SlideShare a Scribd company logo
1 of 32
SAMPLE CO, INC.
Application Portfolio Assessment for Cloud
Readiness
Sample Report
Date
Software Intelligence for Digital Leaders
2
• This document is a sample portfolio assessment report for developing a
cloud migration roadmap for a portfolio of 20 applications.
• The assessment was completed in three days by analyzing the source
code and completing a few survey questions for each application.
• The key outcomes of this report include:
• Overall assessment of the cloud readiness, health, and open source risk for each
application
• A prioritized list of applications to migrate to the cloud
• Specific recommendations on how to migrate each application to the cloud
• Specific recommendations on software health issues and open source risks that
should be addressed before migrating applications to the cloud
Executive Summary
Contact Us to Learn More Visit CAST Highlight Site
3
• Executive Summary
• Portfolio Snapshot
• Cloud Readiness Assessment
• Software Health Assessment
• Software Composition Analysis
• Why CAST Highlight?
• Appendix
• Data Collection Process
• Metrics & Definitions
Contents
4
Application Portfolio Snapshot
20
applications
6.2m
lines of code
113k
back-fired function points
Software Resiliency
82.3
INDUSTRY | 74.88
Software Agility
66.0
INDUSTRY | 62.18
Software Elegance
72.3
INDUSTRY | 62.82
CloudReady
53.6
INDUSTRY | 65.88
A portfolio snapshot provides a summary
of the portfolio and top line metrics for
all applications.
(All metrics are defined in the appendix.)
5
Application Portfolio Snapshot
Technology Size (LOC) Resiliency Agility Elegance
Javascript 3M 57.09 63.24 57.12
C# 2M 95.41 65.37 78.32
PHP 740K 89.72 69.76 85.08
Java 697K 94.58 68.03 84.69
Python 10K 45.50 52.77 48.82
The portfolio snapshot also includes the portfolio
demographics broken down by technology.
Cloud Readiness Assessment
Application Portfolio Assessment Report
7
0
10
20
30
40
50
60
70
80
90
100
10 20 30 40 50 60 70 80 90 100
Business
Impact
CloudReady
Portfolio Cloud Readiness | Cloud Ready vs Business Impact
INDUSTRY AVERAGE
IaaS / Cost Saving PaaS / App. Value
Hollow
The cloud readiness
assessment begins by
analyzing the entire
portfolio of applications.
This decision matrix crosses
Business Impact with Cloud
Readiness and the size of
the bubbles represents the
relative size of each
application. This helps
determine how to start
segmenting and prioritizing
each application based on
both technical and business
criteria.
8
0
10
20
30
40
50
60
70
80
90
100
10 20 30 40 50 60 70 80 90 100
Business
Impact
CloudReady
Portfolio Cloud Readiness | Segmentation & Prioritization
INDUSTRY AVERAGE
LONG-TERM
BETS
CORE CLOUD
QUICK-WINS
IaaS / Cost Saving PaaS / App. Value START HERE
Hollow Spectator
Tensorflow Fenzo
REFACTOR TO PAAS
Karyon Servo
Beachhead
Priam Lucee Lando
Genie Lowlight Wedge
PURSUE LATER
REHOST TO IAAS
CRM MMU
Analytics AR
IEP AP
REPLACE OR RETIRE
BAT
Soundwave
High Business Impact – Low Cloud Readiness
Longer Term Modernization Candidates
High Business Impact – High Cloud Readiness
Near Term Modernization Candidates Easy to Migrate
Low Business Impact – High Cloud Readiness
Start Migration Here to Demonstrate Early Success with
Lower Business Risk
Low Business Impact – Low Cloud Readiness
Consider Retirement or Replacement with a SaaS Alternative
Here is an example of an initial
portfolio segmentation and
prioritization.
9
Portfolio Cloud Readiness | Top Boosters & Blockers
Below are the top three Boosters and Blockers to Cloud-
Readiness found across the portfolio
Here are the top three
Cloud Migration Blockers
and Boosters observed
across the entire portfolio.
Blockers will be the most
common code level issues
that need to be considered
before migration. These
are described in more
detail on the following
pages.
10
Blocker Detail: Using Stateful Sessions
Rationale and Recommendation
For modern applications running in the Cloud, it is not recommended to be stateful, especially for sessions as
they’re not scalable, and are generally harder to replicate and fix bugs (server-side). Ideally, stateful sessions
should be replaced by stateless and client-side mechanisms such as cookies, client cache (e.g. Redis,
memcache…) or in an external cloud-based storage. This is an important architectural constraint of
microservices-style applications, as it enables resiliency, elasticity, and allows any available service instance to
execute any task.
Each Blocker is described in
detail to begin estimating
the effort level to remediate.
11
Blocker Detail: Use of File System
Rationale and Recommendation
Cloud applications should not assume the local file system is accessible, as the directory structure might be
different from a traditional desktop or server machine and/or the Cloud application may not have sufficient
rights to access the local file system. Instead, use relative paths to application resources
(e.g. ../../reporting/reportBuilder.xml). Depending on your application context and the Cloud platform where it
is deployed, you could also consider using functions or classes like LocalResources to dynamically resolve file
paths.
Each Blocker is described in
detail to begin estimating
the effort level to remediate.
12
Blocker Detail: Perform File Manipulation
Rationale and Recommendation
Manipulating local files requires specific permissions and usually assumes the file will be persisted over time. In
the Cloud, because the underlying infrastructure can be moved or removed, it is not possible to make such
assumptions. Instead of using the file system, store your temporary information in a dedicated Cloud-based
storage or in a NoSQL database.
Each Blocker is described in
detail to begin estimating
