OVH Service Organization Controls (SOC SM ) 3 Report-Type II. Trisotech Inc OVH

Similar documents
Webtrends Inc. Service Organization Controls (SOC) 3 SM Report on the SaaS Solutions Services System Relevant to Security

SOC for cybersecurity

Why Choose. OVH.com?

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice

IT Attestation in the Cloud Era

SOC 3 for Security and Availability

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

SAS 70 SOC 1 SOC 2 SOC 3. Type 1 Type 2

The GDPR Are you ready?

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

Google Cloud & the General Data Protection Regulation (GDPR)

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT

A company built on security

Understanding and Evaluating Service Organization Controls (SOC) Reports

C22: SAS 70 Practices and Developments Todd Bishop, PricewaterhouseCoopers

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Senior Manager Information Technology (India) Duration of job

Management Assertion Logius 2013

GDPR: A QUICK OVERVIEW

Auditing IT General Controls

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

GDPR Update and ENISA guidelines

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Oracle Buys Automated Applications Controls Leader LogicalApps

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

SOC Lessons Learned and Reporting Changes

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

Protecting your data. EY s approach to data privacy and information security

Data Center Management and Automation Strategic Briefing

NOW IS THE TIME. to secure our future

Cyber security and awareness for non-financial services. 24/25 May 2017

Audit Considerations Relating to an Entity Using a Service Organization

SERVICE ORGANIZATION CONTROL (SOC) REPORTS: WHAT ARE THEY?

M&A Cyber Security Due Diligence

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS

10 Considerations for a Cloud Procurement. March 2017

Version 1/2018. GDPR Processor Security Controls

Service Organization Control (SOC) Reports: What they are and what to do with them MARCH 21, 2017

California ISO Audit Results for 2011 SSAE 16 & Looking Forward for 2012 December 15, 2011

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

VMware vcloud Air Accelerator Service

PROTERRA CERTIFICATION PROTOCOL V2.2

Testers vs Writers: Pen tests Quality in Assurance Projects. 10 November Defcamp7

Independent Accountants Report. Utrecht, 28 January To the Management of GBO.Overheid:

SERVICE ORGANIZATION CONTROL 3 REPORT

Your Trusted Partner in Europe European Business Reliance Centre

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Clarity on Cyber Security. Media conference 29 May 2018

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

ISACA Cincinnati Chapter March Meeting

Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit Abstract from Nordic ISACA Conference 2014, Oslo, Norway.

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

January 25, Digital Governments. From KPMG s Harvey Nash survey to a future of opportunities

The SOC 2 Compliance Handbook:

ROLE DESCRIPTION IT SPECIALIST

How unified backup and cloud enable your digital transformation success

EXAM PREPARATION GUIDE

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

Never a dull moment. Media Conference «Clarity on Cyber Security» 24 May 2016

L18: Integrate Control Disciplines to Increase Control and Save Money

3/13/2015. COSO Revised: Implications for Compliance and Ethics Programs. Session Agenda. The COSO Framework

How Secure is Blockchain? June 6 th, 2017

PERFORMANCE TECHNOLOGIES A.E. July 2016

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

An Overview of ISO/IEC family of Information Security Management System Standards

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Data Processing Agreement for Oracle Cloud Services

Professional Evaluation and Certification Board Frequently Asked Questions

IT risks and controls

Securing BYOD With Network Access Control, a Case Study

An Introduction to the ISO Security Standards

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner

Independent Accountant s Report

Symantec Data Center Transformation

Level Access Information Security Policy

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Introduction to ISO/IEC 27001:2005

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Data Processing Clauses

Information for entity management. April 2018

IT Audit Process. Prof. Mike Romeu. January 30, IT Audit Process. Prof. Mike Romeu

How To Reduce the IT Budget and Still Keep the Lights On

Request for Qualifications for Audit Services March 25, 2015

HIPAA Privacy, Security and Breach Notification

CLOUD COMPUTING APPLYING THIS NEW TECHNOLOGY TO YOUR PRACTICE

HCL GRC IT AUDIT & ASSURANCE SERVICES

ADVANCED AUDIT AND ASSURANCE

Data Processing Amendment to Google Apps Enterprise Agreement

INTELLIGENCE DRIVEN GRC FOR SECURITY

SSAE 18 & new SOC approach to compliance. Moderator Name: Patricio Garcia Managing Partner ControlCase Attestation Services

Turning Risk into Advantage

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration

Fifteen Best Practices for a Successful Data Center Migration

How to avoid storms in the cloud. The Australian experience and global trends

Transcription:

OVH On OVH s Description of its Private Cloud System on the Suitability of the Design and Operating Effectiveness of its Controls Relevant to Security. Period from December 1 st, 2015 to November 30 th, 2016 1

