Outsourcing Involving Cloud Computing Services

Transcription

OUTSOURCING INVOLVING CLOUD COMPUTINGSERVICES24 September 2018

Disclaimer and CopyrightWhile APRA endeavours to ensure the quality of this publication, it does not accept anyresponsibility for the accuracy, completeness or currency of the material included in thispublication and will not be liable for any loss or damage arising out of any use of, orreliance on, this publication. Australian Prudential Regulation Authority (APRA)This work is licensed under the Creative Commons Attribution 3.0 Australia Licence(CCBY 3.0). This licence allows you to copy, distribute and adapt this work, provided youattribute the work and do not suggest that APRA endorses you or your work. To view a fullcopy of the terms of this licence, visit TRALIAN PRUDENTIAL REGULATION AUTHORITY2

ContentsIntroduction4Glossary6Chapter 1 – Risks must be understood and managed7Risks are a function of usage7Assessment of materiality7Chapter 2 — Risk management 10Solution selection process12APRA access and ability to act13Transition approach14Risk assessments and security14Implementation of controls16Ongoing oversight19Business disruption19Audit and assurance21Chapter 3 – APRA notification and consultation23Materiality and notification23Consultation23ConclusionAUSTRALIAN PRUDENTIAL REGULATION AUTHORITY253

IntroductionIn July 2015, APRA published an information paper titled ’Outsourcing involving sharedcomputing services (including cloud)’1 which outlined prudential considerations and keyprinciples that should be considered when adopting use of cloud computing services. Thispaper updates the July 2015 paper.The update is a response to APRA’s observation of the growing usage of cloud computingservices by APRA-regulated entities, an increasing appetite for higher inherent risk activities,as well as areas of weakness identified as part of supervisory activities.Furthermore, since 2015, there has been continuous evolution of both cloud computingservice offerings and APRA-regulated entities’ risk management. Generally, serviceproviders have strengthened their control environments, increased transparency regardingthe nature of the controls in place, and improved their customers’ ability to monitor theirenvironments. APRA-regulated entities have also improved their management capability andprocesses for assessing and overseeing the services provided.APRA recognises that the risks associated with the use of cloud computing services willdepend on the nature of the usage, and for the purposes of this paper APRA has classifiedthese risks into three broad categories: low, heightened and extreme. For arrangements with low inherent risk not involving off-shoring, APRA would not expectan APRA-regulated entity to consult with APRA prior to entering into the arrangement.For arrangements with heightened risk, APRA would expect to be consulted after theAPRA-regulated entity’s internal governance process is completed.For arrangements involving extreme inherent risk, APRA encourages earlier engagementas these arrangements will be subjected to a higher level of scrutiny.APRA expects all risks to be managed appropriately commensurate with their inherent risk.However, for extreme inherent risk, APRA expects an entity will be able to demonstrate toAPRA’s satisfaction, prior to entering into the arrangement, that the entity understands therisks associated with the arrangement, and that its risk management and risk mitigationtechniques are sufficiently strong.This Information Paper is relevant for a broad audience including boards, seniormanagement, risk management, technical specialists and internal audit.Finally, APRA has a number of existing prudential standards and practice guides which arepertinent to cloud computing services. 2 This Information Paper applies the concepts1Information paper: Outsourcing involving shared computing services (including cloud) July 20152Prudential Standards and Prudential Practice Guides: CPS 231 Outsourcing; SPS 231 Outsourcing; HPS231Outsourcing; PPG 231 Outsourcing; SPG 231 Outsourcing; CPS 232 Business Continuity Management; SPS 232 BusinessContinuity Management; CPG 233 Pandemic Planning; (draft) CPS 234 Information Security, CPG 234 Management ofSecurity Risk in Information and Information Technology; and CPG 235 Managing Data Risk.AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY4

included in those standards and guides and APRA intends to reflect the principles in thispaper in future guidance updates. APRA-regulated entities are welcome to submit feedback,through their normal supervisory interaction with APRA, on aspects of this paper and anyissues relevant to its use as prudential guidance.Cloud computing servicesCloud computing provides scalable technology services through the sharing of IT assets(including computer processing, network, storage and software).For the purposes of this Information Paper, ‘cloud computing services’ captures allarrangements involving the sharing of IT assets with other parties (whether labelled cloudor otherwise). This includes public cloud, virtual private cloud and community cloudarrangements, but excludes arrangements where IT assets are dedicated to a singleAPRA-regulated entity (i.e. private cloud).AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY5

