SlideShare a Scribd company logo
Cloud Computing Overview
1
Agenda
 Overview
 Cloud Service Types
 Business impact
 Security & Privacy, Risks considerations
 Cloud Readiness
 Recommendations
22
Overview
Cloud Computing Service
 Provides computing, infrastructure, applications and processes delivered as a service;
meaning it can be consumed “as is”, or extend it’s capabilities to your own applications
 Provides the delivery of software, infrastructure, or storage that has been packaged so it
can be automated to customers in a consistent and repeatable manner
Cloud Computing Forms
 Public clouds -Virtualized data centers outside of our company’s firewall. Generally, a
service provider makes resources available, on demand and over the public Internet
 Private clouds -Virtualized cloud data centers our company’s firewall. It may also be a
private space dedicated to your company within a cloud provider’s data center
 Hybrid clouds -Combine aspects of both public and private clouds
33
4
Software as a Service
(SaaS):
Access to hosted
application(s) via the internet
(e.g. Salesforce, Microsoft
Office 365)
Benefits:
1. Cost savings
2. Reduce start up time
3. Staff savings to allow focus
on more strategic initiaitves
4. Reliability, Security,
customization
Obstacles::
1. Security - sensitive data
2. Geographic location of
infrastructure
3. Long term viability of the
service provider
4. Service Level agreement
(SLA) ensure that it meets our
companies needs
5. Portability of moving
application to new providers
6. Application may not meet the
needs of your organization
Storage as a Service
(Saas)
Store data to hosted servers
via the internet (e.g. Amazon
Cloud Storage, Dropbox)
Benefits:
1. Allows users storage space to
share and store data
2. Access data from anywhere
(Good for travelers)
3. Available on different devices
(iPad, iPhone, desktop)
4. Reduce start up time
Obstacles:
1. Security - sensitive data
2. Geographic location of
infrastructure
3. Long term viability of the
service provider
4. Service Level agreement
(SLA) ensure that it meets our
companies needs
5. Portability of moving
application to new providers
6. Defining amount and types of
data to store
Infrastructure as a
Service (IaaS)
Allows customers to install
various applications and data
(e.g. Amazon EC2, Google
Google Compute Engine)
Benefits:
1. Device independence provides
access to a variety of hardware
2. Eliminate need to purchase
racks, servers, drives
3. Install any data and applications
4. Vendor is responsible for
maintenance
Obstacles:
1. Security - sensitive data
2. Geographic location of
infrastructure
3. Long term viability of the
service provider
4. Service Level agreement
(SLA) ensure that it meets our
companies needs
5. Portability of moving
application to new providers
6. Recovery options, restoration
and how the data is segregated
Platform as a Service
(PaaS)
Suitable for application
developers, design and
testing (e.g. Amazon Elastic
Beanstalk, Google App
Engine)
Benefits:
1. Shared resources and hosted
by provider
2. Supplies resources to build
application and services
3. Reduce start up time
4. Many data centers across
geographical sites
Obstacles:
1. Security - sensitive data
2. Geographic location of
infrastructure
3. Long term viability of the
service provider
4. Service Level agreement
(SLA) ensure that it meets our
companies needs
5. Portability of moving
application to new providers
6. Standardization of equipment
5
Consider Private
Embrace
Public
Avoid
Cloud
Experiment
(PoC)
HighandClearLoworUncertain
High or Unmanageable Low and Manageable
Business Impact of Cloud SelectionBenefits
Challenges
6
Security & Privacy
•Sensitive data should not be placed
in unapproved services
•Authorized users should be
identified, cataloged, and managed
•Evidence that security posture is
maintained; implement same level
of process and control as “inside”
•Security mechanisms should be
controlled by <<your company>>
•Identify the type incident detection
and notification
•Contingency planning should be our
responsibility not the provider
Risks
•Inability demonstrate appropriate
levels of control over regulated data
•Authorized users misusing cloud-
based data
•Inappropriate access to data by
unauthorized user
•Unplanned outages
•Data misuse by someone still in
possession who no longer should
have access to it
•Unrecoverable data loss or
permanent shutdown
Security and Risks
Cloud Readiness
7
• Understand cloud computing how it will evolve
1. Review evolution and what value the service can offer
2. Evaluate which models, architectures, technologies
3. Best practices for cloud computing to building private cloud environments
4. Consider how IT will secure, manage, govern cloud services across all environments
5. Determine where there is value in migrating applications to the cloud
• Analyze how cloud computing will affect the strategy and direction of IT and your business
1. Determine where it is appropriate for the enterprise to provide cloud services
2. Strategically plan by reviewing providers and their offerings
3. Cost for service
4. Return on investment
5. Assess IT workforce and skill levels
• Review vendor and services provided
1. Amazon — Elastic cloud infrastructure and platforms (e.g. Beanstalk)
• 2. salesforce.com — CRM application services, Force.com and Heroku infrastructure
3. Google —Google App Engine, Google Compute Engine, and Google Apps
4. Microsoft — Azure application infrastructure, Office 365 and Windows Server Hyper-V
5. VMware — Suite of products under the vCloud brand for private clouds, and application
• Conduct a Structured approach that should include the following principles:
1. Concepts Defined: Explore the initiative scope
2. Implications and Scenarios: Identify scenarios where the innovation will affect current IT
3. Identify the impact: Business goals and risks
4. Technologies and Vendors: Identify current and future technologies that apply
5. Explore how to use the innovation, including where to start, your organization's readiness
Recommendations
 Due Diligence – Research options and build cloud exit strategy
 Review contracts, SLA’s and risks (Multi-location, SOC2/3 compliance reports)
 Determine business impact data classification and data segregation
 Staff Training
 Monitor performance
 Analyze the services, leverage patterns applicable to deployments
 Release data in waves –Start with least important data
 Sensitive data should not be moved into public cloud
88