Table of contents SECTION I Independent Service Auditor s Report provided by KPMG... 4 SECTION II Description of controls provided by OVH... 6 1. Management Assertion... 7 2. Company overview... 8 3. Definition of Services covered in the report... 10 4. Dependency on sub service organizations controls... 11 5. Relevant aspects to System description and control environment.. 11 6. Complementary User-Entity Controls... 14 2

-Intentionally left blank- 3

SECTION I Independent Service Auditor s Report provided by KPMG 2016 KPMG S.A., a French limited liability entity and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International Cooperative (KPMG International). 4

Independent Service Auditor s Report To the Board of Directors of OVH Groupe SAS, Roubaix, France -hereinafter also referred to as OVH or Company - We have examined management's assertion that during the period December 1st, 2015 to November 30th, 2016, OVH Group SAS ( Service Entity ) maintained effective controls over the Private Cloud Services System to provide reasonable assurance on the suitability of the design and operating effectiveness of controls to meet the criteria for the security principle set forth in TSP section 100, Trust Services Principles, Criteria, and Illustrations for Security, Availability, Processing Integrity, Confidentiality, and Privacy issued by the American Institute of Certified Public Accountants and the Chartered Professional Accountants of Canada (applicable trust services criteria) (applicable trust services criteria). OVH's management is responsible for this assertion. Our responsibility is to express an opinion based on our examination. Management's description of the aspects of the OVH Private Cloud Services System covered by its assertion is attached. We did not examine this description, and accordingly, we do not express an opinion on it. Our examination was conducted in accordance with attestation standards established by the American Institute of Certified Public Accountants, CPA Canada and, accordingly, included (1) Obtaining an understanding of OVH s relevant controls over the security of the Private Cloud Services System; (2) Testing and evaluating the operating effectiveness of the controls; and (3) Performing such other procedures as we considered necessary in the circumstances. We believe that our examination provides a reasonable basis for our opinion. Because of the nature and inherent limitations of controls, OVH s ability to meet the aforementioned criteria maybe affected. For example, controls may not prevent or detect and correct error or fraud, unauthorized access to systems and information, or failure to comply with internal and external policies or requirements. Also, the projection of any conclusions based on our findings to future periods is subject to the risk that changes may alter the validity of such conclusions. In our opinion, management's assertion referred to above is fairly stated, in all material respects, based on the AICPA and CPA Canada trust services security criteria. Montreal, December 21 st, 2016 Paris, December 21 st, 2016 KPMG Canada LLP. KPMG France SA. Renaud Ronchieri, Partner, IT Advisory 5

SECTION II Description of controls provided by OVH 6

1. Management Assertion 7

2. Company overview 2.1. Historical background and international expansion The origins of OVH.com date back to 1999 when Octave Klaba, then a recent IT graduate from a leading French engineering school (ICAM Lille) acquired his first Server to host his own personal website. He quickly noticed the lack of any affordable webhosting solution for individuals and small businesses. By word of mouth, he received a growing demand from friends and other individuals to host their websites, so he decided to purchase additional units to meet this demand. Octave and his family, all engineers, quickly understood the huge potential behind the idea and joined forces to develop the business. In 2003, the family embarked upon the design, assembly and commercialization of their own Servers and established first a Datacenter in Paris. At that time OVH.com engineered a unique and groundbreaking Watercooling system for Servers, now a proprietary technology providing OVH.com, with a distinct competitive advantage over its competitors, in terms of energy consumption and costs, a major expense for Datacenter operators. The savings gained from vertical integration of Server production and the many innovations including Watercooling allowed OVH.com to offer a competitive value proposition for hosting solutions (little more than half the price of competitors at the time) combined with reliability and performance. OVH.com development milestones 1999 2003 2005 2006 2007 2009 2011 2012 2013 Founding of OVH.com: First internet hosting solutions Design of the Watercooing system Opening of a Datacenter in Paris Launch of RBX 1 Launch of a program to open Sales offices in other European countries Launch of RBX 2 Launch of RBX 3 Launch of RBX 4 Launch of VoIP and xdsl Investment in Cloud Computing and Wind turbines Launch of RBX 5, SBG 1 and BHS in Canada Design of the Aircooling system Launch of SBG 4, GRA 1 Raised 140m syndicated loan facility Investment in the USA Source: Company information 8