GlossaryDesensitised dataDesensitised data is data for which the sensitive elements of thedata (such as customer data) have been replaced with userdefined substitutes. Desensitisation techniques include datatransposition, data anonymisation, data randomisation, and dataencryption. The strength of the desensitisation techniques usedwould typically be commensurate with the sensitivity of the data.IaaSInfrastructure as a service. This service typically involves thesharing of physical hardware arrangements involving storage,servers, networking or virtualisation.IT operating modelAn IT operating model comprises processes for managing andmonitoring the IT environment (both shared and dedicatedcomponents) including asset lifecycle, change, processscheduling, capacity, performance, incidents, security, access,backups and logging.IT security modelAn IT security model comprises the security management andcontrol framework surrounding the arrangement includingcontrols to isolate, delineate and protect the APRA-regulatedentity’s IT assets from other parties, operational security, identitymanagement, administration rights and management ofencryption keys.Out-of-band dataThe creation of backup copies via a different mechanism to thatused for real time replication (as typically used for highavailability systems). The intent is to ensure that any fault orfailure (either physical or logical) impacting the replicationmechanisms does not impact on backup copies.backupsPaaSPlatform as a service. This service typically involves providingoperating systems, middleware, database or runtime services.SaaSSoftware as a service. This refers to the provision of software forbusiness users. Examples include customer relationshipmanagement, enterprise applications (e.g. payroll, humanresource management, and general ledger) and productivityapplications (e.g. word processing, spreadsheets, email).AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY6

Chapter 1 – Risks must be understood andmanagedRisks are a function of usageWhile cloud computing services may bring benefits, such as economies of scale, they alsobring associated risks. These risks can vary considerably depending on the particular usage.Prudential Standard CPS 231 Outsourcing (CPS 231), Prudential Standard SPS 231 Outsourcing(SPS 231) and Prudential Standard HPS 231 Outsourcing (HPS 231) include requirements toensure that risks associated with outsourcing arrangements are identified, assessed,managed and reported.As with any outsourcing arrangement, it is prudent for an APRA-regulated entity to only enterinto cloud computing arrangements where the risks are adequately understood andmanaged. This includes demonstration of: ability to continue operations and meet obligations following a loss of service and a rangeof other disruption scenarios;preservation of the quality (including security) of both critical and sensitive data;compliance with legislative and prudential requirements; andabsence of jurisdictional, contractual or technical considerations which may inhibitAPRA’s ability to fulfil its duties as prudential regulator, including impediments to timelyaccess to documentation and data/information.These matters are relevant whether the cloud computing service is provided directly, orthrough sub-contracting/on-sourcing arrangements entered into by the provider, eitherinitially or subsequently. This necessitates careful consideration of what is permissible withinthe outsourcing agreement, and ongoing awareness by the regulated entity of changes to theway services are provided.The nature of the services consumed also presents different risk profiles. Offerings can bebroadly classified into Infrastructure as a Service (IaaS), Platform as a Service (PaaS) andSoftware as a Service (SaaS) arrangements. With the consumption of these services, APRAregulated entities are placing reliance on the providers to manage an increasing aspect ofthe technology stack. Conceptually, this adds greater layers of abstraction and opaqueness,which can inhibit effective risk management.Assessment of materialityAPRA recognises that the risks associated with the use of cloud computing services willdepend on the nature of the usage. Therefore, for the purposes of this paper, risks areclassified into three broad categories: low, heightened and extreme. APRA’s expectations ofAPRA-regulated entities with respect to cloud computing services, and APRA’s supervisoryAUSTRALIAN PRUDENTIAL REGULATION AUTHORITY7

approach, will depend on the scale of the associated risks. Refer to Chapter 3 for APRA’snotification and consultation expectations in line with these categories.Low inherent riskArrangements which could, if disrupted (where disruption includes a compromise ofconfidentiality, integrity or availability of systems and/or data) present a low or negligibleimpact to business operations and the ability of the regulated entity to meet its obligations.Examples of cloud computing usage with low risk: applications and data stores with low criticality (a measure of the impact of a loss ofavailability) and sensitivity (a measure of the impact of a loss of either confidentiality orintegrity) as classified by the APRA-regulated entity;non-production environments (e.g. test and development) populated with desensitiseddata; andwebsites that deliver publicly-available information.Heightened inherent riskArrangements involving critical and/or sensitive IT assets that result in either an increasedlikelihood of a disruption or where a disruption would result in a significant impact tobusiness operations and the ability of an APRA-regulated entity to meet its obligations.Typically this would involve one or more of the following: exposure to environments which are available to non-financial industry entities (i.e.‘public cloud’) – as distinct from financial sector ‘community clouds’ where tenantshave comparable security requirements, risk profiles and risk appetites ;unproven track record of:o the provider;o the cloud computing service;o the specific usage;o the control environment; oro the APRA-regulated entity in managing an arrangement of comparable size,complexity and/or risk profile.a high degree of difficulty in transitioning to alternate arrangements;inability for an APRA-regulated entity to assess the design and ongoing operationaleffectiveness of the control environment;jurisdictional, contractual or technical considerations which may inhibit operationaloversight or business continuity in the event of a disruption (including impediments totimely access to documentation and data/information); and/ortransition to the arrangement involves a complex, resource intensive and/or timeconstrained program of work.AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY8