the effort level to remediate.
13
Cloud Boosters & Blockers | IEP Application View
Each individual application is then assessed to understand the specific Blockers that
occur within each application so that the segmentation and prioritization can be
further refined based on individual application characteristics.
14
Migration Recommendation | IEP Application
Consideration Criteria Comments
The IEP application team is one of the most advance in the group regarding Cloud
expertise.
The team is used to Cloud development and will be able to identify quickly the
blockers for a PaaS migration.
The application is developed in C# and .NET and uses some out of date
components.
There is some official documentation about the older components but there
are some important pitfalls. The team has decided to focus on rewriting this
component first before migration to cloud. So we decided not to go for a PaaS
migration for the moment. It will be Rehosted to IaaS initially.
Blockers are File manipulation, usage of COM components, unsecured URL
(HTTP), and configuration
The main blocker is the COM components registration, this will be not so
easy to overcome as it is the core of the application. The file manipulation is
replaceable, even easier for the URL and the configuration files.
Recommendation: Rehost to IaaS
A specific migration recommendation is included for each
application along with detailed technical rationale.
15
Cloud Boosters & Blockers | Karyon Application View
Each individual application is then assessed to understand the specific Blockers that
occur within each application so that the segmentation and prioritization can be
further refined based on individual application characteristics.
16
Migration Recommendation | Karyon Application
Consideration Criteria Comments
The context is different on this application because it is already an API application
with a modern design and easy to maintain
The team is used to Cloud development and will be able to identify and
quickly modify the blockers for a PaaS migration.
The key blocker is the usage of a Standard Database provider which is SQL
Server.
This is not a blocker to move to a PaaS service since the application does
not rely on a Database, it just uses connectors to other DB services. This
application is a good candidate for a cloud migration. We decided to go for
a PaaS migration as this app will be central to others in the cloud.
Additional blockers are File manipulation, unsecured URL (HTTP), and
configuration.
The COM components registration, and other blockers are easy to
overcome, because they only apply to the Unit testing part of the
application. The file manipulation is easily replaceable, the configuration is
straightforward on this.
Recommendation: Refactor for PaaS
A specific migration recommendation is included for each
application along with detailed technical rationale.
17
Cloud Migration Roadmap Recommendations
• Wave 1 apps to migrate first:
• Hollow, Spectator, Tensorflow, Fenzo
• Wave 2 apps to migrate next:
• Refactor for PaaS: Karyon, Servo, Beachhead, Priam, Lucee, Lando, Genie, Lowlight, Wedge
• Rehost to IaaS: CRM, MMU, Analytics, AR, IEP, AP
• Potential Retirement or replacement candidates:
• BAT, Soundwave
• Analyze Software Composition of each application to identify any open source components that need to be
upgraded and/or replaced due to CVEs, license risk, or obsolesence before migration.
• Investigate Health of each application to understand if there are any high-risk apps that need to be improved
before migration.
The cloud migration recommendations are then summarized to
develop the overall roadmap for the portfolio.
Software Health Assessment
Software Intelligence for Digital Leaders
Application Portfolio Assessment Report
19
0
20
40
60
80
100
45 55 65 75 85 95
Business
Impact
SoftwareResiliency
DANGER
ZONE
CONFIDENCE ZONE
Software Health | Portfolio View
INDUSTRY AVERAGE DANGER ZONE
Hollow CRM
IEP AR
CONFIDENCE ZONE
Karyon Servo
Beachhead
Priam Lucee Lando
Genie Lowlight Wedge
VULNERABILITIES
IEP Hollow
Tensorflow Fenzo
Analytics AP
Detected Common Vulnerabilities from Software
Composition Analysis
Application Health measures (such as Resiliency)
are analyzed to ensure unhealthy applications are
improved before migration.
20
Software Health | Tensorflow Application View
Unhealthy applications are analyzed at a deeper level to
understand specific code-level improvement opportunities.
21
Software Health | Recommendations
• Some apps have Resiliency scores that are severely low. Code alerts should be remediated before migration to
cloud on these applications:
• Hollow
• CRM
• IEP
• AR
• Security Vulnerabilities were identified in a few applications and a deeper Software Composition Analysis
should be performed to investigate the open source components in these applications further:
• Spectator
• MMU
• Tensorflow
• Fenzo
• Analytics
• AP
Additional recommendations on how to improve Software Health issues
and potential security vulnerabilities are summarized.
Software Composition Analysis
Software Intelligence for Digital Leaders
Application Portfolio Assessment Report
23
CAST Confidential
Software Composition Analysis Overview
23
Open source is one of
the major entry points
for hackers. It is critical
to identify if the third-
party components in
use contain security
vulnerabilities.
Open source licensing can
be complex and
confusing. Visibility on the
licenses used by open
source components is
required to detect any
restrictive license
compliance issues.
Open source components can
become out of date or
unsupported resulting in
functional and security risks.
These out of date
components must be
detected and replaced with
