Cloud migration best practice Part 4: Executing the migration

Cloud Acquisition Strategy, Customized to the Right Cloud Model

By G C Network | March 17, 2015

by Melvin Greer Managing Director, Greer Institute  This year has brought big news, significant changes and increased awareness of the adoption of cloud computing in Government. In fact Cloud computing…

Women leading us to the cloud

By G C Network | March 14, 2015

By Jodi Kohut Government Cloud Computing Professional   By Jodi Kohut Government Cloud Computing Professional March is Women’s History Month. As we celebrate women and their role in our history, our…

CSCC Cloud Privacy Summit – Reston, VA March 26th

By G C Network | March 12, 2015

Please join the Cloud Standards Customer Council in Reston, Virginia on Thursday, March 26th for the Cloud Privacy Summit. This all day symposium will stimulate lively, interactive discussion and deliver…

Bangladesh: A country transforms with IT

By G C Network | March 9, 2015

Born out of a nine-month war of liberation in 1971, Bangladesh is a parliamentary democracy and a predominately Muslim country. After years of being a center for textile manufacturing, the country of…

Introducing CloudTek University

By G C Network | March 5, 2015

Visit us at https://www.CloudTekU.com Cloud Computing Basics https://sqz.co/Fs34AaX Cloud Technologies https://sqz.co/s2ACt68 Cloud Security https://sqz.co/Mp7m3TE Business Innovation https://sqz.co/j4NZb37 Cloud Computing Pilots https://sqz.co/e5HFy24 Cloud Operations https://sqz.co/p5CJo24 CloudTek Overview https://sqz.co/k9S4Ewt ( This content…

The Emerging Science of Digital Forensics

By G C Network | February 24, 2015

By Melvin Greer Managing Director, Greer Institute for Leadership and Innovation Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains…

African-Americans and STEM careers: Getting a foot in the door

By G C Network | February 16, 2015

By Sandra K. Johnson Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the…

U.S. Department of Defense sets its cloud security guidelines

By G C Network | February 12, 2015

By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines…

Circles are good for the economy

By G C Network | February 9, 2015

Contrary to what your mother may have told you, going in circles is sometimes a good thing. When it comes to our economy, it is actually a great thing. Throughout…

2015 National Chief Information Security Officer Survey

By G C Network | February 4, 2015

Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information.  The…

This series has stepped through cloud migration best practices. After providing an overview, we discussed:

With all of that completed, it’s now time to select the right cloud service provider (CSP) and finally execute the migration. Cloud provider selection is an area that many enterprises ignore. Executives looking to take advantage of the real business value that the cloud delivers often view providers simply as commodity technology providers. With this mindset, decision-makers usually pick the most familiar name. But this strategy is little more than throwing the dice.

A Smarter Way to Select a Provider

Cloud service provider selection requires a well-developed hybrid IT strategy, an unbiased application portfolio review and the appropriate due diligence in the evaluation of all credible cloud service providers. When discussing this linkage, I leverage the Digital Transformation Layered Triangle as a visualization tool. After agreeing to an appropriate high-level hybrid IT strategy, a digital transformation core tenant, candidate CSPs capabilities must be compared based on their:

  • Availability of technology services that align with the business/mission model.
  • Availability of data security controls that address legal, regulatory and data sovereignty limitations.
  • Compatibility of CSP sales process with enterprise acquisition process.
  • Cost forecast alignment with budgetary expectations.

Understanding Cloud Service Agreements

Comparing cloud service agreements from the remaining viable service providers is next. These agreements typically have three components:

  • Customer Agreement: Describes the overall relationship between the customer and provider. Service management includes the processes and procedures used by the cloud provider. Thus, it’s crucial to provide definitions of the roles, responsibilities and execution of the processes. The customer agreement does this. This document can be called a “master agreement,” “terms of service” or simply “agreement.”
  • Acceptable Use Policy (AUP): Defines activities that the provider considers to be improper or outright illegal. There is considerable consistency across cloud providers in these documents. While specific details may vary, the scope and effect of these policies remain the same, and these provisions typically generate the least concerns or resistance.
  • Service-Level Agreement (SLA): Describes levels of service by in terms of availability, serviceability or performance. The SLA specifies thresholds and financial penalties associated with violations of these thresholds. Well-designed SLAs can avoid conflict and facilitate the resolution of an issue before it escalates into a dispute.

Designing a CSA Evaluation

The CSA Evaluation must take into account all critical functional and nonfunctional organizational requirements and IT governance policies, to ensure:

  • Mutual understanding of roles and responsibilities.
  • Compatibility with all enterprise business level policies.
  • An identifiable metrics for all critical performance objectives.
  • Agreement on a plan for meeting all data security and privacy requirements.
  • Identified service management points of contact for each critical technology services.
  • Agreement on service failure management process.
  • Agreement on disaster recovery plan process.
  • An approved hybrid IT governance process.
  • Agreement on a CSP exit process.

This due diligence process maximizes the success probability of any cloud migration program. With CSP selection complete, the organization can now tackle the hard work of executing the actual migration. This task should include:

  • Planning and executing an organizational change management plan.
  • Verifying and clarifying all key stakeholder roles.
  • Detailed project planning and execution.
  • Establishing internal processes for monitoring and periodically reporting the status of all key performance indicators.
  • Establishing an internal cloud migration status feedback and response process.

The most important lesson learned across all industries is that cloud migration is not a project for the IT team alone. This is an enterprise-wide endeavor that requires executive leadership and focused change management efforts across multiple internal domains.

This post was brought to you by IBM Global Technology Services. For more content like this, visit ITBizAdvisor.
Posted in

G C Network