SlideShare a Scribd company logo
Cloud Computing
Guide
&
Handbook
SAI USA
Madhav Panwar
2
2
Background
2010 WGITA approved the cloud computing project with SAI USA
as lead and Canada & India as members
2011 A status report was presented and comments solicited
2012 Final project description and common cloud computing risks
were presented
Members requested that this work be augmented with a
cloud computing guide and audit handbook
2013Guide & handbook completed for CC.
2013 Will be incorporated into the overall IT Audit Guide & Handbook
in cooperation with IDI
3
3
What Is Cloud Computing?
• Generally speaking, cloud computing can
be thought of as anything that involves
delivering hosted services over the
Internet.
• According to NIST Cloud computing is
a model for enabling ubiquitous,
convenient, on-demand network
access to a shared pool of
configurable computing resources
(e.g., networks, servers, storage,
applications, and services) that can be
rapidly provisioned and released with
minimal management effort or service
provider interaction. (Special
Publication 800-145)
4
4
What It Provides
• Cloud computing provides shared services
as opposed to local servers or storage
resources
• Enables access to information from most
web-enabled hardware
• Allows for cost savings – reduced facility,
hardware/software investments, support
5
5
Essential Characteristics
• On-demand self-service
A consumer can unilaterally provision computing capabilities, such
as server time and network storage, as needed automatically
without requiring human interaction with each service provider.
• Broad network access
Capabilities are available over the network and accessed through
standard mechanisms that promote use by heterogeneous thin or
thick client platforms (e.g., mobile phones, tablets, laptops, and
workstations).
Source: NIST Special Publication 800-145
6
6
Characteristics
• Resource pooling
The provider’s computing resources are pooled to serve multiple
consumers
Resources can be dynamically assigned and reassigned according
to customer demand
Customer generally may not care where the resources are
physically located but should be aware of risks if they are located
offshore
Source: NIST Special Publication 800-145
7
7
Characteristics
• Rapid elasticity
Capabilities can be expanded or released automatically (i.e.,
more cpu power, or ability to handle additional users)
To the customer this appears seamless, limitless, and responsive
to their changing requirements
• Measured service
Customers are charged for the services they use and the amounts
There is a metering concept where customer resource usage can be
monitored, controlled, and reported, providing transparency for both the
provider and consumer of the utilized service
Source: NIST Special Publication 800-145
8
8
Service Models
Infrastructure
Platform
Software/
Application
9
9
Service Models
Infrastructure-as-a-Service (IaaS)
• A service model that involves outsourcing
the basic infrastructure used to support
operations--including storage, hardware,
servers, and networking components.
• The service provider owns the infrastructure
equipment and is responsible for housing,
running, and maintaining it. The customer
typically pays on a per-use basis.
• The customer uses their own platform
(Windows, Unix), and applications
10
10
Service Models
Platform-as-a-Service (PaaS)
• A service model that involves outsourcing
the basic infrastructure and platform
(Windows, Unix)
• PaaS facilitates deploying applications
without the cost and complexity of buying
and managing the underlying hardware and
software where the applications are hosted.
• The customer uses their own applications
11
11
Service Models
Software-as-a-Service (SaaS)
• Also referred to as “software on
demand,” this service model involves
outsourcing the infrastructure,
platform, and software/applications.
• Typically, these services are available
to the customer for a fee, pay-as-you-
go, or a no charge model.
• The customer accesses the applications
over the internet.
12
12
Where Is My Data?
• Data resides on servers
that the customer cannot
physically access
• Vendors may store data
anywhere at lowest cost
if not restrained by
agreement
13
13
Cloud Computing Guide
The guide is about a 10 page document that describes
cloud computing and areas of risk
These risks should be managed by the IT organization
that chooses to utilize cloud computing
For IT Auditors these risks are a roadmap which you can
utilize to create your audit program
Cloud Computing Guide
14
14
Cloud Computing Guide
15
15
What is Cloud Computing?
Cloud computing is where the organization outsources data processing to
computers owned by the vendor. Primarily the vendor hosts the equipment
while the audited entities still has control over the application and the data.
Outsourcing may also include utilizing the vendor’s computers to store,
backup, and provide online access to the organization data. The organization
will need to have a robust access to the internet if they want their staff or users
to have ready access to the data or even the application that process the data.
In the current environment, the data or applications are also available from
mobile platforms (laptops with Wi-Fi or cell/mobile cards, smart phones, and
tablets).
Cloud Computing Guide
Audit Concerns
When an organization chooses to utilize cloud computing, they need to
be aware of risks that they may face with the service provider, the risk
they face if they are unable to effectively oversee the service provider,
and other risks related to management and security weaknesses in the
service providers approach. As an auditor you will need to understand
what the agency has done to mitigate the risks with cloud computing.
When we as auditors are asked to appraise whether an entity or
organization getting the benefits of cloud computing are managing the
vendor to ensure that they get the required services we need to be
aware of the risks that they may face.
16
16
Cloud Computing Guide
• Risk Areas
– Service Provider Risks
– Technical Risks
– External (Overseas) Risks
– Management/Oversight Risks
– Security / Connectivity / Privacy Risks
These were discussed at the last meeting along with some mitigation
strategies that the IT organization could use
The IT auditor would use those as a road map to frame audit questions
17
17
Cloud Computing Handbook
• The handbook provides the IT Auditor with
some audit related questions that begin to
explore whether the organization is
managing the risks and the vendor
18
18
Cloud Computing Handbook
19
19
Cloud Computing Handbook
20
20
Cloud Computing Handbook
21
21
Next Steps
• As and when members conduct IT Audits
that involve Cloud Computing we would
like to receive your audit questions so we
may update the guide
• Members may contact the Chair or SAI
USA for additional information
22
22
Contacts
• SAI India
• Jagbans Singh
ir@cag.gov.in
• SAI USA
Madhav Panwar
panwarm@gao.gov
23
23