With leading technology and an attractive value for money offer on a fast growing market, OVH.com was well positioned for the rapid growth that ensued. In 2005, the company began to feel constrained by the relatively small Paris Datacenter that hosted its Servers and decided to move its headquarters to Roubaix where it built its first self-designed Datacenter (RBX 1). The Roubaix site continued to expand year after year to accompany OVH.com s growth. Roubaix now features six modern Datacenters built with incremental technologies driven by the group s large investment in R&D over the years. The Roubaix 4 and 5 Datacenters were built in 2011 and 2012 using a cutting edge proprietary eco-room technology which allows the sites to operate in optimal condition with no recourse to any kind of active air conditioning. Together, Roubaix s six Datacenters currently host close to 140,000 Servers along with their backups, infrastructure and the necessary systems to ensure the reliability, security and redundancy of Data stored, as well as best in class transmission speeds. From 2005 to 2010 OVH.com also opened a new chapter of its history by starting its international expansion, opening Sales offices in 14 other countries across Europe and Africa. International expansion and presence Source: Company information 9

As well as the above strategic investments, OVH.com continued to reinforce its core business in Europe: In 2012, in addition to RBX 5, OVH.com opened a new Datacenter in Strasbourg (SBG 1). In 2013, OVH.com also continued its expansion in Strasbourg with Strasbourg 4 (SBG 4) and developed the largest data center in Europe in Gravelines (GRA 1 near Dunkerque) on more than 20,000 sqm. Further additions were being made to the OVH.com Datacenter base in 2014 with the launch of SBG 3, BHS 2 and RBX 6. These investments are part of OVH.com Management s strategy aimed at driving long term growth by focusing investment in new generation technologies with very high growth potential, as well as increasing its footprint in key growth markets 3. Definition of Services covered in the report This report concerns the Private Cloud Services provided by OVH to its final customers. The Private Cloud Services are Infrastructure As A Service services. These services are delivered and operated from the Data Centers of Paris, Roubaix and Strasbourg for France and Beauharnois for Canada. Private Cloud Services consist of machines (hosts, datastores) or resources (RAM, CPU) offered to customers on totally dedicated high availability infrastructures. Driven by VMware and Microsoft solutions in "as a Service" mode, clients build their Cloud by adding on demand physical resources to meet their needs and achieve business growth. Virtual machines (VMs) are hosted in a virtual environment. Clients get the features of a physical server without having the actual hardware. Any OS can be installed on a VM and Clients can create as many VMs as they need on their Private Cloud. Once the VM has been installed as per the model, Clients can customize as they want (CPU, RAM, storage, software...), to obtain a final version which matches the initial requirement. The hosts and datastores are interconnected via a high availability lossless network. The 100% guarantee also applies between the internet and the virtual machines. Private Cloud responds to numerous outsourcing requirements, as well as those of secure critical infrastructure construction. Total isolation and High Availability SLAs are guaranteed for the customers. 10

4. Dependency on sub service organizations controls As part of OVH Groupe SAS s activities, some Data Center maintenance activities are subcontracted to a set of third party providers. The control objectives and related controls executed by subcontractors are included in OVH Groupe SAS s description of its controls and are included within the scope of this report as the controls are the responsibility of OVH. 5. Relevant aspects to System description and control environment 5.1. Organisation, People and Processes The control environment sets the tone of an organisation, influencing the control consciousness of its people. It is the foundation for all other components of internal control, providing discipline and structure. Control environment factors include the integrity, ethical values, management's operating style, delegation of authority systems, as well as the processes for managing and developing people in the organization. The teams, especially the one working on the Private Cloud perimeter comprises only a small number of employees, and meetings are held, on demand, with the managers of the departments. Employees working on the Private Cloud have a confidentiality clause in their contract, and they are aware that a breach of confidentiality is a cause for immediate dismissal. Every employee has several review meetings with his operational manager, and at least every two years with his hierarchical superior. The management has developed a revamping and completion of procedures, which mostly address the functioning or development of controls. Management also organises the distribution of roles and responsibilities to combine at best the competences and experience of key staff between system and software development and maintenance skills. Private Cloud junior operators are supervised and trained by senior operators, who have mostly been trained and promoted in-house on the Private Cloud Solutions. Turnover of staff is considered particularly low for this business. Periodical, temporary, or permanent changes of distribution of roles and responsibilities between technical staff and management are also part of the company policy to optimize the rotation of experiences and add to the quality control. Definition of controls and possibility to implement, with due consideration to the cost versus importance of risk is the responsibility of the Board, who is assisted for technical issues by internal and external Technical Experts / Consultants. Procedures are defined by the technical staff and approved by Quality and Internal Control and Top Management, with the participation of relevant managers when needed. 11