More Related Content

What's hot

Multi cloud strategy
Multi cloud strategyMulti cloud strategy
Multi cloud strategy
Ajay Koomar
 
Multi cloud PaaS
Multi cloud PaaSMulti cloud PaaS
Multi cloud PaaS
Fawaz Fernand PARAISO
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
أحلام انصارى
 
Cloud migration, orchestration and operations
Cloud migration, orchestration and operationsCloud migration, orchestration and operations
Cloud migration, orchestration and operations
Sharmila Fernandes
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
RightScale
 
 5 security risks of cloud computing
 5 security risks of cloud computing 5 security risks of cloud computing
 5 security risks of cloud computing
Tyrone Systems
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud Migration
Alaina Carter
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
SohailAliMalik
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
charan7575
 
cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
Dr.Neeraj Kumar Pandey
 
1.Introduction to cloud computing converted
1.Introduction to cloud computing converted1.Introduction to cloud computing converted
1.Introduction to cloud computing converted
DrRajapraveen
 
HP Cloud System Matrix Overview
HP Cloud System Matrix OverviewHP Cloud System Matrix Overview
HP Cloud System Matrix Overview
Rien du Pre
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
Aung Thu Rha Hein
 
Cloud migration services
Cloud migration services Cloud migration services
Cloud migration services
harrissmith5
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Graeme Wood
 
Cloud computing seminar
Cloud computing seminarCloud computing seminar
Cloud computing seminar
Aravindan Arun
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
Alphavima
 
Introduction of cloud computing
Introduction of cloud computingIntroduction of cloud computing
Introduction of cloud computing
Suman Sharma
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
Alert Logic
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloud
sdevillers
 

What's hot (20)

Multi cloud strategy
Multi cloud strategyMulti cloud strategy
Multi cloud strategy
 
Multi cloud PaaS
Multi cloud PaaSMulti cloud PaaS
Multi cloud PaaS
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Cloud migration, orchestration and operations
Cloud migration, orchestration and operationsCloud migration, orchestration and operations
Cloud migration, orchestration and operations
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
 5 security risks of cloud computing
 5 security risks of cloud computing 5 security risks of cloud computing
 5 security risks of cloud computing
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud Migration
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
 
1.Introduction to cloud computing converted
1.Introduction to cloud computing converted1.Introduction to cloud computing converted
1.Introduction to cloud computing converted
 
HP Cloud System Matrix Overview
HP Cloud System Matrix OverviewHP Cloud System Matrix Overview
HP Cloud System Matrix Overview
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud migration services
Cloud migration services Cloud migration services
Cloud migration services
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Cloud computing seminar
Cloud computing seminarCloud computing seminar
Cloud computing seminar
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
 