supported components.
24
Software Composition Analysis | Security Vulnerabilities
Application Components
IEP cxf-rt-transports-http-jetty 3.0.3, slf4j-api 1.7.7, jsch 0.1.42
CRM Microsoft.Practices.EnterpriseLibrary.Logging 4.1.0.0, Microsoft.Practices.EnterpriseLibrary.Common 4.1.0.0
Beachhead cxf-rt-frontend-jaxws 2.7.5
Karyon minimatch 3.0.0, useragent 2.1.12, qs 2.3.3, decamelize 1.1.1, parsejson 0.0.3, hapi 15.x.x,
Hollow
tomcat-embed-core 7.0.73, slf4j-api 1.7.7, cxf-rt-frontend-jaxws 2.7.12, is-my-json-valid 2.12.0, ua-parser-js 0.7.12,
marked 0.3.6, minimatch 3.0.0, useragent 2.1.11, jquery 1.7.2, hibernate-validator 4.2.0.Final,
Other apps
openjpa-persistence-jdbc 2.1.1, commons-fileupload 1.2.1, jackson-databind 2.5.3, dom4j 1.6.1, jsoup 1.8.1, derby 10.1.1.0
…
Vulnerabilities 10 CRITICAL 46 HIGH 22 MEDIUM 0 LOW
Critical and High severity security vulnerabilities
are highlighted for each application.
25
Software Composition Analysis | License Risk
License Risk
Application 3rd-Party Components Licenses
IEP 7 MIT License (2), Apache 2.0 (1), BSD-3 New
CRM 12 Apache 2.0 (3), GNU Affero GPL 3.0 (2)
Beachhead 4 MIT License (2), ISC License (1)
Karyon 579
MIT License (358), ISC License (39), Apache 2.0 (16), Eclipse 2.0 (1), BSD 2 (14), GNU Affero GPL 3
(1), BSD 3 (1)
Hollow 32 MIT License (2), Apache 2.0 (1), GNU GPL 3 (4)
Applications that use open source components
with risky licenses are highlighted.
26
Software Composition Recommendations
• IEP: Upgrade jsh component to latest version to reduce critical vulnerability risk
• Hollow:
• Upgrade hibernate component to latest version to reduce critical vulnerability risk
• Replace component that uses the GNU GPL license to avoid copyleft licensing risk
• CRM: Replace component that uses the GNU GPL license to avoid copyleft licensing risk
• Karyon: Replace component that uses the GNU GPL license to avoid copyleft licensing risk
Specific recommendations on how to reduce open source
vulnerability and license risk are summarized.
27
Why CAST Highlight?
CAST Highlight performs automated source code analysis of hundreds of
applications in a week for Cloud Readiness, Open Source risks, Resiliency, and Agility.
Objective software insights combined with qualitative surveys for business context
enable more informed decision making to:
• Accelerate Cloud Migration
• Rationalize Application Portfolios
• Manage Open Source Risk
• Optimize Tech Due Diligence
Cloud Readiness
Prioritize cloud candidates across the app portfolio
Identify Blockers that slow down your cloud migration
Get insights for adopting containers and cloud native
sooner
Software Composition
Identify open source security vulnerabilities and licensing risks
Control technology obsolescence of third-party components
Target critical apps that have the largest impact on the
business
Trusted By:
Software Health
Measure Resiliency, Agility, and Complexity
Gain objective metrics to support Application Rationalization
Target applications with high business impact & cost to
maintain
Contact Us
to learn how to generate an application
portfolio assessment report automatically
Software Intelligence for Digital Leaders
Visit the CAST Highlight web
site.
SAMPLE CO, INC.
Appendix
Software Intelligence for Digital Leaders
Date
Data Collection for CAST Highlight
CAST Confidential
30
Survey Information
• Augment analysis data
• Calculate metrics (e.g. Business
Impact)
• Customizable to collect client-
specific information
Source Code Analysis
• Locally run analysis
• Built for speed
• Generates application-and
portfolio-level insights
31
Key Metrics & Methodology Definitions
Key Metric Description Direct Interpretation Business Impact
Software Resiliency
Measure the robustness and how bullet-proof
is the Software against production failure
Reflects presence of code patterns that
may comprise vulnerability of the
software
Customer Satisfaction
Customer Confidence / Loyalty
Opportunities & Revenue
Software Agility
Measure to indicate the easiness of a
development team to understand and
maintain an application
Reflects absence of embedded
documentation and code readability good
practices
Maintenance Cost
Transferability
Software Elegance
Measures the ability to deliver software value
with less code complexity
Indicates decreased quality in code,
resulting in higher defects that become
costly to fix
Time to Market
Innovation
Cloud Ready
Measure of software and organization
characteristics to speed PaaS migration
Significant number of roadblocks found
that could slow down a Cloud migration
Opportunity to reduce cost, increase
elasticity and embrace innovation
High > 87.0
Medium > 66.0
Low < 66.0
Resiliency
High > 69.0
Medium > 55.0
Low < 55.0
Agility
High > 77.0
Medium > 50.0
Low < 50.0
Elegance
High > 75.0
Medium > 65.0
Low < 65.0
Cloud Ready
32
CloudReady Index Calculation Formula
CloudReady
45.2
13.4
Based on
CloudReady Survey**
(weight of 50%)
Based on
CloudReady Scan***
77.1
(weight of 50%)
5.6
Based on Positive
Code Patterns
(weight of 10%)
Boosters
5.0
Based on Negative
Code Patterns
(weight of 40%)
Blockers
200+ Code Patterns
Targeted to coding language (Java, C#, VB.Net, T-SQL, PHP, Python)
Positive (Boosters) or Negative (Roadblocks) contribution
Criticality level (critical, high, medium, low)
Impact area (Code, Framework, Architecture)
Code Patterns Score
**CloudReady Survey score - from 0 to 100 - relies on the answers provided by the Application Owner. Depending on the importance of a question, its answers may impact the score differently.
***CloudReady Code Scan score - from 0 to 100 - relies on both Booster and Blocker scores, where Booster and Blocker scores respectively account for 20% and 80% in the Code Scan score.

