6. 1 – Information Security Analysis
The first critical step is to find out what data you have,
where it is and who has access.
2 – Use the free tools
Leverage basic, free, platform-native tools for immediate
analysis of security risks along with cost monitoring and
planning. Azure and AWS Security centres are great
analysis tools and available for free, certainly for the initial
assessment and recommendations.
3 - Design and adhere to a tagging plan
Tagging is adding metadata to a resource to be able to
understand its purpose.
4 – Good Governance and automation
Agree good governance policies with your teams and apply
as many automated controls as possible to avoid human
error.
5 – Rightsize Resources
Choose the right resource profile (number of
CPU’s, amount of RAM, network bandwidth) to
match the service-level expectations (performance,
availability, reliability) of the business.
6 – Choose an appropriate pricing model
Introduce more predictability into the spending
pattern by invoking incentives pricing models in
conjunction with capacity planning.
7 – Reclaimed orphaned resources
Review the active resources for each cloud account
and delete those that have been orphaned or
forgotten.
7. Managed
Zone
Unmanaged
Zone
The Outcome
Follow our Seven step to address cloud sprawl, and
expand the managed zone by bringing teams and
resources into the fold with proper IAM
governance, automation and deployment policies.
What was ‘unmanageable’ has now been classified
as ‘managed’ and the SLA’s have been updated to
allow an external party to support this.