You are on page 1of 3

IT Audits of Cloud and Saas

Tommie W. Singleton, Ph.D., Moore’s Law has been operating for decades “blank amount of time” per year to manage
CISA, CITP, CMA, CPA, is without signs of slowing down, which leads to about 70 servers. If the entity has a server farm,
an associate professor of new technologies and, thus, new challenges for it can outsource those costs to an effective
information systems (IS) at IT auditors. In recent months, cloud computing data center and reduce costs significantly. In
the University of Alabama at and Software as a Service (SaaS) have led the addition, when the entity needs to upgrade its
Birmingham (USA), a Marshall “bleeding edge” of IT. Therefore, IT auditors need software, or acquire a new software application,
IS Scholar and a director to understand these technologies, establish an the consideration of infrastructure is probably
of the Forensic Accounting approach for identifying the key risks and develop an insignificant consideration regarding cost,
Program. Prior to obtaining his effectual audits of the technologies for those risks. assuming the choice in IaaS provider was
doctorate in accountancy from However, the risk-based approach (RBA) process sufficiently sophisticated, and requires little to no
the University of Mississippi for cloud computing is complicated by the fact changes to its own infrastructure.
(USA) in 1995, Singleton was that all of the technologies and controls are There is also the accounting consideration.
president of a small, value- housed outside the entity being audited.1, 2, 3 Usually, infrastructure costs are substantial and,
added dealer of accounting A key to IT audits of cloud computing and according to the Generally Accepted Accounting
IS using microcomputers. SaaS is to choose a framework for the components Principles (GAAP), are treated as a capital
Singleton is also a scholar- that assists an effective risk assessment of those expense (CAPEX). However, if the infrastructure
in-residence for IT audit technologies. Once a proper risk assessment is outsourced, the expense associated with the
and forensic accounting at is produced, the IT audit becomes a natural IaaS infrastructure usually becomes an operating
Carr Riggs Ingram, a large extension of auditing for the identified risks, expense (OPEX). In the US, this leads to a tax
regional public accounting especially where controls have not adequately advantage regarding income taxes.
firm in the southeastern US. In mitigated the risk. This RBA is the common Thus, some of the key factors for management
1999, the Alabama Society of approach for audits of various types today. when choosing the IaaS provider are flexible
CPAs awarded Singleton the performance (including scalability) and
1998-1999 Innovative User of Components of Cloud Computing availability while achieving physical and virtual
Technology Award. Singleton Much has been written about cloud computing, security needs.
is the ISACA academic SaaS and data centers, but often those There are various ways to break down IaaS,
advocate at the University technologies are melded as a composite service but here is one way:
of Alabama at Birmingham. referred to as cloud computing. Actually, there • Connectivity
His articles on fraud, IT/IS, IT is a simple framework for thinking about cloud • Network services and management
auditing and IT governance computing that should help IT auditors in • Compute services and management
have appeared in numerous performing a risk assessment. The components • Data storage
publications, including the are Infrastructure as a Service (IaaS) and • Security
ISACA Journal. Software as a Service (SaaS)—almost identical Connectivity obviously refers to reliable access
to the way we think of the body of technologies to the Internet and connectivity to associated
internal to an entity. systems and technologies, for instance, data
storage to application servers. Examples of risks
Cloud Computing: IaaS would be availability/downtime and speed of
Services of IaaS components replace or access.4 The average entity experiences one day
supplement the internal infrastructure. The key per annum of downtime.
decision factors for management in deciding Network services and management includes
to move to IaaS (outsourcing part of its not only providing network capabilities, but
infrastructure) and choosing the appropriate managing the network, monitoring the network
vendor are usually efficiency-related. For and providing for efficient access through aspects
instance, it takes one full-time employee (FTE) such as load balancing. Examples of these risks