More Related Content

What's hot

Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialAlibaba Cloud
 
Capgemini Cloud Assessment - A Pathway to Enterprise Cloud Migration
Capgemini Cloud Assessment - A Pathway to Enterprise Cloud MigrationCapgemini Cloud Assessment - A Pathway to Enterprise Cloud Migration
Capgemini Cloud Assessment - A Pathway to Enterprise Cloud MigrationFloyd DCosta
 
AWS Application Discovery Service
AWS Application Discovery ServiceAWS Application Discovery Service
AWS Application Discovery ServiceAmazon Web Services
 
Building the Business Case for AWS
Building the Business Case for AWSBuilding the Business Case for AWS
Building the Business Case for AWSAmazon Web Services
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Timothy McAliley
 
Defining Your Cloud Strategy
Defining Your Cloud StrategyDefining Your Cloud Strategy
Defining Your Cloud StrategyInternap
 
Azure Migration Program Pitch Deck
Azure Migration Program Pitch DeckAzure Migration Program Pitch Deck
Azure Migration Program Pitch DeckNicholas Vossburg
 
Migrating to Cloud - A Step by Step
Migrating to Cloud - A Step by Step Migrating to Cloud - A Step by Step
Migrating to Cloud - A Step by Step Imaginea
 
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...Amazon Web Services
 
Cloud-migration-essentials.pdf
Cloud-migration-essentials.pdfCloud-migration-essentials.pdf
Cloud-migration-essentials.pdfALI ANWAR, OCP®
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudTom Laszewski
 
HUAWEI CLOUD General Introduction-for partner.pdf
HUAWEI CLOUD General Introduction-for partner.pdfHUAWEI CLOUD General Introduction-for partner.pdf
HUAWEI CLOUD General Introduction-for partner.pdfDanyMochtar
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseRightScale
 

What's hot (20)

MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is Essential
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
 
Capgemini Cloud Assessment - A Pathway to Enterprise Cloud Migration
Capgemini Cloud Assessment - A Pathway to Enterprise Cloud MigrationCapgemini Cloud Assessment - A Pathway to Enterprise Cloud Migration
Capgemini Cloud Assessment - A Pathway to Enterprise Cloud Migration
 
AWS Application Discovery Service
AWS Application Discovery ServiceAWS Application Discovery Service
AWS Application Discovery Service
 
Building the Business Case for AWS
Building the Business Case for AWSBuilding the Business Case for AWS
Building the Business Case for AWS
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
 
Defining Your Cloud Strategy
Defining Your Cloud StrategyDefining Your Cloud Strategy
Defining Your Cloud Strategy
 
Azure Migration Program Pitch Deck
Azure Migration Program Pitch DeckAzure Migration Program Pitch Deck
Azure Migration Program Pitch Deck
 
Building Your Cloud Strategy
Building Your Cloud StrategyBuilding Your Cloud Strategy
Building Your Cloud Strategy
 
Migrating to Cloud - A Step by Step
Migrating to Cloud - A Step by Step Migrating to Cloud - A Step by Step
Migrating to Cloud - A Step by Step
 
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
 
Cloud-migration-essentials.pdf
Cloud-migration-essentials.pdfCloud-migration-essentials.pdf
Cloud-migration-essentials.pdf
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
 
AWS Business Essentials Day
AWS Business Essentials DayAWS Business Essentials Day
AWS Business Essentials Day
 
Azure migration
Azure migrationAzure migration
Azure migration
 
Cloud Migration
Cloud MigrationCloud Migration
Cloud Migration
 
HUAWEI CLOUD General Introduction-for partner.pdf
HUAWEI CLOUD General Introduction-for partner.pdfHUAWEI CLOUD General Introduction-for partner.pdf
HUAWEI CLOUD General Introduction-for partner.pdf
 
Migration Planning
Migration PlanningMigration Planning
Migration Planning
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
 

Similar to Application-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptx

Best practices for application migration to public clouds interop presentation
Best practices for application migration to public clouds interop presentationBest practices for application migration to public clouds interop presentation
Best practices for application migration to public clouds interop presentationesebeus
 
CloudPilot Application Migration Tools Datasheet - CloudOrigin®
CloudPilot Application Migration Tools Datasheet - CloudOrigin®CloudPilot Application Migration Tools Datasheet - CloudOrigin®
CloudPilot Application Migration Tools Datasheet - CloudOrigin®UnifyCloud
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comArun Somu Panneerselvam
 
