Data Security and the Cloud: Get Up to Speed on Service Organization Control Reports
NEW YORK, March 26, 2012 -- Most people are wary of electrical devices that don't carry a seal of approval from Underwriters Laboratories, or a bank that isn't FDIC insured. Wouldn't it be great if there was something similar that businesses could rely on when choosing a cloud computing vendor?
With the marketplace still evolving, however, there isn't a single "thumbs up, thumbs down" standard for cloud security. Yet business technology leaders still have to make the right call on outsourced IT vendors and the integrity of data centers they use to deliver information to the cloud. The dilemma: many decision-makers are unfamiliar with or lack confidence in choosing the best services to make those assessments.
To address this need, the American Institute of CPAs has developed a series of services for data centers that, once completed, lead to documents called Service Organization Control (SOC) ReportsSM. SOC 1SM reports refer to controls of centers that impact customers' internal controls over financial reporting, while SOC 2 SM reports cover system reliability criteria, including data security, privacy, confidentiality, system availability and operating integrity. A SOC 3 SM report, meanwhile, is a short-form version of the SOC 2 report and the only one of the three that's designed for public consumption.
Making sure a vendor uses data centers that have gone through the proper audit engagements is critical for businesspeople who plan to use cloud-based services. Information security is the leading IT concern for small firms and large companies alike, according to the recent 2012 Top Technology Initiatives Survey by the American Institute of CPAs. Yet survey takers, speaking on behalf of their firms and clients, said they felt less confident about correctly using SOC reports than they did almost any other technology priority.
What should decision-makers do to make the right choices? Here are some tips:
- Don't assume all cloud vendors are created equal. Security precautions can vary widely.
- Question the credibility of firms that use inaccurate terms. Many vendors tout their data centers as "SAS 70 certified." But SAS 70 is an AICPA audit standard that has been superseded by SSAE 16 (which is covered by a SOC 1 report), and there is no such thing as a uniform certification process in this area.
- Ask for SOC 3 reports, where available, and whether a SOC 2 engagement has been performed. If a vendor doesn't have one, make sure you understand the degree to which the firm uses encryption, storage redundancy, password rotations and robust physical security so you can gauge how well your data will be protected.
- Make sure you have clear remedies spelled out if you suffer outages, data breaches or other issues regarding your critical business information.
- Learn more about SOC reports and other security standards. For CPAs and other financial professionals, the AICPA has an array of publications, webcasts and study courses available on the topic.
Posted: 2012-03-28 @ 10:56am PT
Something else that should be considered is ISO 27001 or FedRamp for Cloud Security. You can read about both on our website. http://www.pivotpointsecurity.com/risky-business/egovernment-cloud-security-fedramp