More Related Content

PPT
Cloud computing usa
PDF
Virtualisation and cloud computing notes.pdf
PPT
Securing Apps & Data in the Cloud by Spyders & Netskope
PDF
IRJET- An Overview on Cloud Computing and Challenges
PPTX
Unit 9 Technological trends in Information Technology By Sulav Acharya
PPTX
Unit 9 Technological trends in Information Technology By Sulav Acharya
PDF
PDF
Data Security Approach in Cloud computing using SHA
Cloud computing usa
Virtualisation and cloud computing notes.pdf
Securing Apps & Data in the Cloud by Spyders & Netskope
IRJET- An Overview on Cloud Computing and Challenges
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
Data Security Approach in Cloud computing using SHA

Similar to Cloud-Computing_USA.ppt (20)

PPT
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
PPT
Celera Networks on Cloud Computing
PPTX
1-Definition Characteristics-14-12-2024.pptx
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PDF
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
PPT
Welcome to the Cloud!
PDF
Cloud computing - the impact on revenue recognition
PDF
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
PPTX
1 (1).pptx
PPTX
Cloud Computing and fog computing lesson notes.pptx
PPTX
Unit-I Introduction to Cloud Computing.pptx
PDF
International Journal of Engineering Research and Development (IJERD)
PPTX
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
PPT
Cloud Computing
DOC
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
PPTX
Cloud computing
PPTX
Cloud computing
PDF
final-unit-i-cc cloud computing-2022.pdf
PPTX
A Breif On Cloud computing
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Celera Networks on Cloud Computing
1-Definition Characteristics-14-12-2024.pptx
PACE-IT, Security+1.3: Cloud Concepts
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
Welcome to the Cloud!
Cloud computing - the impact on revenue recognition
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
1 (1).pptx
Cloud Computing and fog computing lesson notes.pptx
Unit-I Introduction to Cloud Computing.pptx
International Journal of Engineering Research and Development (IJERD)
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
Cloud Computing
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
Cloud computing
Cloud computing
final-unit-i-cc cloud computing-2022.pdf
A Breif On Cloud computing

Recently uploaded (20)

PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PDF
Website Design Services for Small Businesses.pdf
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Nekopoi APK 2025 free lastest update
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PPTX
assetexplorer- product-overview - presentation
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
Navsoft: AI-Powered Business Solutions & Custom Software Development
Autodesk AutoCAD Crack Free Download 2025
Why Generative AI is the Future of Content, Code & Creativity?
Patient Appointment Booking in Odoo with online payment
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
Website Design Services for Small Businesses.pdf
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Computer Software and OS of computer science of grade 11.pptx
Design an Analysis of Algorithms I-SECS-1021-03
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Operating system designcfffgfgggggggvggggggggg
Nekopoi APK 2025 free lastest update
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
assetexplorer- product-overview - presentation
Design an Analysis of Algorithms II-SECS-1021-03
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)

