In general, an audit occurs when a third-party, independent body is responsible for finding data through inquiry, examination, observation, affirmation, analytic techniques, and/or re-performance. In a cloud computing audit, there are different ways to come to a conclusion about the architecture and the effectiveness of controls in the following areas: security incidents, risk management, network security, vulnerability and remediation management, and so on. Compliance has different objectives like; validating awareness and adherence, focusing on the description of responsibilities, and illustrating risks where deficiencies exist.