Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Hardware IT

Do Data Center Audits Mean Anything? 84

1sockchuck writes "Data center service providers often tout certifications such as SAS 70, SSAE 16 and SOC 2 as evidence that they meet lofty operational standards. But some of these certifications are based on self-defined standards, and the entire situation is confusing and frustrating to customers, according to one critic, who says data center shoppers are poorly served by the jumble of acronyms and standards. Do these certifications matter when users are seeking data center space? Should they?"
This discussion has been archived. No new comments can be posted.

Do Data Center Audits Mean Anything?

Comments Filter:
  • Not really (Score:5, Informative)

    by gweihir ( 88907 ) on Thursday January 19, 2012 @06:32PM (#38755396)

    Now, if you get your hands at the detail reports, the audit result may actually tell you something, at least if the auditors are good. But the certifications pretty much only ensure minimal standards low enough to be meaningless.

    • by ackthpt ( 218170 )

      Now, if you get your hands at the detail reports, the audit result may actually tell you something, at least if the auditors are good. But the certifications pretty much only ensure minimal standards low enough to be meaningless.

      The first thing you'll probably discover is that 'Certificate' isn't spelled with an 'S', like all these acronyms are starting with. :-\

    • by jhoegl ( 638955 )
      Much like HIPPA, where its "best effort" at a minimum.
      Them:What? I zipped it with a password, doesnt that protect the patient information?
      Me: Sure, for about 5 minutes. *doublefacepalm*
      • But it's disclosed to you, and based on that you can make a decision on whether to give a certain datacenter your business. (not sure if there's as much choice in the medical field, but that's a topic for another time)

    • The certifications amount to "This shell company we created to report whatever we want it to says we're tight and secure. Yay for us!!!!!"

      • by ackthpt ( 218170 )

        The certifications amount to "This shell company we created to report whatever we want it to says we're tight and secure. Yay for us!!!!!"

        And if you pay enough for our services, we'll frame the certificate, as soon as it comes off the laser printer.

        • Laser printer?! Man, you're high-rolling it! Last certificate we got (at something like $15K cost) came as a PDF attachment in email. But you know what, it made customers happy...
    • Re:Not really (Score:4, Insightful)

      by Fluffeh ( 1273756 ) on Thursday January 19, 2012 @07:01PM (#38755786)

      Now, if you get your hands at the detail reports, the audit result may actually tell you something, at least if the auditors are good. But the certifications pretty much only ensure minimal standards low enough to be meaningless.

      It depends on the purpose of the audit. If the purpose is to appease middle managers and the like, then the auditors (good or bad) will be able to read the request "We need to ensure we are certified for [insert current buzzword]." and see that this is nothing short of an easy way to make a costly fee. If on the other hand, the request is to find ways to break into the systems and comes from sysadmins or the like, then it is much more likely that the company wants to patch vulnerabilities.

      Business is business. If a sales person sees easy money walking into the office, they will probably sell them overpriced and needless goods/services. If they see someone who knows exactly what it is they want, they will more likely give them exactly what they ask for and for a reasonable price.

      • Re:Not really (Score:4, Insightful)

        by eth1 ( 94901 ) on Friday January 20, 2012 @12:04PM (#38763226)

        These aren't intrusion tests they're talking about but certification audits.

        My experience with those (ISO, SAS, etc.) is that a company hires someone to write up a bunch of documents to match what the auditors want to see, and tell the employees where to find it. Then the auditors come and get told/shown what they want to hear/see so they'll go away and let us get back to real work. The documentation isn't looked at again by regular employees until the next audit.

        Those certs are just like professional certs like MCSE, CCNA, etc. They don't really have any bearing on whether or not you're good at what you do, but they sound good to customers/employers.

    • And yet the minimal standards are much higher than most people actually do.

      My take: Do audits and auditors do anything to secure your systems? Rarely. Do having real hoops to jump through and jobs/salaries/bonuses on the line for failure prompt people to try to secure their systems? Frequently.

