Cloud Implementation in Enterprises: Risks and Strategies for Migration

Verified

Added on  2023/06/03

|9
|1767
|476
AI Summary
This report discusses the risks involved in cloud migration and strategies for migration. It also provides a step-by-step guide for migrating services from SQL database server to AWS cloud. The report is relevant for courses related to cloud computing and IT management.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CLOUD IMPLEMENTATION IN ENTERPRISES
Cloud implementation in enterprises
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2CLOUD IMPLEMENTATION IN ENTERPRISES
A report regarding the involvement of risks in cloud migration
There can be a lot of involvement of the risks and the threats while the
implementation of the migration to the cloud services (El Kefel & Mohamed, 2013). It is
known to almost all theat risks involved in a particular task will be there since there is no
option to completely eliminate these risks but the risks involved in the task can be mitigated
to gain out of the best of the services (Brender & Markov, 2013).
Risks involved Description of the risk Impact
of the
risk
Probabilityo
f the risks
(1-5)
Mitigation
process
Architectural
design of IT
Hybrid cloud involves an
amalgamation of an
architecture that is complex
in nature. It is need to have
a proper skillset to have an
end to end architecture. The
architecture involved must
provide an opportunity to
transfer data to facilitate the
process of cloud migration
(Krutz & Vines, 2010). If
the architectures involved
in drawing out the whole
architecture is not properly
analysed, it may result in
High 4 The risks
involved in not
having the
expertise in
particular
skillsets can be
mitigated by
the deployment
of the dedicated
IT
professionals.
Further it is
also
recommende to
MetaSoft to
Document Page
3CLOUD IMPLEMENTATION IN ENTERPRISES
the crumbling down of the
whole system.
perform a
check on the
designing of
the architecture
concerned.
Cloud
procurement
with a relation
to the users.
One of the many risks that
may be involved with the
implementation of the
cloud services in the
process of migration. There
may be a scenario where
not maintaining a proper
harmony with the users
may result in the disruption
of the services and the
structural modules.
Medium 3 The mitigation
process of this
type of risks
can be
mitigated by
following a
specific set of
rule and
guidelines. A
consolidated
approach of the
same must be
taken to
counter these
problems.
(Takabi, Joshi
& Ahn, 2010).
Management of
data
MetaSoft is one of such
company that is confined to
using the automation of
High 4 In order to have
a grip on the
proper
Document Page
4CLOUD IMPLEMENTATION IN ENTERPRISES
their storages in shifting
their data centres from the
databases to a hybrid cloud
service. This may lead
them to apposition where
they may be subjected to
risks that are involved with
the managing of data.
(Zhang et al., 2010).
Reluctance in the
management of data may at
times make the company to
lose valuable information
about the customers.
management of
data, there are
certain
guidelines that
the company
may take up.
These
guidelines will
give the
company an
idea about how
to properly
manage the
risks associated
with valuable
information in
the transferring
of data.
Privacy and
online security
This goes without saying
that security and privacy
issues is one of the leading
risks that is involved in the
implementation of the
cloud migration and
application of the cloud
Very
high
5 Mitigation
process for the
security issues
and the issues
related to
privacy
involves proper