Extreme inherent riskHeightened inherent risk arrangements which could, if disrupted, result in an extremeimpact. Extreme impacts can be financial and reputational, potentially threatening theongoing ability of the APRA-regulated entity to meet its obligations.Examples of extreme inherent risk include public cloud arrangements involving systems ofrecord which maintain information essential to determining obligations to customers andcounterparties, such as current balance, benefits and transaction history.For usage of this nature, APRA would expect that entities can demonstrate that their riskmanagement and mitigation techniques and capabilities are sufficiently strong.AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY9

Chapter 2 — Risk management considerationsIntroductionThis chapter outlines issues for consideration by APRA-regulated entities when utilisingcloud computing services, including where APRA has identified weaknesses as part of itsongoing supervisory activities.This chapter does not address all aspects of the management of cloud computing services. Inaddition, the relevance and importance of the following considerations will vary in line withthe nature, intended usage and risk profile of the cloud computing services involved.StrategyWhen an APRA-regulated entity is considering the use of cloud computing services, it wouldbe expected to apply an appropriate amount of rigour to the planning of the target ITenvironment, and the transition from current state to the desired architecture and operatingmodel. This would typically be informed by business and technology strategies, and considerintegration with the broader IT environment and operating model.Strategies would normally include consideration of organisational change and requiredcapability to manage and operate such arrangements.Observed weaknesses: proposals driven solely by cost considerations rather than a clearly defined strategyand architectural roadmap;business cases and reporting to the Board and/or senior management which onlyfocuses on benefits and do not provide adequate visibility of associated risks; andchanges in required organisational capability are not sufficiently understood oraddressed.GovernanceAn APRA-regulated entity’s outsourcing governance framework should outline decisionmaking and oversight responsibilities with respect to outsourcing, including the use of cloudcomputing services. Areas addressed typically include the role of the board, seniormanagement and any delegations resting with a specific governance body or individuals. Forthe purposes of this Information Paper, this is referred to as the ’appropriate governanceauthority’.The appropriate governance authority should form a view as to the adequacy of the risk andcontrol frameworks to manage the arrangement in line with the board risk appetite. ThisAUSTRALIAN PRUDENTIAL REGULATION AUTHORITY10

would generally include undertaking sufficient due diligence and thorough analysis of therisks involved to understand the consequences if the risks are realised, and the adequacy ofany mitigants in place.It is important that the appropriate governance authority is informed of all materialinitiatives involving cloud computing arrangements. This includes the provision ofappropriately detailed information at significant stages. Once a firm proposal has beenidentified this information would include: how the proposal aligns to the strategy, the business case, alternative optionsconsidered and rationale for the selected solution, including justification for additionalrisk exposures;IT assets in scope, categorised by sensitivity and criticality;materiality assessment, including impact on business processes, systemsarchitecture, organisation and operating model;high-level risk and control assessments, risk profiles, plausible worst-case scenariosand alignment to risk appetite and tolerances;services selected, products and parties involved and delivery location(s); anddue diligence undertaken and assurance obtained.Once the detailed solution is designed and transition plans are in place: governance, project, risk management and assurance frameworks (initial andongoing);IT operating model and IT security model to be applied, and associatedroles/responsibilities of all parties;alignment to regulatory standards and guidance;architectural overview (including transitional states) for hardware, software and datastores;detailed risk and control assessments, risk profiles and alignment to risk appetite andtolerances;continuity of service strategy, including high-availability , recovery and provider failureconsiderations;organisational change management and transition plan; andproject structure and schedule, including key stages, milestones and timeframes.During project execution, the board, governance committee or other appropriate governanceauthority within the entity would normally be kept informed, as appropriate, regarding projectstatus and emerging risks and issues.For initiatives with heightened inherent risk, engagement with APRA would typically occurafter the APRA-regulated entity has completed its internal governance processes, and theinitiative has been fully risk-assessed and approved by the appropriate governance authority.For cloud initiatives with extreme inherent risk, it would be appropriate for regulated entitiesto engage with APRA once a firm proposal has been identified, and initial approval to proceedhas been given by the appropriate governance authority.AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY11