Realizing Cloud POV
Realizing Cloud POVRealizing Cloud POV
Realizing Cloud POVRene Claudio
 
How to move to the cloud
How to move to the cloudHow to move to the cloud
How to move to the cloudInterxion
 
Cloud - moving applications to the cloud
Cloud - moving applications to the cloudCloud - moving applications to the cloud
Cloud - moving applications to the cloudJan Wiersma
 
Datasheet datapowerpluginforrd
Datasheet datapowerpluginforrdDatasheet datapowerpluginforrd
Datasheet datapowerpluginforrdMidVision
 
Breaking the Monolith
Breaking the MonolithBreaking the Monolith
Breaking the MonolithVMware Tanzu
 
Velostrata cloud migration --Whitepaper
Velostrata cloud migration --WhitepaperVelostrata cloud migration --Whitepaper
Velostrata cloud migration --WhitepaperAbhishek Sood
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a CloudDivya S
 
Cloud Computing Best Practices
Cloud Computing Best PracticesCloud Computing Best Practices
Cloud Computing Best PracticesBluePiIT
 
CRM Trilogix; Migrating Legacy Systems to the Cloud
CRM Trilogix; Migrating Legacy Systems to the CloudCRM Trilogix; Migrating Legacy Systems to the Cloud
CRM Trilogix; Migrating Legacy Systems to the CloudCraig F.R Read
 
Cloud workload migration guidelines
Cloud workload migration guidelinesCloud workload migration guidelines
Cloud workload migration guidelinesJen Wei Lee
 
Making the Journey_ 7 Essential Steps to Cloud Adoption.pdf
Making the Journey_ 7 Essential Steps to Cloud Adoption.pdfMaking the Journey_ 7 Essential Steps to Cloud Adoption.pdf
Making the Journey_ 7 Essential Steps to Cloud Adoption.pdfAnil
 
Cloud First Architecture
Cloud First ArchitectureCloud First Architecture
Cloud First ArchitectureCameron Vetter
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
10 Key Digital Infrastructure Considerations
10 Key Digital Infrastructure Considerations10 Key Digital Infrastructure Considerations
10 Key Digital Infrastructure ConsiderationsCognizant
 
Azure App Modernization
Azure App ModernizationAzure App Modernization
Azure App ModernizationPhi Huynh
 
Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...
Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...
Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...DigitalOcean
 

Similar to Application-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptx (20)

Best practices for application migration to public clouds interop presentation
Best practices for application migration to public clouds interop presentationBest practices for application migration to public clouds interop presentation
Best practices for application migration to public clouds interop presentation
 
CloudPilot Application Migration Tools Datasheet - CloudOrigin®
CloudPilot Application Migration Tools Datasheet - CloudOrigin®CloudPilot Application Migration Tools Datasheet - CloudOrigin®
CloudPilot Application Migration Tools Datasheet - CloudOrigin®
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 
Realizing Cloud POV
Realizing Cloud POVRealizing Cloud POV
Realizing Cloud POV
 
How to move to the cloud
How to move to the cloudHow to move to the cloud
How to move to the cloud
 
Cloud - moving applications to the cloud
Cloud - moving applications to the cloudCloud - moving applications to the cloud
Cloud - moving applications to the cloud
 
Datasheet datapowerpluginforrd
Datasheet datapowerpluginforrdDatasheet datapowerpluginforrd
Datasheet datapowerpluginforrd
 
Breaking the Monolith
Breaking the MonolithBreaking the Monolith
Breaking the Monolith
 
Velostrata cloud migration --Whitepaper
Velostrata cloud migration --WhitepaperVelostrata cloud migration --Whitepaper
Velostrata cloud migration --Whitepaper
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
 
Cloud Computing Best Practices
Cloud Computing Best PracticesCloud Computing Best Practices
Cloud Computing Best Practices
 
CRM Trilogix; Migrating Legacy Systems to the Cloud
CRM Trilogix; Migrating Legacy Systems to the CloudCRM Trilogix; Migrating Legacy Systems to the Cloud
CRM Trilogix; Migrating Legacy Systems to the Cloud
 
Cloud workload migration guidelines
Cloud workload migration guidelinesCloud workload migration guidelines
Cloud workload migration guidelines
 
Making the Journey_ 7 Essential Steps to Cloud Adoption.pdf
Making the Journey_ 7 Essential Steps to Cloud Adoption.pdfMaking the Journey_ 7 Essential Steps to Cloud Adoption.pdf
Making the Journey_ 7 Essential Steps to Cloud Adoption.pdf
 
Cloud First Architecture
Cloud First ArchitectureCloud First Architecture
Cloud First Architecture
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
10 Key Digital Infrastructure Considerations
10 Key Digital Infrastructure Considerations10 Key Digital Infrastructure Considerations
10 Key Digital Infrastructure Considerations
 
Azure App Modernization
Azure App ModernizationAzure App Modernization
Azure App Modernization
 
Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...
Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...
Combining Cloud Native & PaaS: Building a Fully Managed Application Platform ...
 

