cloud computing
can be thought of as anything that
involves delivering hosted services
over the Internet.
 According to NIST Cloud computing
is a model for enabling
ubiquitous, convenient, on-
demand network access to a
shared pool of configurable
computing resources (e.g.,
networks, servers, storage,
applications, and services) that
can be rapidly provisioned and
released with minimal
management effort or service
provider interaction. (Special
Publication 800-145)
3
3
 Cloud computing provides shared services as
opposed to local servers or storage resources
 Enables access to information from most
web-enabled hardware
 Allows for cost savings – reduced facility,
hardware/software investments, support
4
4
 On-demand self-service
A consumer can unilaterally provision computing
capabilities, such as server time and network storage, as
needed automatically without requiring human
interaction with each service provider.
 Broad network access
Capabilities are available over the network and accessed
through standard mechanisms that promote use by
heterogeneous thin or thick client platforms (e.g.,
mobile phones, tablets, laptops, and workstations).
Source: NIST Special Publication 800-145
5
5
 Resource pooling
The provider’s computing resources are pooled to serve
multiple consumers
Resources can be dynamically assigned and reassigned
according to customer demand
Customer generally may not care where the resources
are physically located but should be aware of risks if
they are located offshore
Source: NIST Special Publication 800-145
6
6
 Rapid elasticity
Capabilities can be expanded or released
automatically (i.e., more cpu power, or ability to handle
additional users)
To the customer this appears seamless, limitless, and
responsive to their changing requirements
 Measured service
Customers are charged for the services they use and the
amounts
There is a metering concept where customer resource
usage can be monitored, controlled, and reported,
providing transparency for both the provider and consumer
of the utilized service
Source: NIST Special Publication 800-145
7
7
Infrastructure
Platform
Software/
Application
8
8
Infrastructure-as-a-Service (IaaS)
 A service model that involves outsourcing the
basic infrastructure used to support
operations--including storage, hardware,
servers, and networking components.
 The service provider owns the infrastructure
equipment and is responsible for housing,
running, and maintaining it. The customer
typically pays on a per-use basis.
 The customer uses their own platform
(Windows, Unix), and applications
9
9
Platform-as-a-Service (PaaS)
 A service model that involves
outsourcing the basic infrastructure and
platform (Windows, Unix)
 PaaS facilitates deploying applications
without the cost and complexity of
buying and managing the underlying
hardware and software where the
applications are hosted.
 The customer uses their own
applications
10
10
Software-as-a-Service (SaaS)
 Also referred to as “software on
demand,” this service model
involves outsourcing the
infrastructure, platform, and
software/applications.
 Typically, these services are
available to the customer for a fee,
pay-as-you-go, or a no charge
model.
 The customer accesses the
applications over the internet.
11
11
 Data resides on servers
that the customer
cannot physically
access
 Vendors may store
data anywhere at
lowest cost if not
restrained by
agreement
12
12
13
13
The guide is about a 10 page document that describes
cloud computing and areas of risk
These risks should be managed by the IT organization
that chooses to utilize cloud computing
For IT Auditors these risks are a roadmap which you can
utilize to create your audit program
14
14
What is Cloud Computing?
  Cloud computing is where the organization outsources data
processing to computers owned by the vendor. Primarily the
vendor hosts the equipment while the audited entities still has
control over the application and the data. Outsourcing may also
include utilizing the vendor’s computers to store, backup, and
provide online access to the organization data. The organization
will need to have a robust access to the internet if they want
their staff or users to have ready access to the data or even the
application that process the data. In the current environment,
the data or applications are also available from mobile platforms
(laptops with Wi-Fi or cell/mobile cards, smart phones, and
tablets).
15
15
Audit Concerns
When an organization chooses to utilize cloud computing,
they need to be aware of risks that they may face with the
service provider, the risk they face if they are unable to
effectively oversee the service provider, and other risks
related to management and security weaknesses in the
service providers approach. As an auditor you will need to
understand what the agency has done to mitigate the risks
with cloud computing. When we as auditors are asked to
appraise whether an entity or organization getting the
benefits of cloud computing are managing the vendor to
ensure that they get the required services we need to be
aware of the risks that they may face.
16
16
 Risk Areas
 Service Provider Risks
 Technical Risks
 External (Overseas) Risks
 Management/Oversight Risks
 Security / Connectivity / Privacy Risks
These were discussed at the last meeting along with some
mitigation
strategies that the IT organization could use
The IT auditor would use those as a road map to frame audit
questions
17
17
 The handbook provides the IT Auditor with
some audit related questions that begin to
explore whether the organization is
managing the risks and the vendor
18
18
19
19
20
20
21
21
 As and when members conduct IT Audits that
involve Cloud Computing we would like to
receive your audit questions so we may
update the guide
 Members may contact the Chair or SAI USA
for additional information
22
22
 niharika India
 niharika cse
Madhav Panwar
panwarm@gao.gov
23
23