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5CLOUD IMPLEMENTATION IN ENTERPRISES
services in corporal system
of business. (Grobauer,
Walloschek & Stocker,
2011). There is no direct
access to the services in a
cloud. It is due to this, the
data associated in the cloud
services are vulnerable to
several threats and attacks
of intrusion.
deployment of
encryption
techniques.
Surveillances
on the cloud
modules are
needed to be
applied to
avoid the
breaches in the
system.
Migration of the services and the Strategies of Migration
Response to Question 2a)
The MetaSoft board that intends to shift their SharePoint instance and the SQL
database server to the AWS cloud in order to initiate the migration process and test their
respective strategies accordingly (Varia & Mathew, 2014). The steps that would be necessary
to in planning the migration of these services includes the installation of the SQL drivers and
the AWS Schema Conversion Tool on the local computers of MetaSoft, configuring the
company’s Microsoft SQL server source database, configuring the company’s Aurora
MySQL database, usage of the AWS SCT to convert the SQL Server schema to Aurora
MySQL, creating an AWS DMS replication instance, creating AWS DMS source end target
endpoints, creating and running the company’s AWS DMS migration task and ultimately
cutting over to Aurora MySQL (Mauch, Kunze & Hillenbrand, 2013).
Document Page
6CLOUD IMPLEMENTATION IN ENTERPRISES
The steps mentioned above collectively will help the MetaSoft to shift their
SharePoint and the SQL database servers to the AWS cloud with relative ease. This will also
bring a flexibility to the system. The total number of eight steps in the migration process will
not only bring an integrity to the system, but also will help in the facilitation of the services
(Amazon, 2015). The step by step migration process mentioned in this section is provided
according to the prior knowledge that the MetaSoft board is well aware of the perquisites
require before the initiation of the migration process. The main idea behind the shifting of
the SQL server databases to a cloud service is to bring in a fluency to the entire system. It
will help the organisation to retrieve and store information from anywhere unlike the older
version of the SQL database servers.
Response to Question 2b)
In the course of migrating the services from the SQL database server to the AWS
cloud there can be some that could prove to be equal or even there could be issues at each of
the steps. Some of the critical points and the issues are identified and discussed in this section
(Andrikopoulos, Strauch & Leymann, 2013). In the first step of the migration process, the
appropriate link should be used to download the AWS SCT otherwise a downloading a wrong
file will hamper the entire process of migration process. In the second step of the migration
process, special attention should be given to the type of the SQL database server for
replication is not supported if the SQL server database is an Amazon RDS database. In the
third step of the migration process, it is important to have a user to connect to the target
database as a dedicated new user or an existing user is vital to grant the privileges
(Mendonca, 2014). In the fourth step of the migration process, it is important to enter the
right server name, server port, username and the password for testing the connection as these
details are essential for establishing a successful connection. In the fifth step of the migration
process, it is important to specify the replication instance information because the valid
Document Page
7CLOUD IMPLEMENTATION IN ENTERPRISES
information will determine whether a replication instance will be created or not. In the sixth
step of the migration process, it is a must to drop the foreign key constraints and trigger on
the target database because this will help in the generation of the script (Zhao & Zhou, 2014).
In the seventh step of the migration process, it is necessary to give a special attention to the
migration type because the migration type determines what type of migration it will be. In the
eighth step, the SQL service should be properly terminated to avail the cloud services.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8CLOUD IMPLEMENTATION IN ENTERPRISES
References
Amazon, E. C. (2015). Amazon web services. Available in: http://aws. amazon.
com/es/ec2/(November 2012).
Andrikopoulos, V., Strauch, S., & Leymann, F. (2013). Decision support for application
migration to the cloud. Proceedings of CLOSER, 13, 149-155.
Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing:
Results from a case study of Swiss companies. International journal of information
management, 33(5), 726-733.
El Kefel, M. D., & Mohamed, B. (2013, August). Risk management in cloud computing.
In Innovative Computing Technology (INTECH), 2013 Third International
Conference on (pp. 127-131). IEEE.
Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing
vulnerabilities. IEEE Security & Privacy, 9(2), 50-57.
Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud
computing. Wiley Publishing.
Mauch, V., Kunze, M., & Hillenbrand, M. (2013). High performance cloud
computing. Future Generation Computer Systems, 29(6), 1408-1416.
Mendonca, N. C. (2014). Architectural Options for Cloud Migration. IEEE Computer, 47(8),
62-66.
Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud
computing environments. IEEE Security & Privacy, (6), 24-31.
Varia, J., & Mathew, S. (2014). Overview of amazon web services. Amazon Web Services.
Document Page
9CLOUD IMPLEMENTATION IN ENTERPRISES
Zhang, X., Wuwong, N., Li, H., & Zhang, X. (2010, June). Information security risk
management framework for the cloud computing environments. In Computer and
Information Technology (CIT), 2010 IEEE 10th International Conference on (pp.
1328-1334). IEEE.
Zhao, J. F., & Zhou, J. T. (2014). Strategies and methods for cloud migration. International
Journal of Automation and Computing, 11(2), 143-152.
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]