Using COBIT 5 For Risk To Develop Cloud Computing SLA Evaluation Templates
Using COBIT 5 For Risk To Develop Cloud Computing SLA Evaluation Templates
Using COBIT 5 For Risk To Develop Cloud Computing SLA Evaluation Templates
Abstract. The use of cloud services as a business solution keeps growing, but
there are significant associated risks that must be addressed. Despite the
advantages and disadvantages of cloud computing, service integration and
alignment with existing enterprise architecture remains an ongoing priority.
Typically, quality of services provided is outlined in a service level agreement
(SLA). A deficient template for evaluating, negotiating and selecting cloud
SLAs could result in legal, regulatory, and monetary penalties, in addition to
loss of public confidence and reputation. This research emphasizes (or advo-
cates) the implementation of the proposed SLA evaluation template aimed at
cloud services, based on the COBIT 5 for Risk framework. A gap analysis of
existing SLAs was done to identify loopholes, followed by a resultant template
where identified gaps were addressed.
1 Introduction
1.1 Background
Cloud computing remains a hot topic among vendors, enterprises and end users.
Different authors and industry experts advocate a variety of approaches to realize
benefits at optimal costs, and reduce associated risks from cloud computing [1, 2].
Some of the key benefits include: pay-as-you-go model, scalable solution that supports
rapid business growth, cost transparency to the end user or business, outsourcing of
competencies that are not core to the business, as well as mirrored solutions to mini-
mize the risk of downtime [1, 2].
For users, the cloud computing industry promises tremendous prospects of market
growth, but a wide range of potential risks and safety issues remain prominent [16].
Cloud challenges ranges from data privacy issues, responsibilities for security breach,
loss of physical control, availability concerns, cloud data backup and recovery,
implications for e-discovery, compromised system security, inaccurate billing, greater
dependency on third parties, to the inability of enterprises to satisfy audit/assurance
© Springer International Publishing Switzerland 2015
F. Toumani et al. (Eds.): ICSOC 2014, LNCS 8954, pp. 236–249, 2015.
DOI: 10.1007/978-3-319-22885-3_21
Using COBIT 5 for Risk to Develop Cloud Computing 237
charter and requirements of regulators or external auditors [1, 2, 18]. Well known
incidents with cloud services include: Amazon’s EC2 cloud service partial outage, the
security breaches of Sony’s PlayStation Network and Qriocity music service [19].
These events emphasized that customers’ inability to control their data remains a key
issue of the cloud computing model [19].
The Institute of Internal Auditors indicated that today’s auditors are faced with
increasingly new-and-improved technologies (including cloud computing) that are
transforming the business environment but introduces new risks that must be managed
[11]. Hence, through this research, an SLA evaluation template aimed at cloud com-
puting services, based on the COBIT 5 for Risk framework was developed.
(a) Cloud Computing Defined
According to the National Institute of Standards and Technology (NIST) and Cloud
Security Alliance (CSA), “Cloud computing is a model for enabling convenient, on-
demand network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly provisioned
and released with minimal management effort or service provider interaction”. Cloud
is composed of five essential characteristics, three service models, and four deployment
models [20, 21].
1
http://www.gartner.com/technology/topics/cloud-computing.jsp.
Using COBIT 5 for Risk to Develop Cloud Computing 239
2
http://blogs.idc.com/ie/?p=730.
240 O. Illoh et al.
research, Amazon and Microsoft emerged at the top for the following reasons: cus-
tomization of cloud SLAs and customer satisfaction. Hence, these best practice SLA
terms were grouped in five areas, though some are applicable in more than one area:
Confidentiality, Integrity, Availability, Auditability and Customer Satisfaction. Case in
point is the ‘Interoperability and Portability’ component that fits into Integrity and
Customer Satisfaction.
Patel, Ranabahu and Sheth proposed the Web Service Level Agreement (WSLA)
framework as a mechanism for managing SLAs in a cloud computing environment, in
addition to being developed for SLA monitoring and enforcement in a Service Oriented
Architecture (SOA) [23]. The third party support feature of WSLA was used to del-
egate monitoring and enforcement tasks, in addition to presenting a real world use case
to validate their proposal [23]. However, a risk-based approach in alignment with
COBIT 5 for Risk was not adapted or mentioned.
At the time of research, no existing cloud computing SLA evaluation template
aligned with the COBIT 5 for Risk framework was found. So, these key SLA terms
were mapped to COBIT 5 for Risk and the resultant scorecard prototype was used to
test Amazon’s SLA.