More Related Content

PDF
downtime_solution_sheet
PPT
Ahearn Cloud Presentation
PDF
UMA as Authorization mechanism for IoT: a healthcare scenario
PDF
Smart and Secure Healthcare Administration over Cloud Environment
PPTX
Cloud Computing
PDF
Cloud computing applications for e health
PDF
Dit yvol3iss44
PPTX
Cloud computing in healthcare
downtime_solution_sheet
Ahearn Cloud Presentation
UMA as Authorization mechanism for IoT: a healthcare scenario
Smart and Secure Healthcare Administration over Cloud Environment
Cloud Computing
Cloud computing applications for e health
Dit yvol3iss44
Cloud computing in healthcare

What's hot (19)

PDF
Cloud Computing in Healthcare IT
PPT
Presentation the internet of things - are organizations ready for a multi-tr...
PDF
HL7 Releases FHIR 4 - Highlights, Impact and More
PDF
Redefining Business Mobility and Customer Experience
PPTX
Impact of cloud computing on health industry
PPT
Taking Healthcare to the Cloud
PPTX
Data Governance for End-User Computing
PPT
Securing Apps & Data in the Cloud by Spyders & Netskope
PDF
End-user computing is not a trend, it's a transformational shift
PDF
Top 5 Healthcare Highlights from Apple WWDC 2019
PDF
Cloud computing in healthcare
PDF
IRDAI - NHA Joint Working Group: Sub Group on IT
PPTX
Cloud computing contracts
DOCX
MODERNIZATION OF NTUC INCOME
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
PDF
WHITE PAPER▶ Insecurity in the Internet of Things
PDF
Network barometer report 2014
PPTX
GridWorks SOS
PDF
Healthcare in the Clouds
Cloud Computing in Healthcare IT
Presentation the internet of things - are organizations ready for a multi-tr...
HL7 Releases FHIR 4 - Highlights, Impact and More
Redefining Business Mobility and Customer Experience
Impact of cloud computing on health industry
Taking Healthcare to the Cloud
Data Governance for End-User Computing
Securing Apps & Data in the Cloud by Spyders & Netskope
End-user computing is not a trend, it's a transformational shift
Top 5 Healthcare Highlights from Apple WWDC 2019
Cloud computing in healthcare
IRDAI - NHA Joint Working Group: Sub Group on IT
Cloud computing contracts
MODERNIZATION OF NTUC INCOME
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
WHITE PAPER▶ Insecurity in the Internet of Things
Network barometer report 2014
GridWorks SOS
Healthcare in the Clouds
Ad

Similar to Cloud computing usa (20)

PPT
Cloud-Computing_USA.ppt
PPT
Cloud-Computing_USA.ppt
PPT
Cloud-Computing_USA.ppt
PPT
Cloud-Computing_USA.ppt
PPTX
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
PPTX
Unit 1
PPTX
ERP Implementation Services UK
PPT
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
PPT
Cloud computing..
PPTX
A Breif On Cloud computing
PPT
Alhadeff cloud computing cyber technology.ppt
PPTX
Cloud Computing - The new buzz word
PPTX
Cloud Computing Neccesity
PDF
Cloud Computing
PPTX
Cloud computing overview
PPT
Cloud Computing MODULE 1 basics of cloud computing .ppt
PDF
CFO Summit Series - Cloud Computing
PPTX
CLOUD COMPUTING.pptx
PPTX
Cloud computing 1
PPTX
Cloud computing
Cloud-Computing_USA.ppt
Cloud-Computing_USA.ppt
Cloud-Computing_USA.ppt
Cloud-Computing_USA.ppt
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
Unit 1
ERP Implementation Services UK
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Cloud computing..
A Breif On Cloud computing
Alhadeff cloud computing cyber technology.ppt
Cloud Computing - The new buzz word
Cloud Computing Neccesity
Cloud Computing
Cloud computing overview
Cloud Computing MODULE 1 basics of cloud computing .ppt
CFO Summit Series - Cloud Computing
CLOUD COMPUTING.pptx
Cloud computing 1
Cloud computing
Ad

Recently uploaded (20)

PDF
737-MAX_SRG.pdf student reference guides
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
UNIT - 3 Total quality Management .pptx
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
Artificial Intelligence
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Soil Improvement Techniques Note - Rabbi
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
737-MAX_SRG.pdf student reference guides
Automation-in-Manufacturing-Chapter-Introduction.pdf
Categorization of Factors Affecting Classification Algorithms Selection
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
UNIT - 3 Total quality Management .pptx
86236642-Electric-Loco-Shed.pdf jfkduklg
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
III.4.1.2_The_Space_Environment.p pdffdf
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Artificial Intelligence
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Soil Improvement Techniques Note - Rabbi
Exploratory_Data_Analysis_Fundamentals.pdf
Fundamentals of safety and accident prevention -final (1).pptx