For further information on APRA engagement refer to Chapter 3.Solution selection processThe selection of the solution involving cloud computing would typically be conducted in asystematic and considered manner. This includes ensuring the selected solution minimisesrisk wherever possible, and complies with the processes established by the entity forchanging the IT environment including security, risk management, IT architecture,procurement and supplier management.Observed weaknesses: solutions not aligned to the desired enterprise architecture;bypassing established risk management and outsourcing frameworks; andfailure to engage with the risk, security, outsourcing and assurance functions at theinitiation stage.A comprehensive due diligence process, including independent assessments, rather thanplacing sole reliance on attestations by the provider and customer references, wouldnormally be conducted. The intent would typically be to verify the maturity, adequacy andappropriateness of the provider and services selected (including the associated controlenvironment), taking into account the intended usage of the cloud computing service. Thedepth of due diligence undertaken would normally be commensurate with the criticalityand/or sensitivity of the IT assets involved and the level of reliance the APRA-regulated entityplaces on the provider to maintain effective security controls.An APRA-regulated entity should consider the benefits of the following factors as ways ofreducing inherent risk as part of the solution selection process: Australian-hosted options, if available, in the absence of any compelling businessrationale to do otherwise. Australian hosting eliminates a number of additional riskswhich can: impede a regulated entity’s ability to meet its obligations; or impede APRAfrom fulfilling responsibilities considered necessary in its role as prudential regulator;andcloud computing services only used by parties which have comparable securityrequirements, risk profiles and risk appetites (such as other financial sector entities).Some cloud computing services offer a high degree of flexibility in how the solution isimplemented. In these circumstances, design and architectural considerations would includehow to minimise the risk of a loss of confidentiality, integrity and availability. Better practicewould be to design the solution and associated control on the assumption that the cloudenvironment is ’untrusted’ and therefore could be compromised.Once the solution design is completed, it would be appropriate to conduct a risk assessmentconsidering the following:AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY12

ability for the APRA-regulated entity to avoid a significant impact on business operationsand meet obligations regardless of technology, people, process or service providerfailure;ability to meet performance, capacity, security, high-availability , recoverability and otherbusiness requirements;adequacy of secure design principles and development practices;adequacy of processes to verify that software operates as intended within the cloudcomputing service;critical and/or sensitive IT assets which are accessible from the cloud computing service;ability to meet legislative and prudential requirements (including the outsourcingstandards); andany impediments which could inhibit APRA’s ability to fulfil its duties as a prudentialregulator. Additionally, under the outsourcing standards, APRA-regulated entities must developcontingency plans that allow for the cloud computing service to be provided through alternatemeans if required (e.g. transitioned to an alternative service provider or brought in-house), ifrequired. This would typically be achieved through:the development and periodic validation of exit strategies to be enacted on contract expiry(or otherwise), including consideration of the contractual and technical ability to isolateand clearly identify IT assets for transition to another arrangement or in-house; andconsideration of the removal of sensitive IT assets from the provider’s environment(including from backups and other copies). The intent of these contingency plans is to enable an orderly transition, if needed, whilecontinuing to meet obligations.APRA access and ability to actThe APRA outsourcing standards require APRA-regulated entities to include an APRA-accessclause in the outsourcing agreement. This includes access to both documentation andinformation, and the right for APRA to conduct onsite visits of the service provider.Observed weaknesses: impediments placed on APRA-access rights to the service provider (outsourcingstandards). Examples include placing caveats on APRA’s ability to access documents,information or the service provider.The APRA access clause is an important prudential tool, as it aims to remove legalimpediments which could inhibit APRA’s ability to fulfil its duties as a prudential regulator(e.g. when resolving an APRA-regulated entity, including implementation of the FinancialClaims Scheme (FCS) in accordance with Prudential Standard APS 910 Financial ClaimsScheme).AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY13