Introduction of cloud computing
Introduction of cloud computingIntroduction of cloud computing
Introduction of cloud computing
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Multi-tenancy In the Cloud
Multi-tenancy In the CloudMulti-tenancy In the Cloud
Multi-tenancy In the Cloud
 

Viewers also liked

enterprise arch_prc_short
enterprise arch_prc_shortenterprise arch_prc_short
enterprise arch_prc_short
Cora Carmody
 
Enterprise Architecture: Treating Health Information System as an Enterprise
Enterprise Architecture: Treating Health Information System as an EnterpriseEnterprise Architecture: Treating Health Information System as an Enterprise
Enterprise Architecture: Treating Health Information System as an Enterprise
MEASURE Evaluation
 
Containers and the Evolution of Computing
Containers and the Evolution of ComputingContainers and the Evolution of Computing
Containers and the Evolution of Computing
Amazon Web Services
 
Softwares
Softwares Softwares
Softwares
zohramunir
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
Annajab
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
Varinder Singh Walia
 
Networking devices
Networking  devices Networking  devices
Networking devices
Aswini Badatya
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in Business
Nethan P
 
Chapter2
Chapter2Chapter2
Chapter2
suks_87
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
Rajagopal Nagarajan
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
Chris Yeo
 
Hardware
HardwareHardware
Hardware
amal312
 
Big Data Computing Architecture
Big Data Computing ArchitectureBig Data Computing Architecture
Big Data Computing Architecture
Gang Tao
 
In out system
In out systemIn out system
In out system
Agnas Jasmine
 
RESTful Microservices
RESTful MicroservicesRESTful Microservices
RESTful Microservices
Shaun Abram
 
Architecting modern information systems M1 enterprise architecture
Architecting modern information systems M1 enterprise architectureArchitecting modern information systems M1 enterprise architecture
Architecting modern information systems M1 enterprise architecture
Alexander SAMARIN
 
Trends on Information Technology
Trends on Information TechnologyTrends on Information Technology
Trends on Information Technology
Carlos J. Costa
 
Chapter02 Managing Hardware Devices
Chapter02      Managing  Hardware  DevicesChapter02      Managing  Hardware  Devices
Chapter02 Managing Hardware Devices
Raja Waseem Akhtar
 
Recent trends in information technology
Recent trends in information technologyRecent trends in information technology
Recent trends in information technology
Pranavathiyani G
 
Microservices for the rest of us
Microservices for the rest of usMicroservices for the rest of us
Microservices for the rest of us
Ambassador Labs
 

Viewers also liked (20)

enterprise arch_prc_short
enterprise arch_prc_shortenterprise arch_prc_short
enterprise arch_prc_short
 
Enterprise Architecture: Treating Health Information System as an Enterprise
Enterprise Architecture: Treating Health Information System as an EnterpriseEnterprise Architecture: Treating Health Information System as an Enterprise
Enterprise Architecture: Treating Health Information System as an Enterprise
 
Containers and the Evolution of Computing
Containers and the Evolution of ComputingContainers and the Evolution of Computing
Containers and the Evolution of Computing
 
Softwares
Softwares Softwares
Softwares
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
 
Networking devices
Networking  devices Networking  devices
Networking devices
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in Business
 
Chapter2
Chapter2Chapter2
Chapter2
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Hardware
HardwareHardware
Hardware
 
Big Data Computing Architecture
Big Data Computing ArchitectureBig Data Computing Architecture
Big Data Computing Architecture
 
In out system
In out systemIn out system
In out system
 
RESTful Microservices
RESTful MicroservicesRESTful Microservices
RESTful Microservices
 
Architecting modern information systems M1 enterprise architecture
Architecting modern information systems M1 enterprise architectureArchitecting modern information systems M1 enterprise architecture
Architecting modern information systems M1 enterprise architecture
 
Trends on Information Technology
Trends on Information TechnologyTrends on Information Technology
Trends on Information Technology
 
Chapter02 Managing Hardware Devices
Chapter02      Managing  Hardware  DevicesChapter02      Managing  Hardware  Devices
Chapter02 Managing Hardware Devices
 
Recent trends in information technology
Recent trends in information technologyRecent trends in information technology
Recent trends in information technology
 
Microservices for the rest of us
Microservices for the rest of usMicroservices for the rest of us
Microservices for the rest of us
 

