Regístrese ahora para una mejor cotización personalizada!

Q&A: Cisco IT's Lessons Learned In Assessing the Risk of New Cloud Services

Oct, 02, 2014 Hi-network.com

2,000+

That is the approximate number of cloud services that Ken Hankoff, Manager of Cisco IT Risk Management's Cloud and Application Service Provider Remediation (CASPR) Program believes Cisco's 70,000 employees use. For the last 14 years, this program has assessed and remediated risks associated with using a cloud-hosted service.

An assessment process for new cloud services is a vital step toward reducing the risk of using externally hosted services. Many customers I speak with struggle to rapidly assess cloud services and integrate them into their IT organization. As part of my blog series on governing cloud service adoption, I asked Ken to share some of his 'lessons learned' in assessing the risks of cloud services and bringing them into Cisco IT's fold.

How do you ensure that teams wanting to use new cloud services work with your team?

Our team is not in the business of sourcing cloud vendors. That responsibility lies with the individual business units and their architecture teams who are seeking to use the service, often in partnership with IT. Once a vendor is selected, there are two primary ways in which my team gets engaged. First, through the Global Contracts team as they have made Cloud Service Provider assessment a part of the contracting process, and second when a new service is being integrated within IT.

How do you evaluate whether a new cloud service is risky to the business?

We look at seven risk factors to create a formula for risk-business criticality, financial viability, security, resiliency, architectural alignment, regulatory compliance, and assessment status.

We establish the business criticality of the service to determine how Cisco would be impacted or disrupted in the event the capability provided by the vendor would go away, and whether we could react or compensate.

We then look at the financial viability of the vendor to give us comfort that they will remain in business. To evaluate vendors we leverage Dunn & Bradstreet's Predictive Scores & Ratings. We rely heavily on Cisco's Information Security (InfoSec) organization to provide us with a Security Composite Risk score. Depending on the parameters of the cloud provider engagement, InfoSec will look at the vendor's application development process, infrastructure, data handling security, system-to-system interoperability, and other areas. For resiliency we focus on how they meet our standards around business continuity and disaster recovery to ensure that our business data will be there when needed, regardless of what happens.

We also need to ensure that we stay compliant with regulations. A vendor that has to comply with HIPAA, SOX, or other regulatory/privacy requirements poses a higher risk than one that doesn't.  For this reason, we look into whether regulatory compliance is a factor, and if so, that it is addressed appropriately.

Finally, we also assess if the vendor aligns to the broader architecture that Cisco IT is investing in to support the business. Vendors are deemed higher investment risk if they do not align to the business and operational roadmap that Cisco is pursuing.

We re-asses vendors on a periodic basis according to their overall risk score. If a service is overdue for a reassessment, that in itself increases the risk of doing business with the provider, so we factor it in.

In your opinion, what are the three most important things to manage the business risks of cloud services?

First, I would suggest establishing ownership and governance of cloud services via a centralized PMO at enterprise level, not just within IT. This ownership needs to go beyond just assessing vendors for security risk, and focus on establishing company-wide policies for overseeing cloud services at the enterprise level.

Second, provide visibility into existing services and how they are being used. This helps enable a catalog of assessed and approved vendors for people to access. If you can have fewer vendors being used, you can reduce your risk.

Third, continually monitor services across the board to know what risks we might be facing, and ensure that the service providers are meeting their SLAs. Additionally, this helps to ensure that investments aren't being wasted. There is a natural CSP application lifecycle -selection, implementation, adoption, and eventually that service usage might decline and you may end up supporting something that has very few users if you don't have a lifecycle approach to phasing out services.

What is your biggest lesson learned in assessing new cloud services?

I wish the program had collected more metrics earlier. What we are finding is that there are a significant number of services being contracted all over the company. By collecting really good metrics we might have been more effective in showing executives what services are being used, who is using them, and how. We are making good progress on this now, but I wish we started earlier.

How are you monitoring cloud services and gathering this intelligence?

Our professional service team has helped us a great deal. With the Cisco Cloud Consumption Services, we have begun to capture an enterprise view of what cloud services are being used, by whom and have a great dashboard of metrics we can now use to inform Cisco executives. I never imagined before we were using the software that we had nearly 2,000 cloud services in use, but with Cisco Cloud Consumption we now know and can monitor activity.

Learn more about how Cisco can help monitor and manage cloud providers athttp://www.cisco.com/go/cloudconsumption.

 


tag-icon Etiquetas calientes: nube Seguridad en la nube Cisco IT cloud risks Cisco on Cisco cloud governance

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.