Recently uploaded

Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...ThinkInnovation
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 

Application-Portfolio-Assessment-for-Cloud-Readiness_Sample_Report.pptx

  • 1. SAMPLE CO, INC. Application Portfolio Assessment for Cloud Readiness Sample Report Date Software Intelligence for Digital Leaders
  • 2. 2 • This document is a sample portfolio assessment report for developing a cloud migration roadmap for a portfolio of 20 applications. • The assessment was completed in three days by analyzing the source code and completing a few survey questions for each application. • The key outcomes of this report include: • Overall assessment of the cloud readiness, health, and open source risk for each application • A prioritized list of applications to migrate to the cloud • Specific recommendations on how to migrate each application to the cloud • Specific recommendations on software health issues and open source risks that should be addressed before migrating applications to the cloud Executive Summary Contact Us to Learn More Visit CAST Highlight Site
  • 3. 3 • Executive Summary • Portfolio Snapshot • Cloud Readiness Assessment • Software Health Assessment • Software Composition Analysis • Why CAST Highlight? • Appendix • Data Collection Process • Metrics & Definitions Contents
  • 4. 4 Application Portfolio Snapshot 20 applications 6.2m lines of code 113k back-fired function points Software Resiliency 82.3 INDUSTRY | 74.88 Software Agility 66.0 INDUSTRY | 62.18 Software Elegance 72.3 INDUSTRY | 62.82 CloudReady 53.6 INDUSTRY | 65.88 A portfolio snapshot provides a summary of the portfolio and top line metrics for all applications. (All metrics are defined in the appendix.)
  • 5. 5 Application Portfolio Snapshot Technology Size (LOC) Resiliency Agility Elegance Javascript 3M 57.09 63.24 57.12 C# 2M 95.41 65.37 78.32 PHP 740K 89.72 69.76 85.08 Java 697K 94.58 68.03 84.69 Python 10K 45.50 52.77 48.82 The portfolio snapshot also includes the portfolio demographics broken down by technology.
  • 6. Cloud Readiness Assessment Application Portfolio Assessment Report
  • 7. 7 0 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 60 70 80 90 100 Business Impact CloudReady Portfolio Cloud Readiness | Cloud Ready vs Business Impact INDUSTRY AVERAGE IaaS / Cost Saving PaaS / App. Value Hollow The cloud readiness assessment begins by analyzing the entire portfolio of applications. This decision matrix crosses Business Impact with Cloud Readiness and the size of the bubbles represents the relative size of each application. This helps determine how to start segmenting and prioritizing each application based on both technical and business criteria.
  • 8. 8 0 10 20 30 40 50 60 70 80 90 100 10 20 30 40 50 60 70 80 90 100 Business Impact CloudReady Portfolio Cloud Readiness | Segmentation & Prioritization INDUSTRY AVERAGE LONG-TERM BETS CORE CLOUD QUICK-WINS IaaS / Cost Saving PaaS / App. Value START HERE Hollow Spectator Tensorflow Fenzo REFACTOR TO PAAS Karyon Servo Beachhead Priam Lucee Lando Genie Lowlight Wedge PURSUE LATER REHOST TO IAAS CRM MMU Analytics AR IEP AP REPLACE OR RETIRE BAT Soundwave High Business Impact – Low Cloud Readiness Longer Term Modernization Candidates High Business Impact – High Cloud Readiness Near Term Modernization Candidates Easy to Migrate Low Business Impact – High Cloud Readiness Start Migration Here to Demonstrate Early Success with Lower Business Risk Low Business Impact – Low Cloud Readiness Consider Retirement or Replacement with a SaaS Alternative Here is an example of an initial portfolio segmentation and prioritization.
  • 9. 9 Portfolio Cloud Readiness | Top Boosters & Blockers Below are the top three Boosters and Blockers to Cloud- Readiness found across the portfolio Here are the top three Cloud Migration Blockers and Boosters observed across the entire portfolio. Blockers will be the most common code level issues that need to be considered before migration. These are described in more detail on the following pages.
  • 10. 10 Blocker Detail: Using Stateful Sessions Rationale and Recommendation For modern applications running in the Cloud, it is not recommended to be stateful, especially for sessions as they’re not scalable, and are generally harder to replicate and fix bugs (server-side). Ideally, stateful sessions should be replaced by stateless and client-side mechanisms such as cookies, client cache (e.g. Redis, memcache…) or in an external cloud-based storage. This is an important architectural constraint of microservices-style applications, as it enables resiliency, elasticity, and allows any available service instance to execute any task. Each Blocker is described in detail to begin estimating the effort level to remediate.
  • 11. 11 Blocker Detail: Use of File System Rationale and Recommendation Cloud applications should not assume the local file system is accessible, as the directory structure might be different from a traditional desktop or server machine and/or the Cloud application may not have sufficient rights to access the local file system. Instead, use relative paths to application resources (e.g. ../../reporting/reportBuilder.xml). Depending on your application context and the Cloud platform where it is deployed, you could also consider using functions or classes like LocalResources to dynamically resolve file paths. Each Blocker is described in detail to begin estimating the effort level to remediate.
  • 12. 12 Blocker Detail: Perform File Manipulation Rationale and Recommendation Manipulating local files requires specific permissions and usually assumes the file will be persisted over time. In the Cloud, because the underlying infrastructure can be moved or removed, it is not possible to make such assumptions. Instead of using the file system, store your temporary information in a dedicated Cloud-based storage or in a NoSQL database. Each Blocker is described in detail to begin estimating the effort level to remediate.
