SlideShare a Scribd company logo
1 of 19
Download to read offline
Data Center Audit Standards 
Keyur Thakore
Audit Standards 
Reasoned Insights 
2 
The standard logos are registered trademarks of their respective organizations.
AUDIT STANDARDS - AICPA 
Reasoned Insights 
3
AICPA SAS 70 
•American Institute of Certified Public Accountants Statement on Auditing Standards No. 70 audit, often referred to as SAS 70 audit, was first introduced in 1992. 
•The SAS 70 audit is meant to measure internal controls over financial reporting. 
•The SAS 70 audit has been one of the primary means used by data center operators to measure their technical processes around security and assure businesses of its data security practices. 
4 
Reasoned Insights
AICPA SAS 70 
•The SAS 70 audit, according to the AICPA, was never intended to be used by data centers to verify security. 
•The SAS 70 audit report was never intended to be a “certification”, rather a measure of whether a data center operator adheres to the controls it has established for itself. 
•The SAS 70 audit requires that the operators develop their own control framework, and then audit their security controls to report back to the customers. 
5 
Reasoned Insights
AUDIT STANDARDS - SSAE 
Reasoned Insights 
6
SSAE 16 
•In 2011, AICPA introduced the Statements on Standards for Attestation Engagements No. 16 (SSAE 16) for reporting on controls at services organizations including data centers. 
•SSAE 16 is the next generation of AICPA auditing standards, that goes beyond SAS 70 by requiring the auditor to obtain a written report regarding the design and operating effectiveness of the controls being reviewed. 
•An audit that is conducted under the SSAE 16 will result in a Service Organization Control (SOC) report. 
7 
Reasoned Insights
SOC 1 Report 
•A Service Organization Control (SOC) 1 report is produced upon the completion of an SSAE 16 audit. 
•SOC 1 reports are focused on internal controls over financial reporting. 
•SOC 1 reports are restricted use reports intended only for existing customers, not prospective customers or the general public. 
•SOC 1 report is available as Type 1 or Type 2 report: 
Type 1 reports is auditors’ opinion on the accuracy and completeness of management’s description of the system or service as of a specific date. 
Type 2 report audits the operating effectiveness of the controls throughout a declared time period, generally between six months and one year. 
8 
Reasoned Insights
SOC 2 Report 
•A SOC 2 report is intended to provide assurance about controls related to: 
1) security, 
2) availability, 
3) processing integrity, 
4) confidentiality and 
5) privacy of a system and its information. 
•A SOC 2 report is based on pre-defined controls criteria contained in the AICPA Trust Services Principles and Criteria. Thereby it offers a standard benchmark by which two data center audits can be compared against the same set of criteria. 
•SOC 2 audit requires a minimum reporting period of six months, thereby requiring at least six months of data showing the company has met its control objectives. 
•SOC 2 reports are seldom released publicly, typically distributed under an NDA to customers and prospects alike. 
9 
Reasoned Insights
SOC 3 Report 
•A SOC 3 report is intended for general release and includes a summary opinion regarding the effectiveness of the controls in place at the data center or service organization. 
•A SOC 3 report provides the same level of assurance about controls over security, availability, processing integrity, confidentiality and/or privacy as a SOC 2 report, however it does not contain the detailed description of the testing performed by the auditor. 
•A SOC 3 seal is designed to be published on the service provider’s website, or in some similar fashion. It assures users that the data center meets the stringent certification demands laid out by the trust services criteria. 
10 
Reasoned Insights
AUDIT STANDARDS - PCI 
Reasoned Insights 
11
PCI DSS 
•Payment Card Industry (PCI) Security Standards Council was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. 
•Payment Card Industry (PCI) Data Security Standard (DSS) are a set of guidelines, intended to alleviate vulnerabilities and protect cardholder data, for all entities that store, process or transmit cardholder data. 
•The latest PCI Security Standards, v2.0, were published in October 2010. 
12 
Reasoned Insights
PCI DSS 
•PCI Security Standards Council administers PCI DSS and related security standards. 
