Skip to main content
Top

2015 | OriginalPaper | Chapter

Using COBIT 5 for Risk to Develop Cloud Computing SLA Evaluation Templates

Authors : Onyeka Illoh, Shaun Aghili, Sergey Butakov

Published in: Service-Oriented Computing - ICSOC 2014 Workshops

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The use of cloud services as a business solution keeps growing, but there are significant associated risks that must be addressed. Despite the advantages and disadvantages of cloud computing, service integration and alignment with existing enterprise architecture remains an ongoing priority. Typically, quality of services provided is outlined in a service level agreement (SLA). A deficient template for evaluating, negotiating and selecting cloud SLAs could result in legal, regulatory, and monetary penalties, in addition to loss of public confidence and reputation. This research emphasizes (or advocates) the implementation of the proposed SLA evaluation template aimed at cloud services, based on the COBIT 5 for Risk framework. A gap analysis of existing SLAs was done to identify loopholes, followed by a resultant template where identified gaps were addressed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Information Systems Audit and Control [ISACA]: Cloud computing management audit/assurance program (2010) Information Systems Audit and Control [ISACA]: Cloud computing management audit/assurance program (2010)
3.
go back to reference ISACA: Cloud governance: questions boards of directors need to ask (2013) ISACA: Cloud governance: questions boards of directors need to ask (2013)
4.
go back to reference ISACA: Security considerations for cloud computing (2012) ISACA: Security considerations for cloud computing (2012)
5.
go back to reference Jirasek, V.: Cloud governance done right: examples from the trenches. BrightTALK (2013) Jirasek, V.: Cloud governance done right: examples from the trenches. BrightTALK (2013)
6.
go back to reference Sinnett, W.M: In the Cloud and Beyond. Financial Executive (February 2012) Sinnett, W.M: In the Cloud and Beyond. Financial Executive (February 2012)
7.
go back to reference CSA and ISACA: Cloud computing market maturity: study results (2012) CSA and ISACA: Cloud computing market maturity: study results (2012)
8.
go back to reference de Chaves, S. A., Westphall, C.B., Lamin, F.R.: SLA perspective in security management for cloud computing. In: IEEE ICNS, pp. 212–217 (2010) de Chaves, S. A., Westphall, C.B., Lamin, F.R.: SLA perspective in security management for cloud computing. In: IEEE ICNS, pp. 212–217 (2010)
9.
go back to reference Subbiah, S., Muthukumaran, S.S., Ramkumar, T.: Enhanced survey and proposal to secure the data in cloud computing environment. In: IJEST, vol. 5, no. 01 (2013) Subbiah, S., Muthukumaran, S.S., Ramkumar, T.: Enhanced survey and proposal to secure the data in cloud computing environment. In: IJEST, vol. 5, no. 01 (2013)
10.
go back to reference Awad, R.: Considerations on cloud computing for CPAs. CPA J. 81(9), 11 (2011) Awad, R.: Considerations on cloud computing for CPAs. CPA J. 81(9), 11 (2011)
11.
go back to reference Jackson R.A.: Audit in a digital business world. In: The Internal Auditor Magazine, pp. 36–41 (2013) Jackson R.A.: Audit in a digital business world. In: The Internal Auditor Magazine, pp. 36–41 (2013)
12.
go back to reference Symantec Corporation: Choosing a cloud hosting provider with confidence: Symantec SSL certificates provide a secure bridge to trusted cloud hosting providers (2012) Symantec Corporation: Choosing a cloud hosting provider with confidence: Symantec SSL certificates provide a secure bridge to trusted cloud hosting providers (2012)
13.
go back to reference Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. Gartner Research, ID G00157782 (2008) Heiser, J., Nicolett, M.: Assessing the security risks of cloud computing. Gartner Research, ID G00157782 (2008)
14.
go back to reference Smith, D.M, Plummer, D.C, Bittman, T.J, Bova, T, Basso, M, Lheureux, B.J, Prentice, B.: Predicts 2013: cloud computing becomes an integral part of IT. Gartner, ID: G00230929 (2012) Smith, D.M, Plummer, D.C, Bittman, T.J, Bova, T, Basso, M, Lheureux, B.J, Prentice, B.: Predicts 2013: cloud computing becomes an integral part of IT. Gartner, ID: G00230929 (2012)
16.
go back to reference Wu, J., Shen, Q., Wang, T., Zhu, J., Zhang, J.: Recent advances in cloud security. J. Comput. 6(10), 2156–2163 (2011) Wu, J., Shen, Q., Wang, T., Zhu, J., Zhang, J.: Recent advances in cloud security. J. Comput. 6(10), 2156–2163 (2011)
17.
go back to reference Tschinkel, B.: Cloud computing security understanding risk areas and management techniques (2011) Tschinkel, B.: Cloud computing security understanding risk areas and management techniques (2011)
18.
go back to reference Gordon, M.: The compliant cloud. BrightTALK (2009) Gordon, M.: The compliant cloud. BrightTALK (2009)
20.
go back to reference Badger, L., Grance, T., Patt-Corner, R., Voas. J.: Cloud computing synopsis and recommendations. In: NIST, vol. 800, p. 146. Special Publication (SP) (2011) Badger, L., Grance, T., Patt-Corner, R., Voas. J.: Cloud computing synopsis and recommendations. In: NIST, vol. 800, p. 146. Special Publication (SP) (2011)
21.
go back to reference CSA: Security guidance for critical areas of focus in cloud computing v3.0 (2011) CSA: Security guidance for critical areas of focus in cloud computing v3.0 (2011)
22.
go back to reference NIST: NIST US government cloud computing technology roadmap, Release 1.0 (Draft) - In: NIST, vol. 500, p. 293. Special Publication (SP) (2011) NIST: NIST US government cloud computing technology roadmap, Release 1.0 (Draft) - In: NIST, vol. 500, p. 293. Special Publication (SP) (2011)
23.
go back to reference Patel, P., Ranabahu, A., Sheth, A.P.: Service level agreement in cloud computing (2009) Patel, P., Ranabahu, A., Sheth, A.P.: Service level agreement in cloud computing (2009)
24.
go back to reference Wei, D.S.L., Murugesan, S., Kuo, S., Naik, K., Krizanc, D.: Enhancing data integrity and privacy in the cloud: an agenda. IEEE Comput. Soc. 46, 87–90 (2013)CrossRef Wei, D.S.L., Murugesan, S., Kuo, S., Naik, K., Krizanc, D.: Enhancing data integrity and privacy in the cloud: an agenda. IEEE Comput. Soc. 46, 87–90 (2013)CrossRef
25.
go back to reference Bort, J.: The 10 most important companies in cloud computing. Business Insider (2013) Bort, J.: The 10 most important companies in cloud computing. Business Insider (2013)
27.
go back to reference Cloud Spectator: Cloud server performance: a comparative analysis of 5 large cloud IaaS providers (2013) Cloud Spectator: Cloud server performance: a comparative analysis of 5 large cloud IaaS providers (2013)
28.
go back to reference ISACA: COBIT 5 for risk framework, pp. 67–74 (2013) ISACA: COBIT 5 for risk framework, pp. 67–74 (2013)
Metadata
Title
Using COBIT 5 for Risk to Develop Cloud Computing SLA Evaluation Templates
Authors
Onyeka Illoh
Shaun Aghili
Sergey Butakov
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-22885-3_21

Premium Partner