Similar to Cloud computing 101

Cloud Computing Roadmap
Cloud Computing RoadmapCloud Computing Roadmap
Cloud Computing Roadmap
Akelios
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Prateek Maurya
 
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
riyasil2
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
Rahul Gurnani
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
Cloud migration presentation
Cloud migration presentationCloud migration presentation
Cloud migration presentation
yeshlenchetty
 
Unit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptxUnit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptx
SumitSaini169007
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
Agora Group
 
cloud services and providers
cloud services and providerscloud services and providers
cloud services and providers
Kalai Selvi
 
Introduction of microsoft azure
Introduction of microsoft azureIntroduction of microsoft azure
Introduction of microsoft azure
Karthik Perugupalli
 
Cloud Computing Strategy and Architecture
Cloud Computing Strategy and ArchitectureCloud Computing Strategy and Architecture
Cloud Computing Strategy and Architecture
Hendrix Yapputro , Certified IT Architect
 
Introduction to Cloud computing
Introduction to Cloud computing Introduction to Cloud computing
Introduction to Cloud computing
mehanasshahul
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
Puneet Arora
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
jmcdaniel650
 
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
IRJET Journal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
حيدر نافع nafaa
 
Oracle Keynote Cloud Expo 11-04-09
Oracle Keynote Cloud Expo 11-04-09Oracle Keynote Cloud Expo 11-04-09
Oracle Keynote Cloud Expo 11-04-09
Rex Wang
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
Gopal Jogdand
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
MuhammadArslan799356
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
United International Journal for Research & Technology
 

Similar to Cloud computing 101 (20)

Cloud Computing Roadmap
Cloud Computing RoadmapCloud Computing Roadmap
Cloud Computing Roadmap
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
Cloud Architecture and Models: Cloud Reference Model Architecture Types of Cl...
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
Cloud migration presentation
Cloud migration presentationCloud migration presentation
Cloud migration presentation
 
Unit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptxUnit 1_Introduction to Cloud Technologies.pptx
Unit 1_Introduction to Cloud Technologies.pptx
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
cloud services and providers
cloud services and providerscloud services and providers
cloud services and providers
 
Introduction of microsoft azure
Introduction of microsoft azureIntroduction of microsoft azure
Introduction of microsoft azure
 
Cloud Computing Strategy and Architecture
Cloud Computing Strategy and ArchitectureCloud Computing Strategy and Architecture
Cloud Computing Strategy and Architecture
 
Introduction to Cloud computing
Introduction to Cloud computing Introduction to Cloud computing
Introduction to Cloud computing
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Salesforce.com – A Cloud Provider
Salesforce.com – A Cloud ProviderSalesforce.com – A Cloud Provider
Salesforce.com – A Cloud Provider
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Oracle Keynote Cloud Expo 11-04-09
Oracle Keynote Cloud Expo 11-04-09Oracle Keynote Cloud Expo 11-04-09
Oracle Keynote Cloud Expo 11-04-09
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 

