About Us | Contact Us
View Cart

FFIEC Statement on Outsourced Cloud Computing

By Vigilize | Wednesday, July 11, 2012 - Leave a Comment

The Federal Financial Institutions Examination Council (FFIEC) has issued a statement on outsourced cloud computing activities.

The statement discusses key risk considerations associated with outsourced cloud computing activities and identifies applicable risk mitigation considerations contained in the various booklets that comprise the FFIEC IT Examination Handbook.

The Outsourced Cloud Computing Statement is contained in the Reference Materials Infobase section available online at http://ithandbook.ffiec.gov/.

Risks Associated with Cloud Computing

In reading this, we located a direct link to the FFIEC’s Publication: Outsourced Cloud Computing.

In addition, Appendix D: Managed Security Service Providers of the Outsourcing Technology Services Booklet states:

“Emerging Risks

      Cloud computing is an emerging trend in which some of the IT industry’s biggest players are investing significant resources. Cloud computing in general is a migration from owned resources to shared resources in which client users receive information technology services on demand from third-party service providers via the Internet “cloud.” In cloud environments, a client or customer will relocate their resources such as data, applications, and services to computing facilities outside the corporate firewall, which the end user then accesses via the Internet.
    Cloud-based MSSP services may be implemented as part of Internet access services. Examples of “in-the-cloud” services include carrier-based denial of service protection, virtual firewall services, and carrier-provided URL blocking. When an MSSP offers services that use a cloud computing architecture, the same risks that are specific to non-cloud-based security services apply. However, there are a few additional risk considerations that should be assessed when moving to a cloud computing environment. Areas for FIs to consider when an MSSP uses cloud computing in their managed security services environment include:
  • Protecting data in transit to avoid data leakage;
  • Securing data at rest so that one data breach within the cloud does not breach the other customer data within the cloud;
  • Maintaining compliance with applicable regulatory requirements;
  • Complying with foreign government privacy laws when outsourcing is performed offshore;
  • Segregating customer data appropriately to comply with audit and legal requirements; and
  • Avoiding sharing of authentication credentials to prevent the impersonation of users.”

Stepping back, you should also review Appendix A: Examination Procedures in the same document, as it provides for additional information that examiners may be looking for if you utilize cloud computing in your organization.

According to Dan Hadaway, “This can be seen as a warning that cloud computing sites should be included in your vendor due diligence and business continuity planning even if they are free.”

 



Latest News
     A Timeline Update as of 02/22/21 An update to our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We have decided to leave the original article as it was originally posted and to update this post with any changes that have been made. You can see […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  
    A Webinar-Movie The 2020 annual webinar update on the subject will include a review of the previous years’ movies that are already available, and a discussion about alternative tactics that have arisen from recent virtual conferences and regulator panels.
    The cybersecurity industry faces challenges, and some of them may involve your business… An article review. In a world where threats to your organization’s electronic assets are constantly emerging and evolving a cybersecurity insurance policy can help mitigate risk…but what kind of risk does the cybersecurity insurance industry face?  A new article in the Harvard […]
    What are the top seven risks your board should know about in 2021? Since his first board presentation in 2000, when Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been compiling a list of the “top seven […]
    A Timeline as of 01/24/2021 Our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We are leaving this article as is, but for any updates to the timeline, check the Autopsy of the SolarWinds Hack Timeline Update article!      – Vigilize Introduction: As the managing […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS FORUM AND CONFERENCE NEWS infotex is proud to announce that Dan Hadaway will be moderating a series of IT Forums for the Ohio Bankers League. “We are excited to continue fostering the relationship with the OBL to help educate and keep Risk Management at the forefront of […]
    Top 7 Trend Articles of 2021. . .  . . .For ISOs of Small Financial Institutions. Welcome to our annual T7 article:  a list of our favorite trend articles from the past year.  Our intent: help you organize your thoughts as your work through your strategic planning process.  We hope reviewing these articles will help you […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  
    A Webinar-Movie In our current world of uncertainty there is at least one thing that is certain. Business needs to continue, and that means that it is important for managers to be able to meet with their team even if everyone is working remotely at this point. In this Webinar-Movie, Dan will compare virtual meeting […]