Print-friendly Course Description and Outline
Cloud computing has been described as “the ultimate form of outsourcing.” This refers to the fact that moving into the cloud allows the enterprise to outsource or rent infrastructure, IT services, application software, or any combination of these. In other words, IT services are purchased using a linear utility model.
Although the cloud model is attractive, chief information officers express near-universal concern about one issue: security. This concern includes unauthorized access to sensitive business data (by outsiders or insiders at the cloud ISP); availability and performance; location of the data (certain sensitive data may be prohibited by law from being stored outside the enterprise’s country boundaries); ability to retrieve the data in the event of contract termination; auditability; physical security at the ISP; and more.
The cloud model uses three models, each with their own security, control, and operational concerns. This seminar addresses these issues and explores how to protect the enterprise assets.
In this course, we will discuss the critical issues to be considered:
- Before the cloud contract is signed.
- For the duration of the contract.
- At contract change or renegotiation.
- At the end of the contractual relationship.
|Course Duration: 1 day(s)
|CPE Hours Available: 7
|Knowledge Level: Intermediate
|Field of Study: Auditing
|Delivery Format: On-site Training (Group-Live)
- Why evidence is important
- Different types of evidence
- Methods to gather evidence
- Best types of evidence
- Determine and review audit evidence that is appropriate, sufficient, and persuasive to support audit conclusions — examples provided
Understanding the Cloud Model
- The pay-as-you-go (PAYG) model for IT services
- The three basic models: IaaS, PaaS, SaaS
- Business value of cloud computing
- Corporate goals for each model
- Motivation for each model
- Necessary partnership with ISPs and other vendors
Business Risks With the Cloud Models
- Contractual issues
- Strategic risk
- Standards and lack thereof
- Maintaining the same level of control
- Tactical issues
- Privacy and confidentiality
- Data Integrity
- Availability and recoverability
- Risks with virtual machine environments
Managing the Cloud
- Encryption, encryption, encryption
- Data interchange
- Key management
- Meaningful metrics
- Security and risk assessment
- Mutual responsibilities
- Public vs. private clouds
- International: privacy, data location, data dispersal
- End of life/termination of agreement
- Compliance with laws and regulations
- Independent auditing
Most courses can be delivered through on-site training. You might be surprised that the organization leading the profession is just as committed to the delivery of affordable training.
Contact us by calling +1-407-937-1388 or send an e-mail to GetTraining@theiia.org.