Cloud computing 101

  • 2. Agenda  Overview  Cloud Service Types  Business impact  Security & Privacy, Risks considerations  Cloud Readiness  Recommendations 22
  • 3. Overview Cloud Computing Service  Provides computing, infrastructure, applications and processes delivered as a service; meaning it can be consumed “as is”, or extend it’s capabilities to your own applications  Provides the delivery of software, infrastructure, or storage that has been packaged so it can be automated to customers in a consistent and repeatable manner Cloud Computing Forms  Public clouds -Virtualized data centers outside of our company’s firewall. Generally, a service provider makes resources available, on demand and over the public Internet  Private clouds -Virtualized cloud data centers our company’s firewall. It may also be a private space dedicated to your company within a cloud provider’s data center  Hybrid clouds -Combine aspects of both public and private clouds 33
  • 4. 4 Software as a Service (SaaS): Access to hosted application(s) via the internet (e.g. Salesforce, Microsoft Office 365) Benefits: 1. Cost savings 2. Reduce start up time 3. Staff savings to allow focus on more strategic initiaitves 4. Reliability, Security, customization Obstacles:: 1. Security - sensitive data 2. Geographic location of infrastructure 3. Long term viability of the service provider 4. Service Level agreement (SLA) ensure that it meets our companies needs 5. Portability of moving application to new providers 6. Application may not meet the needs of your organization Storage as a Service (Saas) Store data to hosted servers via the internet (e.g. Amazon Cloud Storage, Dropbox) Benefits: 1. Allows users storage space to share and store data 2. Access data from anywhere (Good for travelers) 3. Available on different devices (iPad, iPhone, desktop) 4. Reduce start up time Obstacles: 1. Security - sensitive data 2. Geographic location of infrastructure 3. Long term viability of the service provider 4. Service Level agreement (SLA) ensure that it meets our companies needs 5. Portability of moving application to new providers 6. Defining amount and types of data to store Infrastructure as a Service (IaaS) Allows customers to install various applications and data (e.g. Amazon EC2, Google Google Compute Engine) Benefits: 1. Device independence provides access to a variety of hardware 2. Eliminate need to purchase racks, servers, drives 3. Install any data and applications 4. Vendor is responsible for maintenance Obstacles: 1. Security - sensitive data 2. Geographic location of infrastructure 3. Long term viability of the service provider 4. Service Level agreement (SLA) ensure that it meets our companies needs 5. Portability of moving application to new providers 6. Recovery options, restoration and how the data is segregated Platform as a Service (PaaS) Suitable for application developers, design and testing (e.g. Amazon Elastic Beanstalk, Google App Engine) Benefits: 1. Shared resources and hosted by provider 2. Supplies resources to build application and services 3. Reduce start up time 4. Many data centers across geographical sites Obstacles: 1. Security - sensitive data 2. Geographic location of infrastructure 3. Long term viability of the service provider 4. Service Level agreement (SLA) ensure that it meets our companies needs 5. Portability of moving application to new providers 6. Standardization of equipment
  • 5. 5 Consider Private Embrace Public Avoid Cloud Experiment (PoC) HighandClearLoworUncertain High or Unmanageable Low and Manageable Business Impact of Cloud SelectionBenefits Challenges
  • 6. 6 Security & Privacy •Sensitive data should not be placed in unapproved services •Authorized users should be identified, cataloged, and managed •Evidence that security posture is maintained; implement same level of process and control as “inside” •Security mechanisms should be controlled by <<your company>> •Identify the type incident detection and notification •Contingency planning should be our responsibility not the provider Risks •Inability demonstrate appropriate levels of control over regulated data •Authorized users misusing cloud- based data •Inappropriate access to data by unauthorized user •Unplanned outages •Data misuse by someone still in possession who no longer should have access to it •Unrecoverable data loss or permanent shutdown Security and Risks
  • 7. Cloud Readiness 7 • Understand cloud computing how it will evolve 1. Review evolution and what value the service can offer 2. Evaluate which models, architectures, technologies 3. Best practices for cloud computing to building private cloud environments 4. Consider how IT will secure, manage, govern cloud services across all environments 5. Determine where there is value in migrating applications to the cloud • Analyze how cloud computing will affect the strategy and direction of IT and your business 1. Determine where it is appropriate for the enterprise to provide cloud services 2. Strategically plan by reviewing providers and their offerings 3. Cost for service 4. Return on investment 5. Assess IT workforce and skill levels • Review vendor and services provided 1. Amazon — Elastic cloud infrastructure and platforms (e.g. Beanstalk) • 2. salesforce.com — CRM application services, Force.com and Heroku infrastructure 3. Google —Google App Engine, Google Compute Engine, and Google Apps 4. Microsoft — Azure application infrastructure, Office 365 and Windows Server Hyper-V 5. VMware — Suite of products under the vCloud brand for private clouds, and application • Conduct a Structured approach that should include the following principles: 1. Concepts Defined: Explore the initiative scope 2. Implications and Scenarios: Identify scenarios where the innovation will affect current IT 3. Identify the impact: Business goals and risks 4. Technologies and Vendors: Identify current and future technologies that apply 5. Explore how to use the innovation, including where to start, your organization's readiness
  • 8. Recommendations  Due Diligence – Research options and build cloud exit strategy  Review contracts, SLA’s and risks (Multi-location, SOC2/3 compliance reports)  Determine business impact data classification and data segregation  Staff Training  Monitor performance  Analyze the services, leverage patterns applicable to deployments  Release data in waves –Start with least important data  Sensitive data should not be moved into public cloud 88