  • by Anonymous Coward

    It's like when any of the US government agencies "audit" themselves for instance, The Federal Reserve. Remember that "audit" recently?

  • by NemoinSpace ( 1118137 ) on Thursday January 19, 2012 @06:37PM (#38755480) Journal
    not entirely unlike MSCE, but less so.
  • by account_deleted ( 4530225 ) on Thursday January 19, 2012 @06:38PM (#38755490)
    Comment removed based on user account deletion
  • by ackthpt ( 218170 ) on Thursday January 19, 2012 @06:42PM (#38755548) Homepage Journal
    • - Waving in face of prospective customers - ' Yes w certainly a certificate of certification granting certitude!'
    • - Finding things you actually did right
    • - Finding things you need to fix or wallpaper over
    • - Creating gainful employment for auditors, certifiers, pencil pushers, paper shufflers and rubber stampers.
    • - Sell more seminars and books for a certification industry
    • - Influence government to require certain certifications to keep an industry of auditing and certification on the gravy train for years
    • - Give significantly less benefit to people who disagree with the need for dubious audits and/or certifications.
  • The fact of the matter is a lot of stupid certification acronyms were specifically designed to allow spenders to make decisions without being actually informed in any way about what they're spending their money on. That's actually the *point* here. The problem isn't the certifications, the problem is that to make an informed decision about which ISP should host your servers you shouldn't be the type of CTO who insists on using outlook express and ie6 still and can't even configure their own email client.

    • by ackthpt ( 218170 )

      The fact of the matter is a lot of stupid certification acronyms were specifically designed to allow spenders to make decisions without being actually informed in any way about what they're spending their money on. That's actually the *point* here. The problem isn't the certifications, the problem is that to make an informed decision about which ISP should host your servers you shouldn't be the type of CTO who insists on using outlook express and ie6 still and can't even configure their own email client. You need to know bandwidth from ass-width.

      I couldn't help but notice this post wasn't ESU 77A Certified - sign up for our Seminar[www.joesbarandtrainingcenter.com] only $1,500, availibility is limited

  • Yeah, I paid the bribe. Now I am certified!
    • Why not come up with a similar certification, one that's available under Creative Commons? That way, anyone could actually read the specifications, and you can go so far as to have a third party certify the results, either by self-certifying and having that notarized, or having a trusted third party perform the audit.

      • Will that certification be meaningless to not create any kind of trouble, and yet obscure enough for potential clients not discovering it is meaningless?

      • The actual ISO 9001 standard only costs about $130 on the ISO's website, the verification labor is by far a bigger part of the cost. Nobody foregoes ISO 9001 certification on account of the non-libre status of the standard.

  • short answer: no (Score:4, Informative)

    by Anonymous Coward on Thursday January 19, 2012 @06:49PM (#38755632)

    I'm a work at a somewhat large financial services company that provides customer information to various other large financial institutions (chase, wells fargo, capital one, amex, discover, just to name a few). We receive this customer information from pretty much everywhere - those self same banks, government agencies, credit card companies, universities. Basically, if you've ever had a loan or grant, credit card, bank account, paid a utility bill, child support or been in prison then we have that data. Your address, phone number, social security number, bank account information, etc.
        The majority of this information is stored unencrypted on systems that are accessible to any employee, often with 777 permissions. While the majority of the systems are patched pretty regularly, many aren't. I recently had to convert over an old apache 1.3 server that hadn't been patched since 2006 - there's another similar server that is regularly used by outside contributors to drop off customer information.
        We have customer facing IPlanet servers that haven't been patched since 2004 - the software isn't even under support anymore.
        We have session recording software on our unix servers that is so ridiculously trivial to bypass that the company that sells it (centrify) should be ashamed to sell it.
    Yet we've had PCI certification for 3 years, we've passed the SAS70 certification every time - they are rubber-stamps, nothing more.

