0% found this document useful (0 votes)
27 views18 pages

CSM Unit 2

Uploaded by

harshavardhiniu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views18 pages

CSM Unit 2

Uploaded by

harshavardhiniu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

CLOUD STRATEGY

•A cloud strategy is a plan that outlines the best practices, tools, and services to
use when implementing a cloud solution.
•It's a vital tool for businesses looking to optimize their cloud adoption,
implementation, and operations.
• A cloud strategy can be applied to most, if not all, types of cloud deployments.
PURPOSE OF A CLOUD STRATEGY
•Identify the key benefits associated with cloud service consumption that apply to
your organization.
•Determine which services you will build internally and which services will be
consumed from a public cloud provider partner.
•Identify the partnerships your organization has (or is developing) with public cloud
providers for those services (approved service providers).
•Communicate the approved service providers and associated services.
•State the risk of utilizing resources from a non-approved provider and determine the
consequences of non-approved service consumption. Define and communicate the
process to have a service provider or service added to the approved list.
•Determine how your organization will provide consistent policy and governance across
disparate services and environments, as well as a consistent consumption and
management layer.
What should a cloud strategy include?
Scope: The scope of the strategy
Alignment to a larger strategic initiative
Capabilities mapped to business objectives
Current state
Desired state
Dependencies
Risks
Stakeholders
Strategy review
CLOUD POLICY:
•This policy is a set of rules and principles that protect cloud assets. It provides
guidelines for users to follow, allowing them to access workloads securely. And it sets
out ways to handle cloud security threats.
•This policy outlines best practices and approval processes for using cloud computing
services to support the processing, sharing, storage, and management of institutional
data at Tufts University.
•This policy is a statement of the College’s commitment to ensuring that all its legal,
ethical and policy compliance requirements are met in the procurement, evaluation
and use of cloud services
•It improves security by establishing clear standards and procedures for protecting
cloud resources, detailing the roles involved in safeguarding data, and promoting a
security-conscious culture. Moreover, having a documented cloud security policy is a
requirement of some compliance regulations and audits.
Legal and policy basis
The procurement, evaluation and use of cloud services must adhere to the
legislation in force at the time. Particular attention must be paid to:
• Copyright and Related Rights Acts 2000, 2004 and 2007; • Data Protection
Acts 1988 and 2003;
• Freedom of Information Act 1997 and 2003;
• Contract Law;
• EU Public Procurement Directives;
• The Child Trafficking and Pornography Acts 1998 and 2004;
• Defamation Act 2009;
• Prohibition of Incitement to Hatred Act 1989.
1) Assessment
Analyze market success rates, challenges, and prospects for cloud deployment.
Recognize the business benefits, IT viability, and success criteria for your company’s
application deployment on the cloud.
Analyze and record the benefits, risks, and challenges of adopting the cloud.
2) Planning
Companies are required to build customized cloud strategy services. They should
prepare to use current assets with SaaS, IaaS, and PaaS strategies. They should also
review appropriate deployment models, reference architectures, and other materials to
create a personalized road map and architecture.
3) Deployment
The stages of adoption and planning are intertwined and contain multiple phases that
should be repeated. For instance, understanding cloud architect computing and
adoption standards is equally crucial while analyzing the collateral during planning (NIST
Guidelines, OpenStack adaptability, portability standards, and methodologies for
migrating applications).
4) Optimization
Optimizing business processes and software licenses can increase organizational
efficiency and enable you to deliver more value to the business and the customer.
Adoption of several clouds might present several difficulties, including:
Each cloud architect platform uses proprietary technologies to handle and store
consumer data.
This limits the transferability of the same data between platforms and may even
impose a transfer fee.
Users are compelled to handle their daily operations through various cloud portals.
That might make the IT teams’ operations more difficult.
Each cloud security vendor’s platform’s proprietary application and compute
technology will also impact the developers using it (e.g., AWS Lambda versus Azure
Functions).
This might lead to technical and operational compatibility problems and variances
among different development teams within the same firm.
Adoption Strategies
Cloud adoption strategies consider specific business objectives, best practices,
and cloud infrastructure services for a company’s present and future use. Any
form of cloud model’s fundamental adoption approach will contain processes
such as assessment, planning, migration, and optimization.
The table examines and summarises the adoption techniques for Public, Private,
and Hybrid clouds that should be considered from a business viewpoint.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy