You are on page 1of 9

INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 08, AUGUST 2016 ISSN 2277-8616

The Impact Of Cloud Computing Technology On


The Audit Process And The Audit Profession
Yati Nurhajati
Abstract: In the future, cloud computing audits will become increasingly, The use of that technology has influenced of the audit process and be a new
challenge for both external and the Internal Auditors to understand IT and learn how to use cloud computing and cloud services that hire in cloud service
provider (CSP), and considering the risks of cloud computing, and how to audit cloud computing by risk based audit approach. The wide range of unique
risks and depend on the type and model of the cloud solution, the uniqueness of the client environment,and the specifics of data or an application make
this an complicated subject. The internal audit function is well positioned through its role as a guarantor function of the organization to assist
management and the board of the Committee to identify and consider the risks in using cloud computing technology for internal audit can help determine
whether the risk has been managed appropriately in a cloud computing environment. Assesses the current impact of cloud computing technology on the
audit process , and discusses the implications of cloud computing future technological trends for the auditing profession . More specifically, Provides a
summary of how that information technology has impacted the audit framework.

Index Terms: Cloud service provider (CSP), Cloud Computing Environment, Risk Base`Audit approach, The Big Four Audit Firms, and Internal audit
Role.
————————————————————

1.INTRODUCTION Hence auditing is highly required to maintain the privacy of the


In future years, cloud computing will become commonplace sensitive data, restricted access of computing and physical
However, commercially available technology will continue to resources and to check integrity. (Mohanty et al, 2014). The
become less costly, and more widely available. The growth of purpose of this paper is to assess the current impact of cloud
enterprise-wide computing by virtual presents many new computing technology on the audit process, and to discuss the
challenges for the audit. Demand of cloud computing is future implications of technological trends for the auditing
emerging when initially firms had to bear higly expensive cost profession. The paper first provides how cloud computing
for handling and maintenance all the computing resources and technology has impacted audit process are discussed. Next,
doubt to disclose their data to users. To overcome these provides a summary of the information gathered on the current
problems Cloud Service Provider (CSP) providing usage of audit cloud computing technology by audit firms. The
management of physical resources, including computing firms participating in this study represent two of the four
resources , user data and sensitive process. Companies largest accounting firms in the world.
simply provide the data to the Cloud Service Provider (CSP)
and further data will be accessible by anyone or user or any 2 LITERATURE REVIEW
other company associated with Cloud Service Provider (CSP)
or even every customer of the company itself. (Mohanty et al ; 2.1 HOW CLOUD COMPUTING TECHNOLOGY HAS IMPACTED
2014 ) The Cloud supports a business model with some AUDIT PROCESS
significant benefits for the consumer, including cost savings for
equipment and for management of Information Technology 2.1.1 CLOUD COMPUTING
(IT) resources and business services. But there are security Cloud computing as a result of the collaboration of several
risks exacerbated by outsourcing to the cloud that have not existing technologies. (Halpert, 2011;2) when ―the cloud‖ is
been fully understood by either buyers or Cloud Service combined with ―computing,‖ Market research analysts and
provider (CSP), changes to IT infrastructure that are not technology vendors alike tend to define cloud computing very
understood by the business can introduce significant risk to narrowly, as a new type of utility computing that basically uses
the business itself, and so audit, compliance, and risk virtual servers that have been made available to third parties
management should all be considered part of the true cost of via the Internet. A more tempered view of cloud computing
cloud computing (Halpert, 2011; 15) Security of data into the considers it the delivery of computational resources from a
most significant issues at all levels of Resource as a Service location other than the one from which you are computing.
(RaaS), Infrastructure as a Service (IaaS), Platform as a (Ransome and Rittinghouse, 2010; xxvii) National Institute of
Service (PaaS) and Software as a Service (SaaS). At the Standards and Technology (NIST) at NIST Special Publication
network level, Cloud Service Provider (CSP) such as 800-145 (2011), defines ‖Cloud computing is a model for
monitoring, collecting and firewall protection, perform intrusion enabling ubiquitous, convenient, on-demand network access
prevention system and forwards the data stream. to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that
can be rapidly provisioned and released with minimal
management effort or service provider interaction. This cloud
____________________________ model is composed of three service models, and four
deployment models as follow; The NIST Special Publication
 Yati nurhajati, Student of Doctoral Program of 800-145 (2011) also identifies three cloud service models and
Accounting Faculty of Economics and Business, four cloud deployment models.
Padjadjaran University- Bandung - Indonesia and
Lecturer of LP3I - Bandung – Indonesia, E-mail The service models are:
nurhajatiyati@yahoo.co.id
1
IJSTR©2016
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 08, AUGUST 2016 ISSN 2277-8616

1. Software-as-a-Service (SaaS) allows users to run a variety The essential differences will be most evident in the public and
of software applications on the Internet without having hybrid types of clouds—as these will rely most heavily on
possession or managing applications (e.g., Salesforce.com, contracts and (possibly complex) agreements and compliance
Gmail, Microsoft Online). to those agreements.
2. Platform-as-a-Service (PaaS) provides a computing platform  The service model Software as a Service [SaaS],
to support building of web applications and services Infrastructure as a Service [IaaS], Platform as a Service
completely residing on the Internet (e.g., Google Apps, [PaaS].
Force.com, 3Tera AppLogic).  The use of the cloud implies the use of the Internet and
3. Infrastructure-as-a-Service (IaaS) allows the use of ‗‗extension‘‘ of the corporate network, all cloud models
computer hardware and system software, including vary in features and controls that must be considered
operating systems and communication networks in which while planning and executing an audit.
the cloud provider is responsible for hardware installation,
system configuration, and maintenance (e.g., Amazon EC2, 2.1.2 STANDAR FRAMEWORK CONTROL TO CLOUD COMPUTING
Citrix Cloud Center). ENVIRONMENT
Control (compliance) frameworks have not yet been well
The Deployment Models are: adapted to cloud environments, although most (like COBIT,
1. Private cloud. The cloud infrastructure is provisioned for ITIL, and ISO 27001) are considered sufficient overall and a
exclusive use by a single organization comprising multiple worthy starting point. Information assurance controls or
consumers (e.g., business units). It may be owned, Common Criteria have supported auditing by dictating minimal
managed, and operated by the organization, a third party, or requirements for audit. CSA, NIST, ISACA, and ENISA. These
some combination of them, and it may exist on or off organizations have been leading the development of concepts
premises. and guidance sufficient to understand, protect, and trust cloud
2. Community cloud. The cloud infrastructure is provisioned for infrastructure. It is advisable to keep up with new publications
exclusive use by a specific community of consumers from from these organizations (and many others) to keep abreast of
organizations that have shared concerns (e.g., mission, new thought and advice. .(Halpert, 2011; 19)
security requirements, policy, and compliance
considerations). It may be owned, managed, and operated 2.1.3 AUDIT RISK BASED APPROACH IN CLOUD COMPUTING
by one or more of the organizations in the community, a third ENVIRONMENT AND INTERNAL AUDITOR ROLE
party, or some combination of them, and it may exist on or Process auditing has become much more important as an
off premises. auditor must begin the audit planning by understanding the
3. Public cloud. The cloud infrastructure is provisioned for open objectives of each business process and then determine
use by the general public. It may be owned, managed, and whether these objectives have been incorporated into the
operated by a business, academic, or government client's processes, while adequately considering risks and
organization, or some combination of them. It exists on the internal controls(Bierstaker et al, 2001). According to Halpert
premises of the cloud provider. (2011;27) An auditor should be able to review the risk
4. Hybrid cloud. The cloud infrastructure is a composition of assessment product and observe the risk assessment
two or more distinct cloud infrastructures (private, process. Singleton (2010) propose a risk-based approach that
community, or public) that remain unique entities, but are encourages effective risk assessment and auditing for the
bound together by standardized or proprietary technology identified risks. The very best Internal Audit functions are
that enables data and application portability (e.g., cloud regarded as a catalyst for change, helping the organisation
bursting for load balancing between clouds). through the difficulties of changing environments, cultures, and
so on. (Phil Griffiths (2005;8) So IT auditors need to
2.1.2 AUDITING IN CLOUD COMPUTING ENVIRONMENT understand these technologies, establish an approach for
According to Halpert (2011) The best practice in effective IT identifying the key risks and develop effectual audits of the
auditing is to start with an understanding of business functions, technologies for those risks. However, the risk-based
to identify which IT infrastructure is providing those functions, approach (RBA) process for cloud computing is complicated
and to then consider the scope of the audit and controls best by the fact that all of the technologies and controls are housed
suited for that IT function. Similarity and diferrence of auditing outside the entity being audited (Singleton, 2010). The cloud
at cloud computing environment: user is strongly advised to perform a risk assessment of any
a. Audit in the cloud does have similar issues to standard system proposed for the cloud environment. In some cases,
infrastructure auditing that should be considered, as follow the assessment of risk will be performed as part of enterprise
; risk management and should be adjusted to address specific
 conflict of interest and independence of the auditor risks associated with different vendors, specific cloud
 professional auditing practices and adequate technical offerings, existing compliance requirements, and data
training and proficiency of the auditor sensitivity. The wide range of unique risks facing the
 audit reports that clearly assert findings and qualified organization make this an important subject and depend on
opinions-based evidence and documentation. the type and model of the cloud solution, the uniqueness of
b. Audit will be different for the cloud depending on ; the client environment,and the specifics of data or an
 the deployment model of cloud outsourcing (private, application (Halpert, 2011;26-27)
public, community, or hybrid) and service model Software
as a Service [SaaS] 2.1.4 AUDITING FRAMEWORK IN CLOUD COMPUTING
ENVIRONMENT
Example:
2
IJSTR©2016
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 08, AUGUST 2016 ISSN 2277-8616

2.1.4.1 AUDITING CLOUD COMPUTING FRAMEWORK IN ease of integration, project management, scalable
PERFORMING A RISK ASSESSMENT BASE ON THE COMPONENTS ARE infrastructure, and billing/costs (metering). There are various
INFRASTRUCTURE AS A SERVICE (IAAS) AND SOFTWARE AS A ways to break down SaaS, but here is one framework:
SERVICE (SAAS) a. Business process modeling ; involves the need to fit
Singleton (2010) asserts that IT auditors need to understand together workflow/business process structure, applications
cloud technology, especially SaaS and IaaS; establish an and data, organizational structure, and the integration of
approach for identifying key risks; and develop effective audits. existing systems.
There is a simple framework for thinking about cloud b. Evaluation and analysis ; Evaluation and analysis includes
computing that should help IT auditors in performing a risk process cost accounting, balanced scorecards, service level
assessment. The components are Infrastructure as a Service agreements (SLA), process warehouse and optimization.
(IaaS) and Software as a Service (SaaS)—almost identical to c.Process execution; Process execution includes workflow
the way we think of the body of technologies internal to an control, applications integration (enterprise application
entity integration [EAI]), service orchestration (service-oriented
architecture [SOA]), populating databases/conversion and
A. AUDITING CLOUD COMPUTING FRAMEWORK IN PERFORMING A business activity monitoring.
RISK ASSESSMENT BASE ON THE COMPONENTS INFRASTRUCTURE
AS A SERVICE (IAAS) 2.1.4.2 AUDITING CLOUD COMPUTING FRAMEWORK IN
Services of IaaS components replace or supplement the PERFORMING A RISK ASSESSMENT BASE ON CLOUD AUDITING
internal infrastructure. The key decision factors for OUTSOURCING LIFECYCLE FASE
management in deciding to move to IaaS (outsourcing part of Mohanty, pattnaik, and mund (2014) state auditing is needed
its infrastructure) and choosing the appropriate vendor are in every phases of cloud infrastructure due to maintenance of
usually efficiency-related.There are various ways to break data confidentiality, privacy, integrity and availability. In the
down IaaS, but here is one way: recent scenario, data is being stored, transferred and
1) Connectivity processed outside the company or organization. Organizations
2) Network services and management outsourced all its sensitive data, processes and computing
3) Compute services and management resources to the Third Party Vendor for handling and
4) Data storage maintenance of those data and resources, it is going through
5) Security different phases as follows: Phase 1 Selecting the appropriate
Third Party vendor: When an organization wants to deploy its
1. Connectivity obviously refers to reliable access to the application or want to rent the physical resources or need an
Internet and connectivity to associated systems and independent platform where heterogeneous application can
technologies, for instance, data storage to application be executed, it needs to select the proper vendor which should
servers. Examples of risks would be availability/downtime be able to handle all the requirements. Phase 2 Define
and speed of access. strategy: The service provider vendor should be transparent in
2. Network services and management includes not only defining its business strategy and risk management
providing network capabilities, but managing the network, philosophy. This kind of decision strategy will enable the
monitoring the network and providing for efficient access service provider to meet the baseline requirements of its
through aspects such as load balancing. Examples of these consumers. Phase 3 Define policies and workflow: Having
risks scalability for new technologies or expanding the level defined its strategy and customer-requirements, service
of transactions, availability, secured transmissions, and the provider needs to translate its requirements into policies
level of access (e.g., load balancing). applicable to industry standards. In this phase, providers need
3. Compute services and management include appropriate to determine the configuration settings, flow control, platforms
resources such as core, processors, memory and managing and to maintain the workflow. Phase 4 Establishing business
the operating system (OS). Examples of the risks are case: Driven by the strategy and policies of the service
availability (including system failure) and scalability. provider, the business case is established and different
4. There has been significant growth in data centers over the concerns related to privacy, security and availability should be
last few years, and data centers are becoming more in the business protocol Phase 5 Due diligence of the Third
sophisticated in the scope of services. Examples of the risks Party Vendor: An act with a firm standard of care should be
for data storage include the obvious: security of data, established within the Third Party Service Provider. Due
recovery, availability and scalability. diligence process is being concerned with some issues like
5. The security and recovery issues are particularly important. Compatibility audit, Marketing audit,financial audit,
Management should ensure that the data storage aspect of Management audit, Legal audit, and Information systems
IaaS can provide an appropriate level of physical and logical audit. The technological direction of both the Third Party and
security and an appropriate recovery methodology to ensure the concerned organization should the directly aligned. Phase
a timely recovery if the data center is involved in a disaster. 6 Validating Agreement protocol and establishing relationships:
A Service Level Agreement (SLA) protocol and escrow service
B. AUDITING CLOUD COMPUTING FRAMEWORK IN PERFORMING A are being established between both vendor and the
RISK ASSESSMENT BASE ON THE COMPONENTS SOFTWARE AS A organization so that both can meet in a standardize platform.
SERVICE (SAAS) Both should know the responsible authorities with their
Some of the key points in deciding to use SaaS, or a particular functionalities. Phase 7 Dynamic monitoring: In this phase of
vendor, are the complexity of the environment, the need to buy lifecycle, dynamic monitoring service is getting enabled and
smaller pieces/modules, compatibility with existing systems dynamically monitors whether the vendor can continue the
and IT (including programming platform), ease of purchase, stable operations, can provide services or not. In the

3
IJSTR©2016
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 08, AUGUST 2016 ISSN 2277-8616

meanwhile, Auditors are actively maintaining the privacy of the user-data and can be trusted as it may review the cloud
sensitive data and computing resources and preparing database storage reliability in support of the cloud user upon
independent auditor‘s report. Phase 8 Closing the relationship: request. An unauthorized user can put a set of intelligent
In last phase of the cycle, data is transferred and unused data queries to the database server, of which none of the query is
are cleaned up. Acknowledgement message is also forbidden. So the unauthorized user, combining the set of
transferred from the user and even related organization end. replies, may get the secret information which is forbidden.
And the concerned vendor will be getting ready for the next Hence TPAS has the responsibility to maintain the privacy of
transaction. user data.

Mohanty, pattnaik, and mund (2014) propose The auditing 2.3 AUDIT CLOUD COMPUTING TECHNOLOGY BY THE BIG FOUR
aspects in Cloud Computing Environment are discussed as AUDIT FIRMS
follows: The Big four is the four largest accounting firms that handle
1. Auditing for regulation or compliance: A set of rules and accounting services for a number of public and private
principles are designed to govern or control the conduct for companies. The Big Four includes Deloitte Touche Tohmatsu,
auditing. Compliance is concerned with legal issues, social Pricewaterhousecoopers, Ernst & Young, and KPMG. The Big
activities, marketing strategies, and co-operative conduct. In Four was formed in 2002 after a series of mergers, including
every aspects of compliance, auditing is highly needed for the collapse of Enron, reduced the original eight down to four
maintenance of governing conduct. Auditing for regulations For how are the big four audit performing Risk based audit
and compliance is also needed to restrict increasing approach in cloud computing envionmental in this paper. The
complexity to comply with standards and to maintain the firms participating in this study represent two of the four largest
agreement for privacy laws. audit firms consist of KPMG and Deloitte.
2. Auditing for Risk and Governance: Governance is
exceedingly concerned with the performance measurement 2.1.4.3 HOW ARE THE BIG FOUR TO AUDIT WITH RISK-BASED
& its strategies and risk management & its proper AUDIT APPROACH ON CLOUD COMPUTING ENVIRONMENT
administration is also an important issue of an IT landscape.
Different management laws and policies, priority & A. DELOITTE
resources needed for the processes, alignment of customs In Deloitte presentation (2014) entitled "Cloud Computing -
are the basic functionalities of this category. What Auditors need to know ". Explaining the risks and control
3. Auditing for security: Security issues are the concern for company's that move to cloud , cloud effect on Auditing , and
auditing. In the administration security, everyone should its influence on the internal auditor's role , how to manage
know the responsibilities of each designation. Technical risks , and solutions based on the risk-based approach
auditing is also concerned with security issues. Physical Deloitte, (2014) states that Cloud computing is a challenge for
resources are also in need of auditing for its priority, Auditing ,
availability and cost complexity. a. A disruptive technology, like cloud computing, can impact
4. Database Auditing: Database auditing is related with ―how‖ to audit.
observing a cloud database so as database auditors and b. Internal audit and compliance have a key role to play in
administrators can take care of the actions like accesses, helping to manage and assess risk as cloud services evolve,
modifications, updating issue of the database users. especially for third-party compliance‖
Database auditing is mainly query-based auditing. Queries c.Deloitte asserts that understanding the various cloud models
are presented to the auditor one at a time; auditor checks if by risk based approach will help manage risk. that by
answering the query combining with past answers reveals understanding the various threats on cloud models used to
the secret or forbidden information. approach Risk-based Approach will help to manage risk
5. Service level agreements (SLAs) Auditing: In Business d. Deloitte (2014) propose Tools and dan framework standar,
Service Provider (BSP) layer, SLAs is concerned about as follow:
business-oriented agreement and laws. So in every level of  Standar framework controlnya menggunakan NIST SP 800-
agreements, auditing is highly required to maintain to proper 53, NIST SP 800-144, SP 800-30
usage of laws and terms & conditions.  Deloitte untuk membantu proses auditnya dengan membuat
6. Third Party Storage Auditing Service Provider: Considering Deloitte Cloud Computing Risk Intelligence Map dan Cloud
Cloud data storage and database service, four different Security Alliance - Cloud Controls Matrix
entities are there in Third Party Storage Auditing Service e. Developing audit base risk approach the name is Deloitte‘s
Provider, as shown in the [Figure1]: The Cloud user, hosting Cloud Computing Risk Intelligence Map
machine in Cloud Service Provider (CSP), Cloud Database
Server (CDS) and Third Party Auditing Service (TPAS). The Use and Benefits
cloud user, having a huge amount of data files which is to be –Identifies significant risks that may be introduced by cloud
stored in the cloud. The Cloud user interacts with hosting computing
machine in CSP through Cloud-based user Interface and –Expands the risk discussion to the broad range of risks that
deploys various applications. They may also dynamically need to be considered across the enterprise
communicate with Cloud Database Server (CDS) for storing f.The Cloud Security Alliance (CSA) Cloud Controls Matrix
and maintenance of their data files. While deploying their (CCM) is specifically designed to provide fundamental security
various applications onto host machine, the users may rely principles to guide cloud vendors and to assist prospective
on TPAS in assuring the confidentiality, availability and cloud customers in assessing the overall security risk of a
integrity of their outsourced data to preserve the privacy of cloud provider.
their own data. TPAS is capable of maintaining the privacy of

4
IJSTR©2016
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 08, AUGUST 2016 ISSN 2277-8616

It provides a controls framework is aligned to the Cloud suited for that IT function. Similarity and diferrence of auditing
Security Alliance guidance in 16 domains. at cloud computing environment:
• The foundations rest on its customized relationship to other a. Audit in the cloud does have similar issues to standard
industry-accepted security standards, regulations, and controls infrastructure auditing that should be considered, as follow
frameworks such as the ISO 27001/27002, ISACA COBIT, ;
PCI, NIST, Jericho Forum and NERC CIP  conflict of interest and independence of the auditor
• It will augment or provide internal control direction for SOC  professional auditing practices and adequate technical
attestations provided by cloud providers. training and proficiency of the auditor
 audit reports that clearly assert findings and qualified
Based on the above understanding can be concluded that opinions-based evidence and documentation.
Deloitte conducted audits based on risk by developing the b. Audit will be different for the cloud depending on ;
technique itself is Deloitte's Cloud Computing Risk Intelligence  the deployment model of cloud outsourcing (private,
Map, and consider the role of internal audit and to help public, community, or hybrid) and service model Software
manage and assess the risks of cloud services is growing, it as a Service [SaaS]
indicates that an auditor in auditing the cloud should
understand IT well . Example:
The essential differences will be most evident in the public and
A. KPMG hybrid types of clouds—as these will rely most heavily on
KPMG in the exposure of ―Cloud Computing An Internal Audit contracts and (possibly complex) agreements and compliance
Perspective‖ at the Institute of Internal Auditors Topeka to those agreements.
Chapter December 6, 2011 KPMG suggests internal auditor to  The service model Software as a Service [SaaS],
conduct an audit in a cloud computing environment with the Infrastructure as a Service [IaaS], Platform as a Service
relationship between risk takes from every phase in the Cloud [PaaS].
Outsourcing Lifec
The use of the cloud implies the use of the Internet and
Risk Related Considerations for Each Phase: ‗‗extension‘‘ of the corporate network, all cloud models vary in
Phase 1 – Establishing business case features and controls that must be considered while planning
 Is the work core to the organization‘s business? and executing an audit.
 Are there over-riding concerns related to security, privacy,
and availability given the nature of the business? 2.1.5 STANDAR FRAMEWORK CONTROL TO CLOUD COMPUTING
Phase 2 – Vendor due diligence ENVIRONMENT
 Does the technological direction of vendor align with the user Control (compliance) frameworks have not yet been well
organization‘s direction? adapted to cloud environments, although most (like COBIT,
 Is the vendor stable from a finance and operations ITIL, and ISO 27001) are considered sufficient overall and a
perspective? worthy starting point. Information assurance controls or
Phase 3 – Establishing vendor relationships Common Criteria have supported auditing by dictating minimal
 Are there service-level agreements and escrow? requirements for audit. CSA, NIST, ISACA, and ENISA. These
 Do you know who is responsible for what‘? organizations have been leading the development of concepts
Phase 4 – Ongoing monitoring and guidance sufficient to understand, protect, and trust cloud
 Does the vendor continue to operate with stability? infrastructure. It is advisable to keep up with new publications
 independent auditor‘s report? from these organizations (and many others) to keep abreast of
 Is there an auditor s new thought and advice. .(Halpert, 2011; 19)
Phase 5 – Closing the relationship
 Data transfer and clean up 2.1.6 AUDIT RISK BASED APPROACH IN CLOUD COMPUTING
 Knowledge transfer ENVIRONMENT AND INTERNAL AUDITOR ROLE
Process auditing has become much more important as an
KPMG (2013) in the exposure of ―the Cloud Computing : Risks auditor must begin the audit planning by understanding the
and Auditing‖. IIA Chicago Chapter 53rdAnnual Seminar . April objectives of each business process and then determine
15, 2013 to explain how the cloud computing division of the whether these objectives have been incorporated into the
dimensions of risk and consideration of the audit of the risk. client's processes, while adequately considering risks and
KPMG share risks in cloud computing environments in several internal controls(Bierstaker et al, 2001). According to Halpert
dimensions as follow ; Here is a cloud computing audit in five (2011;27) An auditor should be able to review the risk
areas deemed relevant KPMG : assessment product and observe the risk assessment
1. Data Protection process. Singleton (2010) propose a risk-based approach that
2. Risk Technology encourages effective risk assessment and auditing for the
3. Identity and Access Management identified risks. The very best Internal Audit functions are
4. rules regarded as a catalyst for change, helping the organisation
5. Operation through the difficulties of changing environments, cultures, and
so on. (Phil Griffiths (2005;8) So IT auditors need to
According to Halpert (2011) The best practice in effective IT understand these technologies, establish an approach for
auditing is to start with an understanding of business functions, identifying the key risks and develop effectual audits of the
to identify which IT infrastructure is providing those functions, technologies for those risks. However, the risk-based
and to then consider the scope of the audit and controls best approach (RBA) process for cloud computing is complicated
5
IJSTR©2016
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 08, AUGUST 2016 ISSN 2277-8616

by the fact that all of the technologies and controls are housed risks are availability (including system failure) and
outside the entity being audited (Singleton, 2010). The cloud scalability.
user is strongly advised to perform a risk assessment of any 4. There has been significant growth in data centers over the
system proposed for the cloud environment. In some cases, last few years, and data centers are becoming more
the assessment of risk will be performed as part of enterprise sophisticated in the scope of services. Examples of the
risk management and should be adjusted to address specific risks for data storage include the obvious: security of data,
risks associated with different vendors, specific cloud recovery, availability and scalability.
offerings, existing compliance requirements, and data 5. The security and recovery issues are particularly
sensitivity. The wide range of unique risks facing the important. Management should ensure that the data
organization make this an important subject and depend on storage aspect of IaaS can provide an appropriate level of
the type and model of the cloud solution, the uniqueness of physical and logical security and an appropriate recovery
the client environment,and the specifics of data or an methodology to ensure a timely recovery if the data center
application (Halpert, 2011;26-27) is involved in a disaster.

2.1.7 AUDITING FRAMEWORK IN CLOUD COMPUTING D. AUDITING CLOUD COMPUTING FRAMEWORK IN PERFORMING A
ENVIRONMENT RISK ASSESSMENT BASE ON THE COMPONENTS SOFTWARE AS A
SERVICE (SAAS)
2.1.7.1 AUDITING CLOUD COMPUTING FRAMEWORK IN Some of the key points in deciding to use SaaS, or a particular
PERFORMING A RISK ASSESSMENT BASE ON THE COMPONENTS ARE vendor, are the complexity of the environment, the need to buy
INFRASTRUCTURE AS A SERVICE (IAAS) AND SOFTWARE AS A smaller pieces/modules, compatibility with existing systems
SERVICE (SAAS) and IT (including programming platform), ease of purchase,
Singleton (2010) asserts that IT auditors need to understand ease of integration, project management, scalable
cloud technology, especially SaaS and IaaS; establish an infrastructure, and billing/costs (metering). There are various
approach for identifying key risks; and develop effective audits. ways to break down SaaS, but here is one framework:
There is a simple framework for thinking about cloud 1. Business process modeling ; involves the need to fit
computing that should help IT auditors in performing a risk together workflow/business process structure, applications
assessment. The components are Infrastructure as a Service and data, organizational structure, and the integration of
(IaaS) and Software as a Service (SaaS)—almost identical to existing systems.
the way we think of the body of technologies internal to an 2. Evaluation and analysis ; Evaluation and analysis includes
entity process cost accounting, balanced scorecards, service level
agreements (SLA), process warehouse and optimization.
C. AUDITING CLOUD COMPUTING FRAMEWORK IN PERFORMING A 3. Process execution; Process execution includes workflow
RISK ASSESSMENT BASE ON THE COMPONENTS INFRASTRUCTURE control, applications integration (enterprise application
AS A SERVICE (IAAS) integration [EAI]), service orchestration (service-oriented
Services of IaaS components replace or supplement the architecture [SOA]), populating databases/conversion and
internal infrastructure. The key decision factors for business activity monitoring.
management in deciding to move to IaaS (outsourcing part of
its infrastructure) and choosing the appropriate vendor are 2.1.7.2 AUDITING CLOUD COMPUTING FRAMEWORK IN
usually efficiency-related. There are various ways to break PERFORMING A RISK ASSESSMENT BASE ON CLOUD AUDITING
down IaaS, but here is one way: OUTSOURCING LIFECYCLE FASE
1. Connectivity Mohanty, pattnaik, and mund (2014) state auditing is needed
2. Network services and management in every phases of cloud infrastructure due to maintenance of
3. Compute services and management data confidentiality, privacy, integrity and availability. In the
4. Data storage recent scenario, data is being stored, transferred and
5. Security processed outside the company or organization. Organizations
outsourced all its sensitive data, processes and computing
1. Connectivity obviously refers to reliable access to the resources to the Third Party Vendor for handling and
Internet and connectivity to associated systems and maintenance of those data and resources, it is going through
technologies, for instance, data storage to application different phases as follows:
servers. Examples of risks would be availability/downtime
and speed of access. Phase 1 Selecting the appropriate Third Party vendor: When
2. Network services and management includes not only an organization wants to deploy its application or want to rent
providing network capabilities, but managing the network, the physical resources or need an independent platform where
monitoring the network and providing for efficient access heterogeneous application can be executed, it needs to select
through aspects such as load balancing. Examples of the proper vendor which should be able to handle all the
these risks scalability for new technologies or expanding requirements.
the level of transactions, availability, secured
transmissions, and the level of access (e.g., load Phase 2 Define strategy: The service provider vendor should
balancing). be transparent in defining its business strategy and risk
3. Compute services and management include appropriate management philosophy. This kind of decision strategy will
resources such as core, processors, memory and enable the service provider to meet the baseline requirements
managing the operating system (OS). Examples of the of its consumers.

6
IJSTR©2016
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 08, AUGUST 2016 ISSN 2277-8616

Phase 3 Define policies and workflow: Having defined its know the responsibilities of each designation. Technical
strategy and customer-requirements, service provider needs to auditing is also concerned with security issues. Physical
translate its requirements into policies applicable to industry resources are also in need of auditing for its priority,
standards. In this phase, providers need to determine the availability and cost complexity.
configuration settings, flow control, platforms and to maintain 4. Database Auditing: Database auditing is related with
the workflow. observing a cloud database so as database auditors and
administrators can take care of the actions like accesses,
Phase 4 Establishing business case: Driven by the strategy modifications, updating issue of the database users.
and policies of the service provider, the business case is Database auditing is mainly query-based auditing. Queries
established and different concerns related to privacy, security are presented to the auditor one at a time; auditor checks
and availability should be in the business protocol if answering the query combining with past answers
reveals the secret or forbidden information.
Phase 5 Due diligence of the Third Party Vendor: An act with a 5. Service level agreements (SLAs) Auditing: In Business
firm standard of care should be established within the Third Service Provider (BSP) layer, SLAs is concerned about
Party Service Provider. Due diligence process is being business-oriented agreement and laws. So in every level
concerned with some issues like Compatibility audit, Marketing of agreements, auditing is highly required to maintain to
audit,financial audit, Management audit, Legal audit, and proper usage of laws and terms & conditions.
Information systems audit. The technological direction of both 6. Third Party Storage Auditing Service Provider:
the Third Party and the concerned organization should the Considering Cloud data storage and database service,
directly aligned. four different entities are there in Third Party Storage
Auditing Service Provider, as shown in the [Figure1]: The
Phase 6 Validating Agreement protocol and establishing Cloud user, hosting machine in Cloud Service Provider
relationships: A Service Level Agreement (SLA) protocol and (CSP), Cloud Database Server (CDS) and Third Party
escrow service are being established between both vendor Auditing Service (TPAS). The cloud user, having a huge
and the organization so that both can meet in a standardize amount of data files which is to be stored in the cloud. The
platform. Both should know the responsible authorities with Cloud user interacts with hosting machine in CSP through
their functionalities. Cloud-based user Interface and deploys various
applications. They may also dynamically communicate
Phase 7 Dynamic monitoring: In this phase of lifecycle, with Cloud Database Server (CDS) for storing and
dynamic monitoring service is getting enabled and dynamically maintenance of their data files. While deploying their
monitors whether the vendor can continue the stable various applications onto host machine, the users may
operations, can provide services or not. In the meanwhile, rely on TPAS in assuring the confidentiality, availability
Auditors are actively maintaining the privacy of the sensitive and integrity of their outsourced data to preserve the
data and computing resources and preparing independent privacy of their own data. TPAS is capable of maintaining
auditor‘s report. the privacy of user-data and can be trusted as it may
review the cloud database storage reliability in support of
Phase 8 Closing the relationship: In last phase of the cycle, the cloud user upon request. An unauthorized user can
data is transferred and unused data are cleaned up. put a set of intelligent queries to the database server, of
Acknowledgement message is also transferred from the user which none of the query is forbidden. So the unauthorized
and even related organization end. And the concerned vendor user, combining the set of replies, may get the secret
will be getting ready for the next transaction. information which is forbidden. Hence TPAS has the
responsibility to maintain the privacy of user data.
Mohanty, pattnaik, and mund (2014) propose The auditing
aspects in Cloud Computing Environment are discussed as 2.3 AUDIT CLOUD COMPUTING TECHNOLOGY BY THE BIG FOUR
follows: AUDIT FIRMS
1. Auditing for regulation or compliance: A set of rules and The Big four is the four largest accounting firms that handle
principles are designed to govern or control the conduct accounting services for a number of public and private
for auditing. Compliance is concerned with legal issues, companies. The Big Four includes Deloitte Touche Tohmatsu,
social activities, marketing strategies, and co-operative Pricewaterhousecoopers, Ernst & Young, and KPMG. The Big
conduct. In every aspects of compliance, auditing is highly Four was formed in 2002 after a series of mergers, including
needed for maintenance of governing conduct. Auditing the collapse of Enron, reduced the original eight down to four
for regulations and compliance is also needed to restrict For how are the big four audit performing Risk based audit
increasing complexity to comply with standards and to approach in cloud computing envionmental in this paper. The
maintain the agreement for privacy laws. firms participating in this study represent two of the four largest
2. Auditing for Risk and Governance: Governance is audit firms consist of KPMG and Deloitte.
exceedingly concerned with the performance
measurement & its strategies and risk management & its 2.3.1 HOW ARE THE BIG FOUR TO AUDIT WITH RISK-BASED
proper administration is also an important issue of an IT AUDIT APPROACH ON CLOUD COMPUTING ENVIRONMENT
landscape. Different management laws and policies,
priority & resources needed for the processes, alignment DELOITTE
of customs are the basic functionalities of this category. In Deloitte presentation (2014) entitled "Cloud Computing -
3. Auditing for security: Security issues are the concern for What Auditors need to know ". Explaining the risks and control
auditing. In the administration security, everyone should company's that move to cloud , cloud effect on Auditing , and

7
IJSTR©2016
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 08, AUGUST 2016 ISSN 2277-8616

its influence on the internal auditor's role , how to manage  Are there over-riding concerns related to security, privacy,
risks , and solutions based on the risk-based approach and availability given the nature of the business?
Deloitte, (2014) states that Cloud computing is a challenge for
Auditing , Phase 2 – Vendor due diligence
a. A disruptive technology, like cloud computing, can impact  Does the technological direction of vendor align with the
―how‖ to audit. user organization‘s direction?
b. Internal audit and compliance have a key role to play in  Is the vendor stable from a finance and operations
helping to manage and assess risk as cloud services perspective?
evolve, especially for third-party compliance‖
c. Deloitte asserts that understanding the various cloud Phase 3 – Establishing vendor relationships
models by risk based approach will help manage risk. that  Are there service-level agreements and escrow?
by understanding the various threats on cloud models  Do you know who is responsible for what‘?
used to approach Risk-based Approach will help to
manage risk Phase 4 – Ongoing monitoring
c. Deloitte (2014) propose Tools and dan framework standar,  Does the vendor continue to operate with stability?
as follow:  independent auditor‘s report?
 Standar framework controlnya menggunakan NIST SP  Is there an auditor s
800-53, NIST SP 800-144, SP 800-30
 Deloitte untuk membantu proses auditnya dengan Phase 5 – Closing the relationship
membuat Deloitte Cloud Computing Risk Intelligence Map  Data transfer and clean up
dan Cloud Security Alliance - Cloud Controls Matrix
 Knowledge transfer
d. Developing audit base risk approach the name is
Deloitte‘s Cloud Computing Risk Intelligence Map
KPMG (2013) in the exposure of ―the Cloud Computing : Risks
and Auditing‖. IIA Chicago Chapter 53rdAnnual Seminar . April
Use and Benefits
15, 2013 to explain how the cloud computing division of the
i. Identifies significant risks that may be introduced by cloud
dimensions of risk and consideration of the audit of the risk.
computing
KPMG share risks in cloud computing environments in several
ii. Expands the risk discussion to the broad range of risks
dimensions as follow ;
that need to be considered across the enterprise
e. The Cloud Security Alliance (CSA) Cloud Controls Matrix
Here is a cloud computing audit in five areas deemed relevant
(CCM) is specifically designed to provide fundamental
KPMG:
security principles to guide cloud vendors and to assist
1. Data Protection
prospective cloud customers in assessing the overall
2. Risk Technology
security risk of a cloud provider.
3. Identity and Access Management
4. rules
It provides a controls framework is aligned to the Cloud
5. Operation
Security Alliance guidance in 16 domains.
1. The foundations rest on its customized relationship to other
industry-accepted security standards, regulations, and 4 CONCLUSION
controls frameworks such as the ISO 27001/27002, ISACA Audit in a cloud environment is a combination of information
COBIT, PCI, NIST, Jericho Forum and NERC CIP systems audit and audit of Information Technology (audit of
2. It will augment or provide internal control direction for SOC infrastructure IT). Understanding the process of auditing in
attestations provided by cloud providers. Based on the cloud computing environments with knowing there was have
above understanding can be concluded that Deloitte two audit site consist of audit on-site service cloud provider
conducted audits based on risk by developing the technique (CSP) and audit at the company's site (costumer cloud
itself is Deloitte 's Cloud Computing Risk Intelligence Map, service). the risk-based approach (RBA) process for cloud
and consider the role of internal audit and to help manage computing is complicated because the technologies and
and assess the risks of cloud services is growing, it controls are housed outside the entity being audited and
indicates that an auditor in auditing the cloud should unfortunally Standard framework audit control cloud computing
understand IT well . is still in development. From the above problems Clearly we
could find there was differences in the Auditing framework that
KPMG conducted each audit firms, They are makes Cloud computing
KPMG in the exposure of ―Cloud Computing An Internal Audit superior risk intelligence maps that basically using Risk-based
Perspective‖ at the Institute of Internal Auditors Topeka audit approach. Cloud computing is a technology that is
Chapter December 6, 2011 KPMG suggests internal auditor to predicted to continue to grow so, will be crucial in the coming
conduct an audit in a cloud computing environment with the years , An auditor should be able to review the risk
relationship between risk takes from every phase in the Cloud assessment products and observe the process of risk
Outsourcing Lifec assessment. While the role of internal auditors is crucial in
developing additional understanding of this new technology to
Risk Related Considerations for Each Phase: add value and more to advise their companies on the relevant
Phase 1 – Establishing business case risks and controls, as internal auditors have a higher level of
 Is the work core to the organization‘s business? understanding of Business Processes and operational audit

8
IJSTR©2016
www.ijstr.org
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 5, ISSUE 08, AUGUST 2016 ISSN 2277-8616

53rdAnnual Seminar. April 15, 2013, Donald E. Stephens


ACKNOWLEDGMENT Convention Center. Retrieved from ;
I thank an reviewer Prof. Dr. Azhar Susanto, PGDBus., SE., Ak., https://chapters.theiia.org/chicago/Annual%20Seminar%20Pres
CPA., CA. and all participants at my Information System Auting entations/E3%20-
class in DIA Unpad for the helpful suggestions and comments on %20Cloud%20Computing%20Risks%20and%20Auditing.pdf
earlier drafts of this paper. Financial support from LP3I is
gratefully acknowledged. [15] Ransome, James F., and John W. Rittinghouse. 2010. Cloud
Computing Implementation, Management, and Security . Boca
REFERENCES Raton London New York. Gower Publishing Company.
[1] Arens, Alvin, A., Elder, Randal J. and Beasley , Mark S. 2012.
Auditing and Assurance Services An Integrated Approach.
International Edition, Fourth Edition. New Jersey: Pearson
Prentice-Hall Inc.

[2] Becker, Jack D. & Elana Bailey. 2014. IT Controls and


Governance in Cloud Computing. AMCIS Proceedings
forthcoming

[3] Bierstaker , James L. , Priscilla Burnaby and Jay Thibodeau.


2001. The Impact of Information Technology on the audit
Process: an assessment of the state of the art andimplications
for the future. Managerial Auditing Journal, 16/3 [2001] 159-164

[4] Deloitte (2014). Cloud Computing –What Auditors need to .


Retrieved from http://www.ucop.edu/ethics-compliance-audit-
services/_files/webinars/10-14-16-cloud-
computing/cloudcomputing.pdf

[5] Griffiths, Phil. 2005. Risk-based auditing. Burlington USA.


Gower Publishing Company.

[6] Halpert, Ben. 2011. Auditing Cloud Computing A Security and


Privacy Guide.john Wiley & Sons, Inc. Hoboken, New Jersey.
Canada.

[7] Lageschulte, Phil & Sailesh Gadia.. 2013. Cloud Computing:


Risks and Auditing in IIA Chicago Chapter 53rdAnnual Seminar.
Convention Center. KPMG. USA. Retrieved from

[8] Wieger, Partner

[9] Madhav Panwar. 2013. Special Cloud Computing Guide &


Handbook. SAI. U.S.A.

[10] Messier, William F. 2008. Auditing & assurance services: a


systematic approach, Fifth Edition. New JerseyYork. McGraw-
Hill Companies.

[11] Mell, Peter and Timothy Grance. 2011. Special Publication 800-
145. Departement of Commerce National Institute of Standards
and Technology (NIST). U.S.

[12] Mell, Peter and Timothy Grance. 2011. Special Publication 800-
145. Departement of Commerce National Institute of Standards
and Technology (NIST). U.S.

[13] Mohanty, suneeta., prasant kumar pattnaik, and ganga bishnu


mund. 2014. framework for auditing in cloud computing
environment. Journal of Theoretical and Applied Information
Technology.

[14] Lageschulte, Phil. and Sailesh Gadia (KPMG). 2013. Cloud


Computing: Risks and Auditing. IIA Chicago Chapter
9
IJSTR©2016
www.ijstr.org

You might also like