  • 13. 13 Cloud Boosters & Blockers | IEP Application View Each individual application is then assessed to understand the specific Blockers that occur within each application so that the segmentation and prioritization can be further refined based on individual application characteristics.
  • 14. 14 Migration Recommendation | IEP Application Consideration Criteria Comments The IEP application team is one of the most advance in the group regarding Cloud expertise. The team is used to Cloud development and will be able to identify quickly the blockers for a PaaS migration. The application is developed in C# and .NET and uses some out of date components. There is some official documentation about the older components but there are some important pitfalls. The team has decided to focus on rewriting this component first before migration to cloud. So we decided not to go for a PaaS migration for the moment. It will be Rehosted to IaaS initially. Blockers are File manipulation, usage of COM components, unsecured URL (HTTP), and configuration The main blocker is the COM components registration, this will be not so easy to overcome as it is the core of the application. The file manipulation is replaceable, even easier for the URL and the configuration files. Recommendation: Rehost to IaaS A specific migration recommendation is included for each application along with detailed technical rationale.
  • 15. 15 Cloud Boosters & Blockers | Karyon Application View Each individual application is then assessed to understand the specific Blockers that occur within each application so that the segmentation and prioritization can be further refined based on individual application characteristics.
  • 16. 16 Migration Recommendation | Karyon Application Consideration Criteria Comments The context is different on this application because it is already an API application with a modern design and easy to maintain The team is used to Cloud development and will be able to identify and quickly modify the blockers for a PaaS migration. The key blocker is the usage of a Standard Database provider which is SQL Server. This is not a blocker to move to a PaaS service since the application does not rely on a Database, it just uses connectors to other DB services. This application is a good candidate for a cloud migration. We decided to go for a PaaS migration as this app will be central to others in the cloud. Additional blockers are File manipulation, unsecured URL (HTTP), and configuration. The COM components registration, and other blockers are easy to overcome, because they only apply to the Unit testing part of the application. The file manipulation is easily replaceable, the configuration is straightforward on this. Recommendation: Refactor for PaaS A specific migration recommendation is included for each application along with detailed technical rationale.
  • 17. 17 Cloud Migration Roadmap Recommendations • Wave 1 apps to migrate first: • Hollow, Spectator, Tensorflow, Fenzo • Wave 2 apps to migrate next: • Refactor for PaaS: Karyon, Servo, Beachhead, Priam, Lucee, Lando, Genie, Lowlight, Wedge • Rehost to IaaS: CRM, MMU, Analytics, AR, IEP, AP • Potential Retirement or replacement candidates: • BAT, Soundwave • Analyze Software Composition of each application to identify any open source components that need to be upgraded and/or replaced due to CVEs, license risk, or obsolesence before migration. • Investigate Health of each application to understand if there are any high-risk apps that need to be improved before migration. The cloud migration recommendations are then summarized to develop the overall roadmap for the portfolio.
  • 18. Software Health Assessment Software Intelligence for Digital Leaders Application Portfolio Assessment Report
  • 19. 19 0 20 40 60 80 100 45 55 65 75 85 95 Business Impact SoftwareResiliency DANGER ZONE CONFIDENCE ZONE Software Health | Portfolio View INDUSTRY AVERAGE DANGER ZONE Hollow CRM IEP AR CONFIDENCE ZONE Karyon Servo Beachhead Priam Lucee Lando Genie Lowlight Wedge VULNERABILITIES IEP Hollow Tensorflow Fenzo Analytics AP Detected Common Vulnerabilities from Software Composition Analysis Application Health measures (such as Resiliency) are analyzed to ensure unhealthy applications are improved before migration.
  • 20. 20 Software Health | Tensorflow Application View Unhealthy applications are analyzed at a deeper level to understand specific code-level improvement opportunities.
  • 21. 21 Software Health | Recommendations • Some apps have Resiliency scores that are severely low. Code alerts should be remediated before migration to cloud on these applications: • Hollow • CRM • IEP • AR • Security Vulnerabilities were identified in a few applications and a deeper Software Composition Analysis should be performed to investigate the open source components in these applications further: • Spectator • MMU • Tensorflow • Fenzo • Analytics • AP Additional recommendations on how to improve Software Health issues and potential security vulnerabilities are summarized.
  • 22. Software Composition Analysis Software Intelligence for Digital Leaders Application Portfolio Assessment Report
  • 23. 23 CAST Confidential Software Composition Analysis Overview 23 Open source is one of the major entry points for hackers. It is critical to identify if the third- party components in use contain security vulnerabilities. Open source licensing can be complex and confusing. Visibility on the licenses used by open source components is required to detect any restrictive license compliance issues. Open source components can become out of date or unsupported resulting in functional and security risks. These out of date components must be detected and replaced with supported components.