•PCI DSS follows common sense steps that mirror best security practices. There are three ongoing steps for adhering to the PCI DSS1: 
Assess — identifying cardholder data, taking an inventory of your IT assets and business processes for payment card processing, and analyzing them for vulnerabilities that could expose cardholder data. 
Remediate — fixing vulnerabilities and not storing cardholder data unless you need it. 
Report — compiling and submitting required remediation validation records (if applicable), and submitting compliance reports to the acquiring bank and card brands you do business with. 
13 
Reasoned Insights 
1 - PCI DSS Quick Reference Guide.
PCI DSS Requirements 
Goals 
PCI DSS Requirements 
Build and Maintain a Secure Network 
Install and maintain a firewall configuration to protect cardholder data 
Do not use vendor-supplied defaults for system passwords and other security parameters 
Protect Cardholder Data 
Protect stored cardholder data 
Encrypt transmission of cardholder data across open, public networks 
Maintain a Vulnerability Management Program 
Use and regularly update anti-virus software or programs 
Develop and maintain secure systems and applications 
Implement Strong Access Control Measures 
Restrict access to cardholder data by business need to know 
Assign a unique ID to each person with computer access 
Restrict physical access to cardholder data 
Regularly Monitor and Test Networks 
Track and monitor all access to network resources and cardholder data 
Regularly test security systems and processes 
Maintain an Information Security Policy 
Maintain a policy that addresses information security for all personnel 
14 
Reasoned Insights
PCI DSS 
PCI Data Security Standard (DSS) 
•The PCI DSS applies to all entities that store, process, and/or transmit cardholder data. 
•PCI DSS covers technical and operational system components included in or connected to cardholder data. 
•The security controls and processes required by PCI DSS are vital for protecting cardholder account data, including the PAN – the primary account number printed on the front of a payment card. 
•Merchants and any other service providers involved with payment card processing must never store sensitive authentication data after authorization. This includes sensitive data that is printed on a card, or stored on a card’s magnetic stripe or chip – and personal identification numbers entered by the cardholder. 
15 
Reasoned Insights
PA-DSS 
Payment Application Data Security Standard (PA-DSS) 
•The PA-DSS is for software developers and integrators of payment applications that store, process or transmit cardholder data as part of authorization or settlement. 
•Most card brands encourage merchants to use payment applications that are tested and approved by the PCI SSC. PCI lists validated applications on its website. 
16 
Reasoned Insights
PCI DSS Compliance Report1 
Template information contained in PCI DSS Report on compliance: 
1. Executive Summary (description of entity’s payment card business; high level network diagram) 
2. Description of Scope of Work and Approach Taken (description of how the assessment was made, environment, network segmentation used, details for each sample set selected and tested, wholly owned or international entities requiring compliance with PCI DSS, wireless networks or applications that could impact security of cardholder data, version of PCI DSS used to conduct the assessment) 
3. Details about Reviewed Environment (diagram of each network, description of cardholder data environment, list of all hardware and software in the CDE, service providers used, third party payment applications, individuals interviewed, documentation reviewed, details for reviews of managed service providers) 
4. Contact Information and Report Date 
5. Quarterly Scan Results (summary of four most recent ASV scan results) 
6. Findings and Observations (detailed findings on each requirement and sub- requirement, including explanations of all N/A responses and validation of all compensating controls) 
17 
Reasoned Insights 
1 - PCI DSS Quick Reference Guide.
Data Center Audit Standards 
Reasoned Insights 
18
Relevant Links 
•AICPA Council: http://www.aicpa.org/About/Governance/AICPACouncil/Pages/default.aspx 
•SSAE Guide: http://www.cpa2biz.com/AST/Main/CPA2BIZ_Primary/SOC/PRDOVR~PC-0127910/PC-0127910.jsp 
•PCI Security Standards Council: https://www.pcisecuritystandards.org/index.php 
19 
Reasoned Insights