Cloud computing usa

  • 2. 2 2 2010 WGITA approved the cloud computing project with SAI USA as lead and Canada & India as members 2011 A status report was presented and comments solicited 2012 Final project description and common cloud computing risks were presented Members requested that this work be augmented with a cloud computing guide and audit handbook 2013Guide & handbook completed for CC. 2013 Will be incorporated into the overall IT Audit Guide & Handbook in cooperation with IDI
  • 3.  Generally speaking, cloud computing can be thought of as anything that involves delivering hosted services over the Internet.  According to NIST Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (Special Publication 800-145) 3 3
  • 4.  Cloud computing provides shared services as opposed to local servers or storage resources  Enables access to information from most web-enabled hardware  Allows for cost savings – reduced facility, hardware/software investments, support 4 4
  • 5.  On-demand self-service A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.  Broad network access Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Source: NIST Special Publication 800-145 5 5
  • 6.  Resource pooling The provider’s computing resources are pooled to serve multiple consumers Resources can be dynamically assigned and reassigned according to customer demand Customer generally may not care where the resources are physically located but should be aware of risks if they are located offshore Source: NIST Special Publication 800-145 6 6
  • 7.  Rapid elasticity Capabilities can be expanded or released automatically (i.e., more cpu power, or ability to handle additional users) To the customer this appears seamless, limitless, and responsive to their changing requirements  Measured service Customers are charged for the services they use and the amounts There is a metering concept where customer resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service Source: NIST Special Publication 800-145 7 7
  • 9. Infrastructure-as-a-Service (IaaS)  A service model that involves outsourcing the basic infrastructure used to support operations--including storage, hardware, servers, and networking components.  The service provider owns the infrastructure equipment and is responsible for housing, running, and maintaining it. The customer typically pays on a per-use basis.  The customer uses their own platform (Windows, Unix), and applications 9 9
  • 10. Platform-as-a-Service (PaaS)  A service model that involves outsourcing the basic infrastructure and platform (Windows, Unix)  PaaS facilitates deploying applications without the cost and complexity of buying and managing the underlying hardware and software where the applications are hosted.  The customer uses their own applications 10 10
  • 11. Software-as-a-Service (SaaS)  Also referred to as “software on demand,” this service model involves outsourcing the infrastructure, platform, and software/applications.  Typically, these services are available to the customer for a fee, pay-as-you-go, or a no charge model.  The customer accesses the applications over the internet. 11 11
  • 12.  Data resides on servers that the customer cannot physically access  Vendors may store data anywhere at lowest cost if not restrained by agreement 12 12
  • 13. 13 13 The guide is about a 10 page document that describes cloud computing and areas of risk These risks should be managed by the IT organization that chooses to utilize cloud computing For IT Auditors these risks are a roadmap which you can utilize to create your audit program
  • 14. 14 14
  • 15. What is Cloud Computing?   Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited entities still has control over the application and the data. Outsourcing may also include utilizing the vendor’s computers to store, backup, and provide online access to the organization data. The organization will need to have a robust access to the internet if they want their staff or users to have ready access to the data or even the application that process the data. In the current environment, the data or applications are also available from mobile platforms (laptops with Wi-Fi or cell/mobile cards, smart phones, and tablets). 15 15
  • 16. Audit Concerns When an organization chooses to utilize cloud computing, they need to be aware of risks that they may face with the service provider, the risk they face if they are unable to effectively oversee the service provider, and other risks related to management and security weaknesses in the service providers approach. As an auditor you will need to understand what the agency has done to mitigate the risks with cloud computing. When we as auditors are asked to appraise whether an entity or organization getting the benefits of cloud computing are managing the vendor to ensure that they get the required services we need to be aware of the risks that they may face. 16 16
  • 17.  Risk Areas  Service Provider Risks  Technical Risks  External (Overseas) Risks  Management/Oversight Risks  Security / Connectivity / Privacy Risks These were discussed at the last meeting along with some mitigation strategies that the IT organization could use The IT auditor would use those as a road map to frame audit questions 17 17
  • 18.  The handbook provides the IT Auditor with some audit related questions that begin to explore whether the organization is managing the risks and the vendor 18 18
  • 19. 19 19
  • 20. 20 20
  • 21. 21 21
  • 22.  As and when members conduct IT Audits that involve Cloud Computing we would like to receive your audit questions so we may update the guide  Members may contact the Chair or SAI USA for additional information 22 22
  • 23.  niharika India  niharika cse Madhav Panwar panwarm@gao.gov 23 23