  • 24. 24 Software Composition Analysis | Security Vulnerabilities Application Components IEP cxf-rt-transports-http-jetty 3.0.3, slf4j-api 1.7.7, jsch 0.1.42 CRM Microsoft.Practices.EnterpriseLibrary.Logging 4.1.0.0, Microsoft.Practices.EnterpriseLibrary.Common 4.1.0.0 Beachhead cxf-rt-frontend-jaxws 2.7.5 Karyon minimatch 3.0.0, useragent 2.1.12, qs 2.3.3, decamelize 1.1.1, parsejson 0.0.3, hapi 15.x.x, Hollow tomcat-embed-core 7.0.73, slf4j-api 1.7.7, cxf-rt-frontend-jaxws 2.7.12, is-my-json-valid 2.12.0, ua-parser-js 0.7.12, marked 0.3.6, minimatch 3.0.0, useragent 2.1.11, jquery 1.7.2, hibernate-validator 4.2.0.Final, Other apps openjpa-persistence-jdbc 2.1.1, commons-fileupload 1.2.1, jackson-databind 2.5.3, dom4j 1.6.1, jsoup 1.8.1, derby 10.1.1.0 … Vulnerabilities 10 CRITICAL 46 HIGH 22 MEDIUM 0 LOW Critical and High severity security vulnerabilities are highlighted for each application.
  • 25. 25 Software Composition Analysis | License Risk License Risk Application 3rd-Party Components Licenses IEP 7 MIT License (2), Apache 2.0 (1), BSD-3 New CRM 12 Apache 2.0 (3), GNU Affero GPL 3.0 (2) Beachhead 4 MIT License (2), ISC License (1) Karyon 579 MIT License (358), ISC License (39), Apache 2.0 (16), Eclipse 2.0 (1), BSD 2 (14), GNU Affero GPL 3 (1), BSD 3 (1) Hollow 32 MIT License (2), Apache 2.0 (1), GNU GPL 3 (4) Applications that use open source components with risky licenses are highlighted.
  • 26. 26 Software Composition Recommendations • IEP: Upgrade jsh component to latest version to reduce critical vulnerability risk • Hollow: • Upgrade hibernate component to latest version to reduce critical vulnerability risk • Replace component that uses the GNU GPL license to avoid copyleft licensing risk • CRM: Replace component that uses the GNU GPL license to avoid copyleft licensing risk • Karyon: Replace component that uses the GNU GPL license to avoid copyleft licensing risk Specific recommendations on how to reduce open source vulnerability and license risk are summarized.
  • 27. 27 Why CAST Highlight? CAST Highlight performs automated source code analysis of hundreds of applications in a week for Cloud Readiness, Open Source risks, Resiliency, and Agility. Objective software insights combined with qualitative surveys for business context enable more informed decision making to: • Accelerate Cloud Migration • Rationalize Application Portfolios • Manage Open Source Risk • Optimize Tech Due Diligence Cloud Readiness Prioritize cloud candidates across the app portfolio Identify Blockers that slow down your cloud migration Get insights for adopting containers and cloud native sooner Software Composition Identify open source security vulnerabilities and licensing risks Control technology obsolescence of third-party components Target critical apps that have the largest impact on the business Trusted By: Software Health Measure Resiliency, Agility, and Complexity Gain objective metrics to support Application Rationalization Target applications with high business impact & cost to maintain
  • 28. Contact Us to learn how to generate an application portfolio assessment report automatically Software Intelligence for Digital Leaders Visit the CAST Highlight web site.
  • 29. SAMPLE CO, INC. Appendix Software Intelligence for Digital Leaders Date
  • 30. Data Collection for CAST Highlight CAST Confidential 30 Survey Information • Augment analysis data • Calculate metrics (e.g. Business Impact) • Customizable to collect client- specific information Source Code Analysis • Locally run analysis • Built for speed • Generates application-and portfolio-level insights
  • 31. 31 Key Metrics & Methodology Definitions Key Metric Description Direct Interpretation Business Impact Software Resiliency Measure the robustness and how bullet-proof is the Software against production failure Reflects presence of code patterns that may comprise vulnerability of the software Customer Satisfaction Customer Confidence / Loyalty Opportunities & Revenue Software Agility Measure to indicate the easiness of a development team to understand and maintain an application Reflects absence of embedded documentation and code readability good practices Maintenance Cost Transferability Software Elegance Measures the ability to deliver software value with less code complexity Indicates decreased quality in code, resulting in higher defects that become costly to fix Time to Market Innovation Cloud Ready Measure of software and organization characteristics to speed PaaS migration Significant number of roadblocks found that could slow down a Cloud migration Opportunity to reduce cost, increase elasticity and embrace innovation High > 87.0 Medium > 66.0 Low < 66.0 Resiliency High > 69.0 Medium > 55.0 Low < 55.0 Agility High > 77.0 Medium > 50.0 Low < 50.0 Elegance High > 75.0 Medium > 65.0 Low < 65.0 Cloud Ready
  • 32. 32 CloudReady Index Calculation Formula CloudReady 45.2 13.4 Based on CloudReady Survey** (weight of 50%) Based on CloudReady Scan*** 77.1 (weight of 50%) 5.6 Based on Positive Code Patterns (weight of 10%) Boosters 5.0 Based on Negative Code Patterns (weight of 40%) Blockers 200+ Code Patterns Targeted to coding language (Java, C#, VB.Net, T-SQL, PHP, Python) Positive (Boosters) or Negative (Roadblocks) contribution Criticality level (critical, high, medium, low) Impact area (Code, Framework, Architecture) Code Patterns Score **CloudReady Survey score - from 0 to 100 - relies on the answers provided by the Application Owner. Depending on the importance of a question, its answers may impact the score differently. ***CloudReady Code Scan score - from 0 to 100 - relies on both Booster and Blocker scores, where Booster and Blocker scores respectively account for 20% and 80% in the Code Scan score.