Monitoring of procedures is the responsibility of the Quality and Internal Control Manager and the Board. Regular external audits are performed by external auditors for the operational tasks and compliance with ISO 27001 security requirements. For the Private Cloud, Management periodically reviews with the managers the respect of procedures and results controls. 6.1.1 Risk Assessment processes Every entity faces a variety of risks from external and internal sources that must be assessed. A precondition to risk assessment is establishment of objectives and thus risk assessment is the identification and analysis of relevant risks to achievement of assigned objectives. Risk assessment is a prerequisite for determining how the risks should be managed. Any decision, whether related to acquisition of software, change in the hardware infrastructure, development of new functionality for the Private Cloud Infrastructure management portal, implementation of protective measures and controls, or other, is made by the Board after sharing between the managers and collective evaluation of risks as far as possible. A structured and formalized risk assessment approach was initiated by OVH in 2013, aiming to identify the major risks on the core business processes and finance, legal, HR, purchasing and sales processes. This process is rolled out once a year to adjust risk assessment regarding business changes and notably is a basis for decision regarding new business investments. Operational and technical risk assessment for the Private Cloud Solution was initiated in 2012 during the Information Security Management System (ISMS) implementation and is reviewed yearly prior to the ISO 27001 certification. Risks are identified at a detailed level and action plans are defined, implemented and monitored in order to mitigate those risks. A process dealing with security breaches and incidents has been implemented within the ISMS in order to anticipate and handle properly, with the minimal impact on operations, the security incidents. 6.1.2 Information and Communication processes Pertinent information must be identified, captured and communicated in a form and timeframe that enables people to carry out their responsibilities. Information systems deal not only with internally generated data, but also information about external events, activities and conditions necessary for informed business decision making and external reporting. Effective communication also must occur in a broader sense, flowing down, across and up the OVH organization. All personnel receive a clear message from top management that control responsibilities must be taken seriously. They understand their own role in the internal control system, as well as how individual activities relate to the work of others. They have a means of communicating significant information upstream. There also needs to be effective communication with external parties, such as customers, suppliers, regulators and shareholders. 12

For any new procedure release or modification, all members of staff are informed by Email and have access to such procedure in the collaborative internal web site. The CEO also communicates by Email to all members of staff for important subjects related to the company, evolution of new contracts, start of new projects, introduction of new applications, etc. In the case of new projects with new infrastructure or software, a special project team is formed and trained and a supervision program is established. Technical and operational processes of the Private Cloud Infrastructure are formalized and controlled by the Quality and Internal Control Manager, with many consistency and accuracy controls which have been designed over time, since the ISMS implementation in 2012 and the 1 st ISO 27001 Certification. 6.1.3 Monitoring processes Internal control systems are monitored by a process that assesses the quality of the system s performance over time. It is accomplished through both ongoing monitoring activities as well as periodic, separate evaluations. Monitoring controls operate at the entity level as well as at the process level. Supervision of controls for the technical Private Cloud infrastructure (hardware and software), is performed directly by the Quality and Internal Control Manager and the Board. The Quality and Internal Control Manager reviews the respect of SLAs for technical processes, and is directly supervising the running and maintenance of the infrastructure on a day to day basis. Data Center Managers are in charge of supervision of controls related to security and protection of premises, as well as direction and supervision of the providers in charge of administration of environmental controls. Technical incidents and problems (breakdown, disruption of service, slow down, bugs, etc.) are subject to analysis and review in management meetings based on the event. Having in mind the transparency culture of the company towards its operations, these incidents are communicated in real time to final clients through a dedicated internet portal, access is not restricted. The small number of incidents since the launch of the Private Cloud Solution, as well as the results of SLA Compliance and technical partners audits, is the best reward and motivation for this dedication. 13

6.2 Infrastructure, Software and Data Private Cloud Computing ( PCC ): OVH.com s Private Cloud offers the most secured Cloud Solution with guaranteed resources and the best cost-effectiveness on the market. With this service, the physical computing resources (the Servers) used for a given customer s web data are ring-fenced and isolated from other Servers: they will serve only for the customer s data, however the load from several customer services will be automatically balanced across the customer s private Cloud, allowing for optimal performance without the need to use different physical machines for each service. Services will instead be attributed one or more virtual machines to run on and more or less resources / hosts will be allocated to each service depending on the overall load. In order to offer the very best in Private Cloud virtualization, OVH.com has developed a strong partnership with VMware aiming to deliver complete Virtual Machines and Hypervisor platforms ready to run on OVH.com s Servers. This historical partnership is a strong entry barrier on the market for new entrants who would need to negotiate their own system configurations in order to offer customers turnkey solutions as integrated and easy to use as OVH.com s. 6. Complementary User-Entity Controls OVH s system was designed with the assumption that certain policies, procedures and controls would be in existence or implemented by user entities. These controls should be in operation at the user entities to complement OVH s controls to achieve the customer s security or business requirements in regard to the use of the System. 14

2016 OVH, OVH.com. All rights reserved. The OVH name and logo are registered trademarks or trademarks of OVH Group SAS.