Explore the fundamentals of cloud service models (IaaS, PaaS, SaaS), understand deployment architectures, examine shared responsibilities and learn about key risks and best-practice controls critical for CPA oversight of modern IT infrastructure.
Cloud computing has transformed how organizations store, process, and manage their data. From an accounting and audit perspective, understanding cloud service models and deployment architectures is vital for evaluating IT controls, financial reporting considerations, and compliance requirements. As organizations increasingly move critical processes and data into the cloud, CPAs must be aware of the nuanced responsibilities, risks, and controls that come with each cloud environment.
Cloud-based solutions offer a combination of flexibility, scalability, and cost-effectiveness compared to on-premises data centers. However, each cloud service model demands unique control frameworks and security postures. This section discusses the most common cloud service models—Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)—and addresses typical deployment architectures (public, private, hybrid, and community clouds). Additionally, it highlights shared responsibility considerations, risks, and best-practice controls to help CPAs and auditors provide meaningful oversight and advisory services.
Building on topics introduced in Sections 5.1 (Hardware Components and Networks) and 5.2 (Operating Systems and Virtualization), this discussion enables a comprehensive view of how various cloud strategies can integrate with an entity’s overall IT architecture.
Cloud service models are typically categorized by the level of abstraction provided to the end user. At one end, IaaS grants the greatest level of control (and responsibility) over infrastructure; at the other, SaaS offloads much of the technological burden onto the service provider. These models can be visualized along a continuum of responsibility and functionality.
In the shared responsibility model, both the cloud service provider (CSP) and the customer are accountable for different aspects of the technology stack. Understanding where the boundaries of responsibility lie is crucial for designing, implementing, and testing effective internal controls.
IaaS offers hardware resources—such as virtual servers, storage, and networking—on a pay-per-use basis. The CSP manages the underlying physical infrastructure, hypervisor, and often basic security of the core networking components. However, the customer has significant responsibility, including:
• Operating System (OS) Installation and Updates
• Database Management and Configuration
• Security Patches for OS and Applications
• Data Encryption and Access Control
• Network Configuration within Hosted Virtual Machines
IaaS is often leveraged when organizations require fine-grained control over their systems or need to run proprietary software that is not supported on a more abstracted service model.
From a financial perspective, IaaS transforms capital expenditures (CapEx) such as server purchases into operational expenditures (OpEx), where costs scale with actual usage. CPAs advising clients on cost management and budgeting strategies should analyze usage metrics and invoice data carefully to confirm that monthly IaaS charges align with forecasted allocations.
Risks and Controls in IaaS:
• Misconfiguration of virtual machines (VMs) can lead to data breaches.
• Ineffective patch management exposes systems to known vulnerabilities.
• Unauthorized access due to weak identity management.
Best-Practice Controls:
• Implement hardened VM images and automated configuration scripts.
• Adopt a formal patch management program.
• Enforce multi-factor authentication (MFA) for privileged accounts.
• Use network segmentation to isolate critical workloads.
PaaS provides a managed platform—comprising the runtime environment, middleware, and other development tools—on which organizations can build and deploy applications. The CSP handles the underlying infrastructure, including servers, storage, and virtualization, along with essential environment configurations like operating system patching.
In a PaaS model, the organization’s primary focus is application-level logic and data. The time and cost associated with provisioning hardware, managing OS patches, and configuring middleware are drastically reduced. This “hands-off” infrastructure management can accelerate development cycles and streamline DevOps workflows.
CPAs need to pay special attention to the inherent vendor dependency in a PaaS model. Because the CSP controls the runtime environment, any changes to the platform (e.g., forced upgrades or deprecations) can disrupt application availability and potentially trigger financial or operational risks.
Risks and Controls in PaaS:
• Potential for vendor lock-in if the platform’s frameworks are highly specialized.
• Data and application security: the user remains responsible for protecting application-stored data.
• Limited access to underlying system logs may hamper in-depth audits and forensic investigations.
Best-Practice Controls:
• Conduct periodic reviews of platform features and versions supported by the CSP.
• Establish strong encryption mechanisms and secure coding standards at the application level.