1 ISACA JOURNAL VOLUME 3, 2010


are scalability for new technologies or expanding the level of systems and IT (including programming platform), ease of
transactions, availability, secured transmissions, and the level purchase, ease of integration, project management, scalable
of access (e.g., load balancing). infrastructure, and billing/costs (metering).
Compute services and management include appropriate There are various ways to break down SaaS, but here is
resources such as core, processors, memory and managing the one framework:
operating system (OS). Examples of the risks are availability • Business process modeling
(including system failure) and scalability. • Evaluation and analysis
There has been significant growth in data centers over • Process execution
the last few years, and data centers are becoming more Business process modeling involves the need to fit
sophisticated in the scope of services. Examples of the together workflow/business process structure, applications
risks for data storage include the obvious: security of data, and data, organizational structure, and the integration
recovery, availability and scalability. The security and recovery of existing systems. Evaluation and analysis includes
issues are particularly important. Management should ensure process cost accounting, balanced scorecards, service level
that the data storage aspect of IaaS can provide an appropriate agreements (SLA), process warehouse and optimization.
level of physical and logical security and an appropriate Process execution includes workflow control, applications
recovery methodology to ensure a timely recovery if the data integration (enterprise application integration [EAI]),
center is involved in a disaster. service orchestration (service-oriented architecture [SOA]),
Security issues are more or less ubiquitous for IaaS and populating databases/conversion and business activity
include physical security, especially data storage, and logical monitoring. Other issues include document and content
security. They include security from unauthorized access by management, collaboration, systems management and
malicious intruders and rogue employees of the IaaS provider. administration, and various aspects of management of SaaS.
In fact, the latter is an increased risk to the user entity Examples of risks would be related to these areas. Some
that needs to be addressed via adequate controls by the examples include an improper fit of the business process to
service entity. the application, inadequate connectivity between applications
Risks are always determined within contextual and data, improper integration with existing systems, and
circumstances to the entity—for example, the industry, its inadequate monitoring of SaaS business processes and events.
own business processes, the current economy and other Obviously, the SLA is a key audit objective. There is also a
circumstances peculiar to the entity at that time. Some of risk of cost control and estimates; that is, it is possible that the
the other issues that may be risks are ownership, insurance, move could end up costing the entity more rather than less.
project management and performance reporting. One example of cost control is the metering/billing aspect of
Mitigating controls could be discoverable from a SAS 70 SaaS, which presents an area of potential risk.
Type II audit report. If one exists for the IaaS provider, the IT
auditor should certainly read it to see what level of assurance IT Assurance Framework
can be gained for the specific, identified risks. Controls ISACA’s IT Assurance FrameworkTM (ITAFTM) includes a section
the provider should be employing include best practices in (3630.6) on outsourcing and third-party activities (see figure 1).
security, support (e.g., IT Infrastructure Library [ITIL] v3) Cross-references are included—CobiT® PO4, PO7, PO8, PO9,
and business recovery. AI2 and AI5, and ISACA IT Audit and Assurance Guidelines
(formerly IS Audit Guidelines) G4, G18, G32 and G37. These
Cloud Computing: SaaS referenced documents provide useful technical assistance in
Some of the key points in deciding to use SaaS, or a particular conducting an IT audit for cloud computing.
vendor, are the complexity of the environment, the need Obviously, the fact that a third party is involved means
to buy smaller pieces/modules, compatibility with existing direct auditing of the service entity may not be practical or

ISACA JOURNAL VOLUME 3, 2010 2


even possible. ITAF also supplies a list of potential documents Endnotes
that could provide service audit information that should be 1
Raval, Vasant; “Risk Landscape of Cloud Computing,”
relevant (see figure 2). ISACA Journal, ISACA, USA, vol. 1, 2010
2
Ross, Steve; “Cloudy Daze,” ISACA Journal, ISACA, USA,
Conclusion vol. 1, 2010
Auditing cloud computing in one sense is like auditing any 3
Gadia, Sailesh; “Cloud Computing: An Auditor’s
new IT—understand the IT, identify the risks, evaluate Perspective,” ISACA Journal, ISACA, USA, vol. 6, 2009
mitigating controls and audit the risky objects. The 4
Each IT audit has its own context (e.g., financial audit,
understanding and risk assessment can be enhanced with internal audit, special IT audit). Each IT audit has its basic
a good framework to think about the IT and risks and, objectives. Thus, the scoping aspects of a particular IT audit
thus, assist the IT auditor in conducting an effectual risk would review all of these risks for various aspects of cloud
assessment. The IaaS/SaaS framework described here is computing and determine whether they are applicable and
intended to assist IT auditors in performing their duties relevant.
associated with cloud computing.

Figure 1—Types of Reports Based on User Needs


3630.6 Outsourced and Third-party IT Activities • G4 Outsourcing of IS Activities to Other Organisations
This section provides information on the various types of outsourcing • G18 IT Governance
(outsourcing, insourcing, offshoring, facilities management, etc.), the IT • G32 Business Continuity Plan (BCP) Review From an IT Perspective
activities that may be outsourced (operations, help desk, technical support, • G37 Configuration Management Process
maintenance, systems software support, application software support, etc.) • CobiT:
and the issues about each of which the IT assurance professional must be – PO4 Define the IT processes, organization and relationships
aware. – PO7 Manage IT human resources
– PO8 Manage quality
The guidance in this section also identifies the risks associated with the – PO9 Assess and manage IT risks
various outsourcing options and provides information on how management – AI2 Acquire and maintain application software
can minimise or mitigate the risks. – AI5 Procure IT resources.

In addition, this guidance provides helpful hints regarding contracting,


reducing outsourced risks, legal remedies and other protection devices.
Source: ISACA, ITAF: A Professional Practices Framework for IT Assurance, USA, 2008

Figure 2—ITAF Guidelines for Audits of Third-party IT Activities


TrustServices
The Report Consulting Attestation Agreed-upon SAS 703 SysTrust and
User Needs Services Procedures Procedures S-59704 WebTrust
A report that No assurance Assurance No assurance Assurance Assurance based on
provides: predefined criteria
A report that will be Restricted use to a General distribution Restricted use to those Restricted use to General distribution
available for: predefined audience who have agreed to current customers and
the procedures their auditors
A report that will Detailed information Limited information Specific procedures Detailed information Specific information
disclose: and factual findings that may be in
summary or detailed
form
Source: ISACA, ITAF: A Professional Practices Framework for IT Assurance, USA, 2008

3 ISACA JOURNAL VOLUME 3, 2010

You might also like