Cloud Auditing – Making Sure That Your Cloud Works Per Your Expectations

Cloud Auditing – Making sure that your cloud works per your expectations

As cloud computing get increasingly complex and finds use in core enterprise applications, it it time to pay more attention to auditing. Auditing ensures that your cloud installations works per your expecations. The auditing could be done either internally by your IT or business teams, or could be done by a third party service. Regardless of who does the audit, it is important to understand the different considerations in cloud auditing.

  1. Regulatory compliance audit

In many industries such as healthcare and finance, there are strong regulations that mandate how the data should be handled, where they should be stored and how the consumer data are protected. Not complying to the regulations might invite hefty fines and/or legal proceedings.

The regulatory compliance audit lists the all regulations that will affect your data and applications, and will check if each of those regulations are met in your cloud setup. For instance, regulations in some industries would prevent the storing of data offshore. In that case you have to make sure that your cloud service provider has domestic datacenters and uses them to handle your data and applications.

  1. Disaster Recovery/Business Continuity (DR/BC) audit

Disaster can strike an enterprise in many forms. There could be natural disasters such as floods, earthquakes, etc. and there could be manmade disasters that could disrupt your installations. It is the role of DR/BC audit to ensure that the IT infrastructure continues to be operational, at least partially, despite the disaster. Mean time to recovery and amount of data recovered are important metrics in this audit.

  1. Security audit

Security should be one of the most essential aspects of any enterprise IT system. Security audit must uncover the various vulnerabilities in your cloud solution. Some of the security issues include unauthorized access, intentionally destroying data and Denial of Service (DoS). The audit should make sure the setup is sufficiently protected against the common type of attacks and has the adequate level of security that satisfies the enterprise requirements. Sufficient attention must be paid to data security issues to protect against any information leakage.

  1. Performance and Reliability audit

One of the biggest considerations to move to the cloud involves around reliability. Reliability audit must make sure that your data is available to the employees and customers 24/7. The cost of downtimes can be very high, in terms of lost employee productivity and loss of goodwill from the customers. The audit should also spell out the SLA requirements and find out if all the providers satisfy those requirements.

Performance audits must identify the various metrics (time to save a document, loading time of the website landing page etc.) and verify if the cloud setup satisfies those metrics. The performance and reliability audits could also make use of stress tests to make sure the stack used is robust under severe load conditions.

  1. ROI and business audit

Migration to cloud computing has to make proper business sense and this audit computes the ROI (Return on Investment) for the cloud infrastructure you have spent your time and money. The audit should arrive at the total cost of the solution (including the retraining costs) and find out if it is cheaper than the alternatives.

Business audit must spell out various business metrics and goals against which the cloud services have to be tested.

By Balaji Viswanathan

Sorry, comments are closed for this post.

Comic
Martech In A Content Crazed World

Martech In A Content Crazed World

Content Crazed World Everywhere you look there are pop-up ads and offers, at times it can feel like overload. What used to be a few online ads on websites has now grown into a wild world of offers that consume your every device. These advancements in marketing technology can not only be overwhelming to the…

Hubgets – Advanced Collaboration, Enriched Communication

Hubgets – Advanced Collaboration, Enriched Communication

Advanced Collaboration Tool Sponsored series provided in collaboration with Hubgets Collaboration tools have advanced leaps and bounds with the advent of cloud technology, and the services available are only getting better. Promising features such as sophisticated group communication, productive management of tasks and meetings, and the ultimate dream, working remotely from some gorgeous island destination, innovative collaboration…

Verizon To Acquire Yahoo For $4.83 Billion

Verizon To Acquire Yahoo For $4.83 Billion

Verizon Communications Inc (VZ.N) said it had agreed to buy Yahoo Inc’s (YHOO.O) core internet business for $4.83 billion in cash, ending a lengthy sale process for the fading Web pioneer. Buying Yahoo’s operations will boost Verizon’s AOL internet business, which it bought last year for $4.4 billion, by giving it access to Yahoo’s advertising…

When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Cloud Comings and Goings

Cloud Comings and Goings

Cloud Power Amazon Web Services – the giant of cloud computing – is on track to do $10 Billion in revenue this year. Yet, rumors swirl that Apple may take a huge chunk of business away from them and Dropbox has definitely left AWS. Is something wrong at AWS? Wait, Salesforce.com (SFDC) – the granddaddy of…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…