More Related Content

What's hot

Common internal audit findings & how to avoid them
Common internal audit findings & how to avoid themCommon internal audit findings & how to avoid them
Common internal audit findings & how to avoid them
Surajit Datta
 
Information System audit
Information System auditInformation System audit
Information System audit
Pratapchandra
 
Safety management and organizational performance of selected manufacturing fi...
Safety management and organizational performance of selected manufacturing fi...Safety management and organizational performance of selected manufacturing fi...
Safety management and organizational performance of selected manufacturing fi...
AJHSSR Journal
 

What's hot (20)

Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Common internal audit findings & how to avoid them
Common internal audit findings & how to avoid themCommon internal audit findings & how to avoid them
Common internal audit findings & how to avoid them
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Structure of mis
Structure of misStructure of mis
Structure of mis
 
Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering  Chapter 1: Professional Issues in Software Engineering
Chapter 1: Professional Issues in Software Engineering
 
Safety management and organizational performance of selected manufacturing fi...
Safety management and organizational performance of selected manufacturing fi...Safety management and organizational performance of selected manufacturing fi...
Safety management and organizational performance of selected manufacturing fi...
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controls
 
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Improving effectiveness of internal auditing
Improving effectiveness of internal auditingImproving effectiveness of internal auditing
Improving effectiveness of internal auditing
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 

Viewers also liked

Emergency Department Quality Improvement
Emergency Department Quality ImprovementEmergency Department Quality Improvement
Emergency Department Quality Improvement
DrAbdulaziz Saddique
 
Process and product quality Assurance
Process and product quality AssuranceProcess and product quality Assurance
Process and product quality Assurance
Joydip Bhattacharya
 
Management planning presentation
Management planning presentationManagement planning presentation
Management planning presentation
all4school
 
Communication system in healthcare
Communication system in healthcareCommunication system in healthcare
Communication system in healthcare
DrArshpreet18
 
Predictive Analytics with Hadoop
Predictive Analytics with HadoopPredictive Analytics with Hadoop
Predictive Analytics with Hadoop
DataWorks Summit
 
Customer satisfaction process
Customer satisfaction processCustomer satisfaction process
Customer satisfaction process
Pimsat University
 
Mercedes-Benz Case Study
Mercedes-Benz Case StudyMercedes-Benz Case Study
Mercedes-Benz Case Study
Wolff Olins
 
CRM Practices in the Airlines Industry
CRM Practices in the Airlines IndustryCRM Practices in the Airlines Industry
CRM Practices in the Airlines Industry
Mandar Ghanekar
 
Customer relationship management and supply chain management
Customer relationship management and supply chain managementCustomer relationship management and supply chain management
Customer relationship management and supply chain management
Rohit Kumar
 

Viewers also liked (20)

Alternative Approach to Permanent way Alignment Design
Alternative Approach to Permanent way Alignment DesignAlternative Approach to Permanent way Alignment Design
Alternative Approach to Permanent way Alignment Design
 
Columbian Exchange: Chart
Columbian Exchange: ChartColumbian Exchange: Chart
Columbian Exchange: Chart
 
Raw Materials Management
Raw Materials ManagementRaw Materials Management
Raw Materials Management
 
Rail Passenger Demand Forecasting - a view from the industry
Rail Passenger Demand Forecasting - a view from the industryRail Passenger Demand Forecasting - a view from the industry
Rail Passenger Demand Forecasting - a view from the industry
 
Kasaysayan ng retorika sa daigdig
Kasaysayan ng retorika sa daigdigKasaysayan ng retorika sa daigdig
Kasaysayan ng retorika sa daigdig
 
Emergency Department Quality Improvement
Emergency Department Quality ImprovementEmergency Department Quality Improvement
Emergency Department Quality Improvement
 
Predictive Analytics: Extending asset management framework for multi-industry...
Predictive Analytics: Extending asset management framework for multi-industry...Predictive Analytics: Extending asset management framework for multi-industry...
Predictive Analytics: Extending asset management framework for multi-industry...
 
Building a distributed search system with Hadoop and Lucene
Building a distributed search system with Hadoop and LuceneBuilding a distributed search system with Hadoop and Lucene
Building a distributed search system with Hadoop and Lucene
 
Process and product quality Assurance
Process and product quality AssuranceProcess and product quality Assurance
Process and product quality Assurance
 
Management planning presentation
Management planning presentationManagement planning presentation
Management planning presentation
 
Communication system in healthcare
Communication system in healthcareCommunication system in healthcare
Communication system in healthcare
 
Predictive analytics and big data tutorial
Predictive analytics and big data tutorial Predictive analytics and big data tutorial
Predictive analytics and big data tutorial
 
Making Display Advertising Work for Auto Dealers
Making Display Advertising Work for Auto DealersMaking Display Advertising Work for Auto Dealers
Making Display Advertising Work for Auto Dealers
 
Predictive Analytics with Hadoop
Predictive Analytics with HadoopPredictive Analytics with Hadoop
Predictive Analytics with Hadoop
 
Customer satisfaction process
Customer satisfaction processCustomer satisfaction process
Customer satisfaction process
 
Mercedes-Benz Case Study
Mercedes-Benz Case StudyMercedes-Benz Case Study
Mercedes-Benz Case Study
 
Sandia 2014 Wind Turbine Blade Workshop- Newman
Sandia 2014 Wind Turbine Blade Workshop- NewmanSandia 2014 Wind Turbine Blade Workshop- Newman
Sandia 2014 Wind Turbine Blade Workshop- Newman
 