The scorecard prototype becomes the basis of risk analysis for the IT Risk Sce-
narios in COBIT 5 for Risk framework for cloud SLAs. An IT Risk scenario is an event
that can lead to loss and has a business impact, when and if it occurs [28]. These IT
Scenarios were adapted to the cloud environment and embedded into the gap analysis.
Table 4 shows the mapping of the SLA components to COBIT 5 for Risk. The
complete analysis table shows the twenty example scenarios that were adapted from
242 O. Illoh et al.
Table 3. Testing the scorecard prototype (SLA components) based on best practices from NIST,
ISACA and CSA with Amazon’s SLA
Scorecard prototype Amazon elastic compute
cloud (Amazon EC2) SLA
SLA components Addressed Not Vague
addressed
Confidentiality SSL, Encryption based on data √
classification (data at rest and in
transit)
Data (Information) Dispersion √
Secure Disposal (data security lifecycle) √
User Management, Access √
Control/Authorization
Human Resources/NDAs √
Identity and Access Management √
Segregation of Duties (SoD) √
Third Party Access √
Security controls √
Integrity Interoperability and Portability - must √
not affect data in any way
Data segregation (per multi-tenancy) √
Availability Uptime √
Contingency Planning (IR, DR, BC) √
Data Retention, Backup and Recovery √
Response time √
Source code escrow √
Auditability Independent Audits; sub-categories: √
Type of audit (type I or II), Frequency
(annual/semi-annual), scope/quality
(is CIA covered),
credibility/reputation of the auditing
firm
Change Management, Configuration √
Management and Patch Management
Audit Logging and Monitoring √
Penalty for noncompliance √
Cross-border issues/Compliance with √
Jurisdictional laws on Data Location
Security breach disclosure √
responsibilities
Third party certification (ISO/IEC √
27001/27017, SAS 70, PCI, etc.):
sub-categories-Type, Frequency and
CIA Components should be part of
the report
(Continued)
Using COBIT 5 for Risk to Develop Cloud Computing 243
Table 3. (Continued)
Scorecard prototype Amazon elastic compute
cloud (Amazon EC2) SLA
SLA components Addressed Not Vague
addressed
System of internal controls (e.g. Policies √
and Procedures)
Review of SLA metrics and compliance √
Right to audit clause √
Customer Pricing Plans √
Satisfaction Performance (usage, load balancing, √
(UnixBench delivery, quality, etc.)
components) Maintenance and Service Support √
Flexibility to Customers’ Request √
Scale Up/Scale Out - Interoperability √
and Portability
COBIT 5 for Risk and tailored to cloud computing. These Risk Scenario Categories are
high level descriptions of the category, while Risk Type are types to which scenarios
derived from the gap analysis will fit (using three risk types which could be primary fit
(higher degree)-P/secondary fit (lower degree)-S/blank for non-related risk scenario).
The three risk types are [28]:
• IT benefit/value enablement risk (resulting from lost opportunities to leverage
technology for new business initiatives or improve the efficiency or effectiveness of
business processes).
• IT programme and project delivery risk (related to the contribution of IT to new or
improved business solutions, through projects and programmes).
• IT operations and service delivery risk (as a result of operational stability, avail-
ability, protection and recoverability of IT services that can destroy or reduce
enterprise value).
Amazon’s publicly available SLA - Elastic Compute Cloud (Amazon EC2) was
tested against the scorecard prototype and results are shown in Table 3 above. The
rating scale in three categories are: Addressed (where the SLA component is clearly
stated), Not Addressed (if not stated) and Vague (if it’s unclear how the SLA com-
ponent is addressed). According to the test, majority of the SLA components fall into
the ‘Not Addressed’ category and are gaps to be discussed or negotiated with the CSP.
This is just an example of how the scorecard prototype can be applied to any SLA.
This initial audit helps in identifying gaps and risks the enterprise needs to manage.
If an SLA component is not stated in the SLA, it becomes the customer’s responsi-
bility. Where the SLA component is important, the cloud consumer should see if it can
be negotiated with the CSP to reduce risk and cost. The importance of evaluating the
amount of risk being shared cannot be overemphasized. This evaluation should also
identify the risk either the consumer or CSP are responsible for. Any risk that cannot be
Table 4. Mapping of SLA components to COBIT 5 for risk - cloud SLA evaluation template
244
negotiated with the CSP must be addressed by the consumer through various risk
management practices. The goal is to realize benefits from cloud initiatives while
optimizing resources and managing risks.
3 Conclusion
In this paper, a scorecard prototype was developed to effectively help cloud users
evaluate and select the best suitable CSP for its business needs while minimizing
potential risks. Best practices from NIST, ISACA and CSA were identified as reference
SLA parameters that can be used in SLAs and measurement of provider’s performance.