• Integrate an application performance monitoring (APM) solution to track usage, performance, and potential anomalies.
• Define fallback or migration strategies in the event of platform changes or service discontinuation.
SaaS solutions deliver fully functional applications to end users, with the CSP managing virtually all aspects of the underlying infrastructure, middleware, and application code. Common examples include enterprise resource planning (ERP) modules, Customer Relationship Management (CRM) systems, and various collaboration or productivity apps. Clients generally handle only user access controls and some data governance responsibilities, such as classification, encryption at rest, and user provisioning.
The SaaS model is particularly attractive to smaller organizations or departments with limited IT resources because it eliminates the need for traditional installation, maintenance, or upgrade processes. However, reliance on the vendor’s security posture, release management approach, and service-level agreements (SLAs) must be carefully monitored.
Risks and Controls in SaaS:
• Dependence on the vendor’s controls: If the vendor’s security posture is compromised, customer data is at risk.
• Potential for data residency issues if the vendor hosts data in multiple countries.
• Limited customization options or control in implementing advanced security features.
Best-Practice Controls:
• Review vendor compliance reports (e.g., SOC 1®, SOC 2®) to gauge control efficacy.
• Conduct contractual due diligence on data processing and storage locations.
• Strengthen user provisioning and termination controls to mitigate unauthorized access.
• Periodically export data backups to mitigate the risk of losing access if the vendor ceases operations.
The easiest way to conceptualize these models is to consider how responsibilities shift between customers and the CSP:
• In IaaS, the customer manages the operating system and higher levels, while the CSP manages physical facilities, hardware, and network infrastructure.
• In PaaS, the CSP manages the underlying infrastructure and operating environment, while the customer focuses on application development and data.
• In SaaS, the CSP hosts and maintains the entire software environment, leaving the customer to manage user-level access and certain data governance obligations.
Below is a simplified diagram illustrating the increasing levels of vendor management as we transition from IaaS to SaaS:
graph LR A["IaaS<br/>(Infrastructure as a Service)"] --> B["PaaS<br/>(Platform as a Service)"]; B --> C["SaaS<br/>(Software as a Service)"]; style A fill:#cdefff,stroke:#036,stroke-width:1px style B fill:#e1ffd4,stroke:#093,stroke-width:1px style C fill:#ffdacc,stroke:#c60,stroke-width:1px
In each model, the organization must understand the layers of responsibility that remain within its control. For instance, in an IaaS environment, the CPA might evaluate whether the organization has sufficient processes for patching operating systems and applications. In a SaaS arrangement, the CPA might focus more on access controls, vendor governance, and data integrity checks.
Cloud deployment architectures define how services are made available to users and how they are managed. Common deployment models include:
Each deployment model carries trade-offs regarding performance, security, compliance, and cost. CPAs consulting on cloud adoption should weigh the entity’s operational needs, regulatory obligations, and risk appetite when evaluating an optimal architecture.
In all cloud environments, the CSP and customer share certain responsibilities. A high-level depiction of this can be summarized as follows:
• CSP’s Responsibilities: Physical security of data centers, underlying network architecture, base-level operating systems (particularly in PaaS and SaaS), and all aspects of hardware maintenance.
• Customer’s Responsibilities: Configuration of services, user access management, data protection, and compliance with applicable laws and regulations (e.g., GDPR, HIPAA).
Even in a SaaS model (where the CSP handles almost everything behind the scenes), the customer is still responsible for correct user provisioning, data governance, and oversight of how data is being used or shared. The exact demarcation of responsibilities should be clearly reflected in contractual agreements and SLAs.
From a CPA’s standpoint, cloud computing adoption can impact financial reporting and the design of internal controls:
• Cost Classification: Determine whether cloud-related expenditures should be capitalized or expensed, in accordance with relevant accounting standards.
• Vendor Risk Management: Evaluate the CSP’s control environment (e.g., via SOC 1® or SOC 2® reports) to ensure reliability of the financial information processed or stored offsite.
• Regulatory Compliance: Identify data residency and privacy law implications, especially if the CSP’s data centers span multiple jurisdictions.