    • by Lotana ( 842533 )

      Basically, if you've ever had a loan or grant, credit card, bank account, paid a utility bill, child support or been in prison then we have that data. Your address, phone number, social security number, bank account information, etc.
      The majority of this information is stored unencrypted on systems that are accessible to any employee, often with 777 permissions. While the majority of the systems are patched pretty regularly, many aren't. I recently had to convert over an old apache 1.3 server that hadn't been patched since 2006 - there's another similar server that is regularly used by outside contributors to drop off customer information.

      Well, looks like I won't be able to sleep ever again.

      What country is this in? My only hope is that it is not where I reside and things are much more secure here. Please don't shatter my illusion! Looks like ignorance really is bliss.

    • My understanding is that SAS-70 is entirely self-defined. The point of the certification is to validate that your company has established operational processes and procedures for itself, and that the processes and procedures established are adhered to.

      Nothing about SAS-70 requires any measure of quality or completeness. When the business claims, "yes, we have a disaster recovery plan. yes, we have a business continuity plan. yes, we have a backup, fault tolerance, order handling, fulfillment, budgeting, a
    • And Your QSA is ?

      • Yes your QSA should be fired and your company should be fined for running antiquated software that has security holes the size of the grand canyon.

  • Of course it matters (Score:5, Informative)

    by ZouPrime ( 460611 ) on Thursday January 19, 2012 @06:52PM (#38755672)

    Well, it certainly matter for regulation purpose. If you handle data that need to be covered under a specific standard (say, PCI), you'll seek out a certified data center. In this context, the certification isn't about security, it's about risk transfer. It's the provider who become liable if there's a breach if it can't show to have respected the standard properly.

    Now as security references, they certainly have their problems. We can take solace in the thought that they help enforce the bare minimum at the very least. As a security professional, I would say their best benefit is how well they can be used as a big stick, "encouraging" management to perform necessary changes. It's a hard sell to convince an average manager to invest in security for the sake of security. But if there's a legal penalty associated with whatever standard must be put in place, as well as a big dollar sign attached to it, they'll suddenly start to listen. That's a language they understand.

  • by mclearn ( 86140 ) on Thursday January 19, 2012 @06:54PM (#38755700) Homepage
    I've always been amazed at things like SAS 70 which, as the poster states, is based on self-defined criteria. The most shocking part, if I recall correctly, is that the criteria are not publicly consumable! This is the worst part of it all and the key part which needs to change.
  • by Herkum01 ( 592704 ) on Thursday January 19, 2012 @06:59PM (#38755758)

    The problem is that they are trying to get certifications when what they really need are Achievements! Just ask Microsoft, it worked for the XBOX, they are throwing it into Visual Studio, it will work for data centers.

    Include a Facebook Like button and a Twitter link and your done!

  • Just like when hiring a new employee, you look for certifications and credentials. When trying to separate the legitimate companies from the fly-by-nights, seeing audits every year going back 2, 3, 4 years can help verify that they've been around for a while. Datacenter space isn't cheap, and if you find a good deal you want to make sure that your server with all the company data on it is still there on monday morning, and not on a plane to China.
     
    You put your money in an FDIC-insured bank account because it's registered with someone who's taken the task of keeping an eye on their registrants and staked their reputation on it. If you don't agree with that, I have an offshore bank account you can transfer some money in to for the International Bank Of Hadlock, we just opened yesterday, but we offer 3000% interest daily and don't keep money laundering records.

  • by hawguy ( 1600213 ) on Thursday January 19, 2012 @07:01PM (#38755772)

    I'd say that data center audits, just like financial audits, are only as good as the auditor. If you're a big enough client, the auditor will say pretty much any thing you want:

    http://en.wikipedia.org/wiki/Arthur_Andersen#Demise [wikipedia.org]

    But still, I look for the certifications to cover my butt. Of course, that's what all of these standards are about - just saying that you've implemented procedures to cover your butt. It doesn't matter whether or not the procedure actually does anything worthwhile or even if there are big gaping holes elsewhere. As long as you can say you've implemented it fully, then you're covered.

  • There is a number of problems with how data centers make these statements and what people interpret.