Incorporating these terms in SLAs (either as standard or negotiated terms), assures
cloud users of their providers’ commitment and responsibility in securing and pro-
tecting their data, as well as information assets.
Though the initial evaluation template has been generalized, this paper is the first in
its direction for future work where each SLA component can be further addressed.
Recommendations for future work also includes taking a company considering moving
to the cloud as a case study, specifically tailoring the template for the company, and
testing the template prior to acquiring cloud services.
Acknowledgement. The first author will like to thank Concordia University of Edmonton’s
research team for their guidance and support in the completion of this work. Their efforts,
knowledge and experience were instrumental in making this paper a success. She acknowledges
the Academic Research Council for the Student Research Grant awarded to her. She is also
thankful to God Almighty, her family and friends; this has been a journey and she is very grateful
for their love, support and encouragement.
References
1. Information Systems Audit and Control [ISACA]: Cloud computing management
audit/assurance program (2010)
2. Gadia, S.: Cloud computing: an auditor’s perspective. ISACA J. 6, 1–2 (2009). http://www.isaca.
org/Journal/Past-Issues/2009/Volume-6/Pages/Cloud-Computing-An-Auditor-s-Perspective1.
aspx
3. ISACA: Cloud governance: questions boards of directors need to ask (2013)
4. ISACA: Security considerations for cloud computing (2012)
5. Jirasek, V.: Cloud governance done right: examples from the trenches. BrightTALK (2013)
6. Sinnett, W.M: In the Cloud and Beyond. Financial Executive (February 2012)
7. CSA and ISACA: Cloud computing market maturity: study results (2012)
8. de Chaves, S. A., Westphall, C.B., Lamin, F.R.: SLA perspective in security management
for cloud computing. In: IEEE ICNS, pp. 212–217 (2010)
9. Subbiah, S., Muthukumaran, S.S., Ramkumar, T.: Enhanced survey and proposal to secure
the data in cloud computing environment. In: IJEST, vol. 5, no. 01 (2013)
10. Awad, R.: Considerations on cloud computing for CPAs. CPA J. 81(9), 11 (2011)
11. Jackson R.A.: Audit in a digital business world. In: The Internal Auditor Magazine, pp. 36–
41 (2013)
Using COBIT 5 for Risk to Develop Cloud Computing 249
12. Symantec Corporation: Choosing a cloud hosting provider with confidence: Symantec SSL
certificates provide a secure bridge to trusted cloud hosting providers (2012)
13. Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. Gartner Research,
ID G00157782 (2008)
14. Smith, D.M, Plummer, D.C, Bittman, T.J, Bova, T, Basso, M, Lheureux, B.J, Prentice, B.:
Predicts 2013: cloud computing becomes an integral part of IT. Gartner, ID: G00230929
(2012)
15. Gartner. http://www.gartner.com/technology/topics/cloud-computing.jsp
16. Wu, J., Shen, Q., Wang, T., Zhu, J., Zhang, J.: Recent advances in cloud security.
J. Comput. 6(10), 2156–2163 (2011)
17. Tschinkel, B.: Cloud computing security understanding risk areas and management
techniques (2011)
18. Gordon, M.: The compliant cloud. BrightTALK (2009)
19. Moore, J.: [CNBC]: Reducing security risks in cloud computing. http://www.cnbc.com/id/
43139361/Reducing_Security_Risks_in_Cloud_Computing
20. Badger, L., Grance, T., Patt-Corner, R., Voas. J.: Cloud computing synopsis and
recommendations. In: NIST, vol. 800, p. 146. Special Publication (SP) (2011)
21. CSA: Security guidance for critical areas of focus in cloud computing v3.0 (2011)
22. NIST: NIST US government cloud computing technology roadmap, Release 1.0 (Draft) - In:
NIST, vol. 500, p. 293. Special Publication (SP) (2011)
23. Patel, P., Ranabahu, A., Sheth, A.P.: Service level agreement in cloud computing (2009)
24. Wei, D.S.L., Murugesan, S., Kuo, S., Naik, K., Krizanc, D.: Enhancing data integrity and
privacy in the cloud: an agenda. IEEE Comput. Soc. 46, 87–90 (2013)
25. Bort, J.: The 10 most important companies in cloud computing. Business Insider (2013)
26. Loftus, T.: Public cloud vendors side by side by side. Wall Street J. 1–3 (2013). http://blogs.
wsj.com/cio/2013/02/26/public-cloud-vendors-side-by-side-by-side/
27. Cloud Spectator: Cloud server performance: a comparative analysis of 5 large cloud IaaS
providers (2013)
28. ISACA: COBIT 5 for risk framework, pp. 67–74 (2013)