• Ongoing Monitoring: Confirm that management routinely reviews availability metrics, service-level commitments, and security updates from the CSP.
For instance, an organization leveraging an ERP system in a SaaS model needs to verify that the vendor’s service-level commitments prevent undue downtime that might disrupt financial close activities. CPAs might also request access to the CSP’s vulnerability scan results, penetration test summary reports, or other relevant security attestations to inform their risk assessment.
While the specific risk profile differs among IaaS, PaaS, and SaaS, certain overarching risks are common:
• Data Breach and Unauthorized Access: Cloud elasticity increases the attack surface, especially with widely dispersed endpoints.
• Service Disruption: Outages at a CSP can halt business operations. Redundancy strategies and multi-region deployments help mitigate these events.
• Compliance Violations: Inconsistent classification and handling of sensitive data may lead to noncompliance with sector-specific regulations (e.g., HIPAA for healthcare, GDPR for EU personal data).
• Vendor Lock-In: Proprietary tools or custom development (especially in PaaS) can complicate migrations away from a CSP.
• Contractual Ambiguities: If service-level agreements are vague about responsibilities or fail to specify support and remediation mechanisms, disputes can arise.
Implementing robust controls is critical for ensuring that cloud services align with governance frameworks such as COSO and COBIT. Key controls include:
• Data Lifecycle Management: Encrypt sensitive data in transit and at rest, maintain clear retention policies, and ensure secure destruction processes.
• Identity and Access Management (IAM): Enforce least privilege, implement MFA, and perform regular access reviews.
• Monitoring and Logging: Enable centralized logging and real-time monitoring of suspicious events. Use Security Information and Event Management (SIEM) solutions to correlate activities across systems.
• Vendor Due Diligence: Regularly evaluate the CSP’s compliance posture, incident response capabilities, and financial stability.
• Business Continuity and Disaster Recovery: Define a robust continuity plan that includes data backups, diverse geographic region deployments, and tested runbooks for failover.
• Incident Response Procedures: Document escalation paths, designate internal and external stakeholders, and rehearse simulated breach scenarios.
By aligning these measures with overall enterprise risk management (referenced in Chapter 3), organizations can ensure consistent oversight.
A hallmark benefit of cloud computing is the pay-as-you-go pricing model. Though this can yield cost savings, cost overruns can occur if usage is not managed properly. CPAs can advise on financial management practices such as:
• Establishing budget alerts or usage thresholds.
• Evaluating reserved instances or committed use discounts for predictable workloads.
• Implementing tagging and categorization of resources to accurately attribute costs.
For illustrative purposes, a simplified cost formula for a cloud deployment might be expressed as:
$$ \mathrm{Cost}_{\mathrm{Cloud}} = \mathrm{Usage} \times \mathrm{Rate} ;+; \mathrm{AdditionalFees} $$
Where “Usage” could include compute hours, data storage volume, or network egress traffic; “Rate” is the CSP’s per-unit pricing; and “AdditionalFees” account for charges such as data transfer or specialized support levels.
CPAs should monitor these metrics closely, especially for organizations in highly regulated sectors or those with stringent budget constraints.
Imagine a medium-sized manufacturing company transitioning its on-premises ERP system to a SaaS-based solution. While the new ERP vendor assures secure hosting, the company’s management must:
Cloud computing’s strategic value is indisputable: streamlined operations, reduced capital expenditure, and flexible scaling. Yet, these benefits bring unique control challenges from both an operational and audit standpoint. As CPAs and trusted advisors, it is crucial to understand the different cloud service models, the associated deployment architectures, and the nuanced responsibilities that each arrangement requires. Through careful oversight, robust controls, and close alignment with recognized frameworks, organizations can leverage cloud-based solutions to improve efficiency and innovation while still maintaining compliance with regulatory requirements and safeguarding critical data.
Information Systems and Controls (ISC) CPA Mocks: 6 Full (1,500 Qs), Harder Than Real! In-Depth & Clear. Crush With Confidence!
Disclaimer: This course is not endorsed by or affiliated with the AICPA, NASBA, or any official CPA Examination authority. All content is for educational and preparatory purposes only.