Presented live on March 28, 2018.
Version 2.0 of Migrating Applications to Public Cloud Services: Roadmap for Success is now available.
http://www.cloud-council.org/deliverables/migrating-applications-to-public-cloud-services-roadmap-for-success.htm
As organizations consider migrating applications to the cloud, a business plan and detailed migration plan is critical to success. Version 2.0 covers the key considerations of cloud migration and takes into account the increasing diversity of approaches such as the use of containers, virtual machines and serverless functions, as well as the increasing use of hybrid cloud solutions. In addition, mitigating concerns related to security, privacy and data residency is a major focus of the update.
In this webinar, authors of the paper will discuss each of the six steps outlined in the migration roadmap:
- Assess your applications and workloads
- Build a business case
- Develop a technical approach
- Adopt a flexible integration model
- Address compliance, security, privacy and data residency requirements
- Manage the migration
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Migrating Applications to Public Cloud Services: Roadmap for Success V2.0
1. Migrating Applications to Public Cloud Services:
Roadmap for Success V2.0
Webinar: March 28, 2018
http://www.cloud-council.org/deliverables/migrating-applications-to-public-cloud-services-roadmap-for-success.htm
11. 11
Clarify significant risks
Be realistic: Security may be
better in the cloud!
10 steps proposed for the
specific case of application
migration
Also see the CSCC’s “Security for Cloud
Computing: 10 Steps to Ensure Success”
http://www.cloud-
council.org/deliverables/security-for-cloud-
computing-10-steps-to-ensure-success.htm
1. Understand what data will migrate
2. Map it to security classification
3. Identify the privacy concerns
4. Examine applicable regulations
5. Apply a risk management method
(probability, impact, mitigation)
6. Review cloud provider’s measures
7. Go/No-Go decision based on the above
8. Protect data during bulk migration, in
transit, at rest, and during use
9. Design authentication and
authorization method (SSO, etc.)
10. Put in place a rapid de-provisioning
process
Step 5: Address Security, Privacy, and Data Residency Requirements