Cloud migration best practice Part 4: Executing the migration

“Cash for Clunkers” Should Have Used the Cloud!

By G C Network | August 24, 2009

Rich Bruklis wrote an excellent essy on how the government missed a perfect opportunity to use cloud computing. In “Cloud Opportunity Missed” he writes: “It appears that the voucher system…

US Navy Experiments With Secure Cloud Computing

By G C Network | August 20, 2009

This week in San Diego, CA the US Navy held the initial planning conference for Trident Warrior ’10. The Trident Warrior series is the premier annual FORCEnet Sea Trial Event…

GSA To Present On Cloud Initiative at NCOIC Plenary

By G C Network | August 13, 2009

A General Services Administration (GSA) representative is now scheduled to provide a briefing on the agency’s cloud computing initiative during a “Best Practices for Cloud Initiatives using Storefronts” session on…

FAA CIO Focuses on Cybersecurity

By G C Network | August 12, 2009

During this week Federal Executive Forum, FAA CIO Dave Bowen mentioned protection against software vulnerabilities, wireless intrusion and website vulnerabilities as his top cybersecurity priorities. As the Assistant Administrator for…

DHS Asst. Secretary Addresses Cybersecurity Priorities

By G C Network | August 11, 2009

Greg Schaffer, Assistant Secretary for CyberSecurity & Communications for the US Department of Homeland Security, sees Trusted Internet Connections, EINSTEIN, and front line defense of the nation’s networks as top…

US DoD Chief Security Officer on Cybersecurity Priorities

By G C Network | August 10, 2009

In a Federal Executive Forum interview, Robert Lentz, Chief Security Officer for the US Department of Defense, highlighted the departments cybersecurity priorities. Mr. Lentz is the Deputy Assistant Secretary of…

Twitter Under Denial of Service Attack

By G C Network | August 6, 2009

Multiple sources are reporting that Twitter continues to be under a denial of service attack. Some are speculating that this represents the power of a coordinated bot network attack. For…

NCOIC Holding Full Day Cloud Computing Session

By G C Network | August 5, 2009

The Network Centric Operations Industry Consortium (NCOIC) will be holding a one-day cloud computing session during its plenary meetings, 21-25 September at the Fair Lakes Hyatt in Fairfax, VA. A…

Sevatec a New Player in the Federal Cloud Computing Market

By G C Network | August 3, 2009

Just in time for the new Federal Cloud Computing Storefront, Sevatec, Inc. is announcing the development of a toolkit to help federal agencies transform their enterprise architectures to cloud computing…

GSA Releases Cloud Computing RFQ

By G C Network | July 31, 2009

Following through on a much anticipated action, GSA released their Cloud Computing Request For Quotation (RFQ) today. Cloud computing is a major part of President Obama’s reform effort and this…

This series has stepped through cloud migration best practices. After providing an overview, we discussed:

With all of that completed, it’s now time to select the right cloud service provider (CSP) and finally execute the migration. Cloud provider selection is an area that many enterprises ignore. Executives looking to take advantage of the real business value that the cloud delivers often view providers simply as commodity technology providers. With this mindset, decision-makers usually pick the most familiar name. But this strategy is little more than throwing the dice.

A Smarter Way to Select a Provider

Cloud service provider selection requires a well-developed hybrid IT strategy, an unbiased application portfolio review and the appropriate due diligence in the evaluation of all credible cloud service providers. When discussing this linkage, I leverage the Digital Transformation Layered Triangle as a visualization tool. After agreeing to an appropriate high-level hybrid IT strategy, a digital transformation core tenant, candidate CSPs capabilities must be compared based on their:

  • Availability of technology services that align with the business/mission model.
  • Availability of data security controls that address legal, regulatory and data sovereignty limitations.
  • Compatibility of CSP sales process with enterprise acquisition process.
  • Cost forecast alignment with budgetary expectations.

Understanding Cloud Service Agreements

Comparing cloud service agreements from the remaining viable service providers is next. These agreements typically have three components:

  • Customer Agreement: Describes the overall relationship between the customer and provider. Service management includes the processes and procedures used by the cloud provider. Thus, it’s crucial to provide definitions of the roles, responsibilities and execution of the processes. The customer agreement does this. This document can be called a “master agreement,” “terms of service” or simply “agreement.”
  • Acceptable Use Policy (AUP): Defines activities that the provider considers to be improper or outright illegal. There is considerable consistency across cloud providers in these documents. While specific details may vary, the scope and effect of these policies remain the same, and these provisions typically generate the least concerns or resistance.
  • Service-Level Agreement (SLA): Describes levels of service by in terms of availability, serviceability or performance. The SLA specifies thresholds and financial penalties associated with violations of these thresholds. Well-designed SLAs can avoid conflict and facilitate the resolution of an issue before it escalates into a dispute.

Designing a CSA Evaluation

The CSA Evaluation must take into account all critical functional and nonfunctional organizational requirements and IT governance policies, to ensure:

  • Mutual understanding of roles and responsibilities.
  • Compatibility with all enterprise business level policies.
  • An identifiable metrics for all critical performance objectives.
  • Agreement on a plan for meeting all data security and privacy requirements.
  • Identified service management points of contact for each critical technology services.
  • Agreement on service failure management process.
  • Agreement on disaster recovery plan process.
  • An approved hybrid IT governance process.
  • Agreement on a CSP exit process.

This due diligence process maximizes the success probability of any cloud migration program. With CSP selection complete, the organization can now tackle the hard work of executing the actual migration. This task should include:

  • Planning and executing an organizational change management plan.
  • Verifying and clarifying all key stakeholder roles.
  • Detailed project planning and execution.
  • Establishing internal processes for monitoring and periodically reporting the status of all key performance indicators.
  • Establishing an internal cloud migration status feedback and response process.

The most important lesson learned across all industries is that cloud migration is not a project for the IT team alone. This is an enterprise-wide endeavor that requires executive leadership and focused change management efforts across multiple internal domains.

This post was brought to you by IBM Global Technology Services. For more content like this, visit ITBizAdvisor.
Posted in

G C Network