Cloud-Computing_USA.ppt

  • 2. 2 2 Background 2010 WGITA approved the cloud computing project with SAI USA as lead and Canada & India as members 2011 A status report was presented and comments solicited 2012 Final project description and common cloud computing risks were presented Members requested that this work be augmented with a cloud computing guide and audit handbook 2013Guide & handbook completed for CC. 2013 Will be incorporated into the overall IT Audit Guide & Handbook in cooperation with IDI
  • 3. 3 3 What Is Cloud Computing? • Generally speaking, cloud computing can be thought of as anything that involves delivering hosted services over the Internet. • According to NIST Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (Special Publication 800-145)
  • 4. 4 4 What It Provides • Cloud computing provides shared services as opposed to local servers or storage resources • Enables access to information from most web-enabled hardware • Allows for cost savings – reduced facility, hardware/software investments, support
  • 5. 5 5 Essential Characteristics • On-demand self-service A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. • Broad network access Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations). Source: NIST Special Publication 800-145
  • 6. 6 6 Characteristics • Resource pooling The provider’s computing resources are pooled to serve multiple consumers Resources can be dynamically assigned and reassigned according to customer demand Customer generally may not care where the resources are physically located but should be aware of risks if they are located offshore Source: NIST Special Publication 800-145
  • 7. 7 7 Characteristics • Rapid elasticity Capabilities can be expanded or released automatically (i.e., more cpu power, or ability to handle additional users) To the customer this appears seamless, limitless, and responsive to their changing requirements • Measured service Customers are charged for the services they use and the amounts There is a metering concept where customer resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service Source: NIST Special Publication 800-145
  • 9. 9 9 Service Models Infrastructure-as-a-Service (IaaS) • A service model that involves outsourcing the basic infrastructure used to support operations--including storage, hardware, servers, and networking components. • The service provider owns the infrastructure equipment and is responsible for housing, running, and maintaining it. The customer typically pays on a per-use basis. • The customer uses their own platform (Windows, Unix), and applications
  • 10. 10 10 Service Models Platform-as-a-Service (PaaS) • A service model that involves outsourcing the basic infrastructure and platform (Windows, Unix) • PaaS facilitates deploying applications without the cost and complexity of buying and managing the underlying hardware and software where the applications are hosted. • The customer uses their own applications
  • 11. 11 11 Service Models Software-as-a-Service (SaaS) • Also referred to as “software on demand,” this service model involves outsourcing the infrastructure, platform, and software/applications. • Typically, these services are available to the customer for a fee, pay-as-you- go, or a no charge model. • The customer accesses the applications over the internet.
  • 12. 12 12 Where Is My Data? • Data resides on servers that the customer cannot physically access • Vendors may store data anywhere at lowest cost if not restrained by agreement
  • 13. 13 13 Cloud Computing Guide The guide is about a 10 page document that describes cloud computing and areas of risk These risks should be managed by the IT organization that chooses to utilize cloud computing For IT Auditors these risks are a roadmap which you can utilize to create your audit program
  • 15. Cloud Computing Guide 15 15 What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited entities still has control over the application and the data. Outsourcing may also include utilizing the vendor’s computers to store, backup, and provide online access to the organization data. The organization will need to have a robust access to the internet if they want their staff or users to have ready access to the data or even the application that process the data. In the current environment, the data or applications are also available from mobile platforms (laptops with Wi-Fi or cell/mobile cards, smart phones, and tablets).
  • 16. Cloud Computing Guide Audit Concerns When an organization chooses to utilize cloud computing, they need to be aware of risks that they may face with the service provider, the risk they face if they are unable to effectively oversee the service provider, and other risks related to management and security weaknesses in the service providers approach. As an auditor you will need to understand what the agency has done to mitigate the risks with cloud computing. When we as auditors are asked to appraise whether an entity or organization getting the benefits of cloud computing are managing the vendor to ensure that they get the required services we need to be aware of the risks that they may face. 16 16
  • 17. Cloud Computing Guide • Risk Areas – Service Provider Risks – Technical Risks – External (Overseas) Risks – Management/Oversight Risks – Security / Connectivity / Privacy Risks These were discussed at the last meeting along with some mitigation strategies that the IT organization could use The IT auditor would use those as a road map to frame audit questions 17 17
  • 18. Cloud Computing Handbook • The handbook provides the IT Auditor with some audit related questions that begin to explore whether the organization is managing the risks and the vendor 18 18
  • 22. Next Steps • As and when members conduct IT Audits that involve Cloud Computing we would like to receive your audit questions so we may update the guide • Members may contact the Chair or SAI USA for additional information 22 22
  • 23. Contacts • SAI India • Jagbans Singh ir@cag.gov.in • SAI USA Madhav Panwar panwarm@gao.gov 23 23