Transition approachIt is important that a cautious and measured approach is adopted for transitioning to a cloudcomputing service, particularly where risks are heightened. This would typically involvedefined stages of transition which allow for:piloting on lower-risk initiatives;assessment of the appropriateness of the service and provider for higher-risk futurestages;organisational change management, including assessment of the capability to overseeand manage proposed arrangements;assessment of any changes to the risk profile and alignment to risk appetite;consolidation of lessons learned and completion of any remediation activities; andclear go/no-go criteria and approval processes for each stage. Observed weaknesses: a ‘fast track’ transition to a cloud computing service rather than a cautious andmeasured approach.Regulated entities using cloud computing services would typically ensure clarity as to theoperating model and security model to be applied, and associated roles/responsibilities of allparties.Risk assessments and securityAn APRA-regulated entity would normally conduct initial and periodic security and riskassessments of all material service provision arrangements. Security and risk assessmentswould typically be conducted whenever a material change to existing arrangements occur.Comprehensive risk assessments typically include consideration of factors such as: the nature of the service (including specific underlying arrangements);the provider and the location of the service;the criticality and sensitivity of the IT assets involved;the transition process; andthe target operating model.Risk assessments are generally more effective when the risks are clearly described, and at alevel of granularity that allows for a meaningful understanding of the actual risks andmitigating controls associated with each risk, including any required remediation actions.Scenario analysis of plausible security events, including a loss of availability, is a usefultechnique to understand risks associated with the arrangement. This includes considerationof the risks to critical and/or sensitive IT assets which are accessible from the cloudcomputing service.AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY14

Observed weaknesses: high-level risk descriptions that lack clarity or describe control weaknesses ratherthan risks;lack of consideration of critical and/or sensitive IT assets which are accessible fromthe cloud computing service;inadequate consideration of the sensitivity of data (collectively and at the individual fieldlevel) when considering implementation solution options for cloud computing services;cursory risk assessments which fail to consider specific risks and changes to the riskprofile;control design and operation, and assurance obtained, do not accurately reflect APRAregulated entity responsibilities for operating and managing the arrangement; andlimited due diligence and assurance activities undertaken, with heavy reliance placedon provider attestations and/or usage by other organisations.It is important that the strength of the control environment is commensurate with:the risks involved;the sensitivity and criticality of the IT assets involved;the level of trust that will be placed on the cloud computing service environment; andthe shared responsibilities between the service provider and entity. The aspects of the control environment which would typically be managed by an APRAregulated entity include: maintaining data quality, information security (such as identity andaccess management, incident detection and response management, data loss prevention,vulnerability management, configuration management, encryption and key management) andthe ongoing monitoring of control effectiveness.An understanding of the nature and strength of controls required is typically achievedthrough initial and periodic (or on material change) assessments of design and operatingeffectiveness, including alignment with industry-agreed practices.Observed weaknessesInadequate consideration of the following: controls to prevent, detect and respond in a timely manner to unauthorised access andchanges to the APRA-regulated entity’s environment by internal staff and serviceprovider staff, service accounts, other customers or third parties, including anychanges to the environment which may weaken preventative controls (e.g.configuration changes to the entity’s environment or platform);access rights, ensuring they are limited to those required for the assigned role – forexample, a Platform as a Service (PaaS) provider requires access to maintain theplatforms supporting the customer’s environment but not the ability to access thevirtual assets within that environment;controls relating to administration console system access and encryption keymanagement;controls to ensure appropriate isolation from third parties to protect against intentionalor inadvertent security incidents;AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY15

protection of sensitive data, both in transit and storage, through cryptographictechniques;controls to protect critical and/or sensitive IT assets which are accessible from thecloud computing service;protection (e.g. using desensitisation) of sensitive data in non-production environments(e.g. development and test); andalignment of the disaster recovery environment with the security requirements of theproduction systems.System administrator capabilities enable the execution of high impact activities andpotentially provide unauthorised access to sensitive IT assets. Consequently, systemadministrator access entitlements would normally be subject to stronger controls,commensurate with the heightened risks involved. Additional controls relating to systemadministrator capabilities could include: administration tools, systems, consoles and other related software restricted to onlythose with authorisation;access restricted to the minimum time and capability required to perform an authorisedactivity;system administrators restricted from accessing sensitive IT assets through the use ofcryptographic, authentication and other techniques;four-eyes principle (also known as two-person rule) applied to high impact activities (e.g.deletion of an entire environment);restrictions on the location and number of authorised system administrators (an APRAregulated entity should have visibility of system administrators which could impact theentity’s environment);multi-factor authentication for system administrator access and activities;logging and other detective controls for monitoring system administrator activities; andbackup and log data protected through segregation of administrator duties andenvironments.Implementation of controlsThe nature of cloud computing services necessitates the allocation of responsibility for theimplementation of controls between the provider and the client. This is commonly referred toas the shared responsibility model. Due to the myriad of cloud computing service offeringsthat can be consumed, it would be prudent for APRA-regulated entities to carefully considerthe differing levels of

Cloud computing services Cloud computing provides scalable technology services through the sharing of IT assets (including computer processing, network, storage and software). For the purposes of this Information Paper, 'cloud computing services' captures all arrangements involving the sharing of IT assets with other parties (whether .