Pneumatic controllers
Pneumatic controllersPneumatic controllers
Pneumatic controllers
 
CRM Practices in the Airlines Industry
CRM Practices in the Airlines IndustryCRM Practices in the Airlines Industry
CRM Practices in the Airlines Industry
 
Customer relationship management and supply chain management
Customer relationship management and supply chain managementCustomer relationship management and supply chain management
Customer relationship management and supply chain management
 

Similar to Data Center Audit Standards

Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
Risk Crew
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptx
gealehegn
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.ppt
gealehegn
 

Similar to Data Center Audit Standards (20)

How to Report on your PCI DSS Compliance.docx
How to Report on your PCI DSS Compliance.docxHow to Report on your PCI DSS Compliance.docx
How to Report on your PCI DSS Compliance.docx
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Secrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsSecrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance Projects
 
PruebaJLF.pptx
PruebaJLF.pptxPruebaJLF.pptx
PruebaJLF.pptx
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
PCI DSS Compliance Readiness
PCI DSS Compliance ReadinessPCI DSS Compliance Readiness
PCI DSS Compliance Readiness
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIECVendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptx
 
PCI-DSS_Overview
PCI-DSS_OverviewPCI-DSS_Overview
PCI-DSS_Overview
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
Health, Safety and Security through Compliance
Health, Safety and Security through ComplianceHealth, Safety and Security through Compliance
Health, Safety and Security through Compliance
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.ppt
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation services
 

Recently uploaded

Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
amitlee9823
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
MarinCaroMartnezBerg
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
amitlee9823
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 

Recently uploaded (20)

CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 

Data Center Audit Standards

  • 1. Data Center Audit Standards Keyur Thakore
  • 2. Audit Standards Reasoned Insights 2 The standard logos are registered trademarks of their respective organizations.
  • 3. AUDIT STANDARDS - AICPA Reasoned Insights 3
  • 4. AICPA SAS 70 •American Institute of Certified Public Accountants Statement on Auditing Standards No. 70 audit, often referred to as SAS 70 audit, was first introduced in 1992. •The SAS 70 audit is meant to measure internal controls over financial reporting. •The SAS 70 audit has been one of the primary means used by data center operators to measure their technical processes around security and assure businesses of its data security practices. 4 Reasoned Insights
  • 5. AICPA SAS 70 •The SAS 70 audit, according to the AICPA, was never intended to be used by data centers to verify security. •The SAS 70 audit report was never intended to be a “certification”, rather a measure of whether a data center operator adheres to the controls it has established for itself. •The SAS 70 audit requires that the operators develop their own control framework, and then audit their security controls to report back to the customers. 5 Reasoned Insights
  • 6. AUDIT STANDARDS - SSAE Reasoned Insights 6
  • 7. SSAE 16 •In 2011, AICPA introduced the Statements on Standards for Attestation Engagements No. 16 (SSAE 16) for reporting on controls at services organizations including data centers. •SSAE 16 is the next generation of AICPA auditing standards, that goes beyond SAS 70 by requiring the auditor to obtain a written report regarding the design and operating effectiveness of the controls being reviewed. •An audit that is conducted under the SSAE 16 will result in a Service Organization Control (SOC) report. 7 Reasoned Insights
  • 8. SOC 1 Report •A Service Organization Control (SOC) 1 report is produced upon the completion of an SSAE 16 audit. •SOC 1 reports are focused on internal controls over financial reporting. •SOC 1 reports are restricted use reports intended only for existing customers, not prospective customers or the general public. •SOC 1 report is available as Type 1 or Type 2 report: Type 1 reports is auditors’ opinion on the accuracy and completeness of management’s description of the system or service as of a specific date. Type 2 report audits the operating effectiveness of the controls throughout a declared time period, generally between six months and one year. 8 Reasoned Insights
  • 9. SOC 2 Report •A SOC 2 report is intended to provide assurance about controls related to: 1) security, 2) availability, 3) processing integrity, 4) confidentiality and 5) privacy of a system and its information. •A SOC 2 report is based on pre-defined controls criteria contained in the AICPA Trust Services Principles and Criteria. Thereby it offers a standard benchmark by which two data center audits can be compared against the same set of criteria. •SOC 2 audit requires a minimum reporting period of six months, thereby requiring at least six months of data showing the company has met its control objectives. •SOC 2 reports are seldom released publicly, typically distributed under an NDA to customers and prospects alike. 9 Reasoned Insights
  • 10. SOC 3 Report •A SOC 3 report is intended for general release and includes a summary opinion regarding the effectiveness of the controls in place at the data center or service organization. •A SOC 3 report provides the same level of assurance about controls over security, availability, processing integrity, confidentiality and/or privacy as a SOC 2 report, however it does not contain the detailed description of the testing performed by the auditor. •A SOC 3 seal is designed to be published on the service provider’s website, or in some similar fashion. It assures users that the data center meets the stringent certification demands laid out by the trust services criteria. 10 Reasoned Insights
  • 11. AUDIT STANDARDS - PCI Reasoned Insights 11
  • 12. PCI DSS •Payment Card Industry (PCI) Security Standards Council was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. •Payment Card Industry (PCI) Data Security Standard (DSS) are a set of guidelines, intended to alleviate vulnerabilities and protect cardholder data, for all entities that store, process or transmit cardholder data. •The latest PCI Security Standards, v2.0, were published in October 2010. 12 Reasoned Insights
  • 13. PCI DSS •PCI Security Standards Council administers PCI DSS and related security standards. •PCI DSS follows common sense steps that mirror best security practices. There are three ongoing steps for adhering to the PCI DSS1: Assess — identifying cardholder data, taking an inventory of your IT assets and business processes for payment card processing, and analyzing them for vulnerabilities that could expose cardholder data. Remediate — fixing vulnerabilities and not storing cardholder data unless you need it. Report — compiling and submitting required remediation validation records (if applicable), and submitting compliance reports to the acquiring bank and card brands you do business with. 13 Reasoned Insights 1 - PCI DSS Quick Reference Guide.
  • 14. PCI DSS Requirements Goals PCI DSS Requirements Build and Maintain a Secure Network Install and maintain a firewall configuration to protect cardholder data Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data Protect stored cardholder data Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement Strong Access Control Measures Restrict access to cardholder data by business need to know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Regularly Monitor and Test Networks Track and monitor all access to network resources and cardholder data Regularly test security systems and processes Maintain an Information Security Policy Maintain a policy that addresses information security for all personnel 14 Reasoned Insights
  • 15. PCI DSS PCI Data Security Standard (DSS) •The PCI DSS applies to all entities that store, process, and/or transmit cardholder data. •PCI DSS covers technical and operational system components included in or connected to cardholder data. •The security controls and processes required by PCI DSS are vital for protecting cardholder account data, including the PAN – the primary account number printed on the front of a payment card. •Merchants and any other service providers involved with payment card processing must never store sensitive authentication data after authorization. This includes sensitive data that is printed on a card, or stored on a card’s magnetic stripe or chip – and personal identification numbers entered by the cardholder. 15 Reasoned Insights
  • 16. PA-DSS Payment Application Data Security Standard (PA-DSS) •The PA-DSS is for software developers and integrators of payment applications that store, process or transmit cardholder data as part of authorization or settlement. •Most card brands encourage merchants to use payment applications that are tested and approved by the PCI SSC. PCI lists validated applications on its website. 16 Reasoned Insights
  • 17. PCI DSS Compliance Report1 Template information contained in PCI DSS Report on compliance: 1. Executive Summary (description of entity’s payment card business; high level network diagram) 2. Description of Scope of Work and Approach Taken (description of how the assessment was made, environment, network segmentation used, details for each sample set selected and tested, wholly owned or international entities requiring compliance with PCI DSS, wireless networks or applications that could impact security of cardholder data, version of PCI DSS used to conduct the assessment) 3. Details about Reviewed Environment (diagram of each network, description of cardholder data environment, list of all hardware and software in the CDE, service providers used, third party payment applications, individuals interviewed, documentation reviewed, details for reviews of managed service providers) 4. Contact Information and Report Date 5. Quarterly Scan Results (summary of four most recent ASV scan results) 6. Findings and Observations (detailed findings on each requirement and sub- requirement, including explanations of all N/A responses and validation of all compensating controls) 17 Reasoned Insights 1 - PCI DSS Quick Reference Guide.
  • 18. Data Center Audit Standards Reasoned Insights 18
  • 19. Relevant Links •AICPA Council: http://www.aicpa.org/About/Governance/AICPACouncil/Pages/default.aspx •SSAE Guide: http://www.cpa2biz.com/AST/Main/CPA2BIZ_Primary/SOC/PRDOVR~PC-0127910/PC-0127910.jsp •PCI Security Standards Council: https://www.pcisecuritystandards.org/index.php 19 Reasoned Insights