    The main problem is that people say things like "SAS70 Certified". That is terribly bad wording. There is no such thing. The SAS70 (now SSAE16 or SOC1 report) is not a certification. There is no preset/predetermined criteria that is universal to all companies that receive such a report. Each report is specific to that particular company/data center. It's almost like saying I have a diploma as an indepen

  • by DaCurryman ( 1116593 ) on Thursday January 19, 2012 @07:24PM (#38756060)
    There is a number of problems with how data centers make these statements and what people interpret. The main problem is that people say things like "SAS70 Certified". That is terribly bad wording. There is no such thing. The SAS70 (now SSAE16 or SOC1 report) is not a certification. There is no preset/predetermined criteria that is universal to all companies that receive such a report. Each report is specific to that particular company/data center. It's almost like saying I have a diploma as an independent study major. The next thing is that these reports are not intended for public use. These are auditor-to-auditor reports. They are meant for the auditor for a company that uses said data center (or other service provider) to rely on and not need to audit the data center itself. That is why auditors review these reports to make sure it contains the provisions it's looking for. Otherwise, they're going to go in and audit the data center. Companies that get such reports tend to use it as a marketing tool to show potential customers, when that isn't the purpose. To reduce some blame, I've known auditors guilty of telling data centers that they can do that so that they could convince the data center to pay for the service. Also, SAS70 was designed to reflect controls at a service provider that impact or relate to the processing of financial data, which would have an effect on the financial statements that the auditor is reviewing. Most data centers don't process data (the customers that host stuff there do and they need the SAS70). However, over the years, people have convinced themselves that because the data physically resides at the data center, they impact the financial statements and so they should get a SAS70. This is however, not really true, since with good security controls around the data, the physical hosting of it won't materially misstate the financials. It was for this reason that the AICPA split the old SAS70 into 3 separate services: SOC 1 (SSAE16) which is what the old SAS70 was meant to be, SOC 2, SOC 3. The latter 2 are geared more toward data centers and technology firms that don't impact financial data. The seals that are issued by the AICPA just state that you've had a report done. They do not speak to the content of the report. I could get a SOC report that just says "All employees are entitled to free breakfast". The auditor I hire will come in and test/verify that and then will sign-off saying that they agree. I now have such a report and can boast "SAS70 Certified" everywhere, which doesn't mean squat. It only matters to the company itself, the company that uses their services (depending on context), and the auditors of the company that uses their services.
    • Well said DaCurryman! Data centers have adopted SAS 70 and SSAE 16 as a certification of good security and availability practices, however, that was never the intent. The reason we had "SAS 70 Certified" data centers and we now have "SSAE 16 Certified" data centers is because the customer is always right. The chain of demand for SAS 70 began with financial statement auditors that needed a vehicle to understand the controls at service organizations. Sarbanes Oxley fundamentally changed the requirements f
  • How much is PHB speak that what people who don't know that they are running come up with BS to make it look like they do.

  • by jafo ( 11982 ) on Thursday January 19, 2012 @07:41PM (#38756232) Homepage

    Security and reliability are processes, they are not something you can do once and then forget about. So, yes, I would say that having regular audits are a useful thing. As far as whether these specific standards are useful, the facility we have most of our servers in we have been in since before their SAS 70 audit, and their procedures were good before, but there's a noticeable improvement after. Things like a man-trap with a live security person comparing you with your on-file photo before you enter the raised floor, 2-factor auth on all doors rather than just on the key doors, maintenance lock-outs displayed more prominently, EPOs installed (not a benefit to me, but they did put alarmed doors around the EPOs to prevent the common problems).

    As far as it being "based on self-defined standards", I'm ok with that. I'm ok with the requirement being that they *HAVE* standards for certain things rather than dictating what exactly those standards are. One size does not fit all, but having standards for what you do, I have found in my own business, improves quality.

  • by Anonymous Coward

    SAS70 and the new SSAE 16 require that the assessor and the reader both recognize the limitations and the scope of the work. Like many have said, its dependent on the quality of the auditor. This is why there are a "Big 4" in the audit world, their name carries weight to the quality of review. We will exclude the perceptions about the quality that may actually be provided. When I did SAS70 and similar audits, one of the first things i look at is the company that performed the review, the quality of the

  • Me:"So you don't care if the written procedure is a valid method to accomplish practical outcome, as long as I follow the procedure as written." Auditor: "Yes." That pretty much sums up their real world value.
    • Re: (Score:2, Insightful)

      by Anonymous Coward

      I don't understand why people have such a hard time with this Audit concept. In these cases, an Auditor audits your processes as defined by your management. It doesn't matter what your "process" does in real life. That is NOT what an Auditor is checking. You are not being graded on what you do or how you do it. An IT/Financial/Process Audit is NOT an employee performance review. Something that Engineers and Programmers can't seem to get through their thick heads.

      An Auditor is providing a report to the

  • by colonel ( 4464 ) on Thursday January 19, 2012 @09:17PM (#38757108) Homepage

    Right here, pure gold: http://www.gartner.com/it/page.jsp?id=1400813 [gartner.com]

    Read that 5 times, carefully, and then get your bosses to do the same. Seriously.

    SAS70 is a *questionnaire* that the vendor completes, and then the auditors just go in and confirm that their answers are correct.

    So I could say "we don't do backups" in my answer to the questionnaire, the auditors would verify that I didn't do backups, and I'd "complete" the SAS70 process (not a certification!) successfully.

    It is the client that is resoponsible for reviewing the questionnaire and ensuring that the audited answers are sufficient for the needs of their business. That's called "vendor management" and is a core practice area in ITIL.

    • Pretty much. If your procedure is that you never do backups, or don't have redundancy, and the auditors verify that as fact: ta-da SAS70 seal of approval.

    • by Skapare ( 16644 )

      We are way ahead of you! We did a backup once, and threw it away!

  • ... they mean that the data centre in question definitely does not want customers to come round and inspect the place themselves, and possibly ask awkward questions.

    The presence of a certification unaccompanied by an invitation to come and look over the place yourself should be a pretty good warning.

  • in my humble experience, especially on the continuity area, certs mean something if management assertions are really tested in real life like scenarios... a data center may have adequate UPS and 2 generators but it may not protect the "system" from pure human idiocity. So in a real life case, once, when power failed, UPS kicked in until generators started. However BOTH generators started and due to high power surge current protectors shut both down at the same time... what do you say to that?
    • by afidel ( 530433 )
      What I say is someone didn't know what they were doing. Why would you have both generators powering a single feed? It makes MUCH more sense to have completely physically independent A+B paths that only share a common ground/earth. Heck in that scenario they must only have a single ATS which in my experience is the least reliable part in an emergency power system (generators can be finicky but in a well run center they are tested weekly so you should know when they are acting up, most places don't test their
  • Certainly at the worker bee level we all can agree that most certs are not worth the paper that they're printed on, however when you start looking at what the company needs and requires then, yes, the certs do provide some value.
    Imagine signing a multi-million dollar contract with a data center. Part of the contract are clauses for things like QOS, DR, and a whole host of other very tiny details which are so, so important in the contract. Now, lets say that the data center goes down (fire for example), al

  • DaCurryman has it right. SAS 70 (dead) and the new standards (SOC 1, SOC 2, SOC 3) are not certifications. SOC 1 (SSAE 16) is not intended to provide assurance over security. It is intended to provide financial statement auditors (not management of prospective customers) with an understanding of controls in place at a service organization that impact the financial reporting of their audit clients (the data center customers). None of the AICPA "standards" have anything to do with the "lofty operational sta
  • In a Type 1 audit, all the auditors look for is whether the company has policies/procedures/controls in effect to obtain the objectives of the company (whatever those may be)

    In a Type 2 audit, the auditors will attempt to determine whether the policies and procedures in place are being followed. Whether the controls are effective in achieving the objectives that have been stated.

    I work for a software company that recently went through a Type 2 audit. In our case most of what was looked at was our SDLC (sof

We are Microsoft. Unix is irrelevant. Openness is futile. Prepare to be assimilated.

Working...