Hybrid Cloud Implementation
VerifiedAdded on 2023/04/20
|31
|7946
|472
AI Summary
This report discusses the implementation of hybrid cloud methodology, focusing on the benefits, risks, and challenges associated with hybrid cloud and microservices. It explores the proposed architectures for hybrid cloud implementation and suggests information security controls. The report also provides insights into the steps included in the implementation plan and highlights the important issues to be checked. The subject of this report is hybrid cloud implementation, and it is relevant for courses related to cloud computing and IT infrastructure.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Title: Hybrid Cloud Implementation [Student name, Number]
Hybrid Cloud Implementation:
A report for DTGOV’s implementation of hybrid cloud methodology
Student name:
Professor’s name:
Affiliation:
Date:
1
Hybrid Cloud Implementation:
A report for DTGOV’s implementation of hybrid cloud methodology
Student name:
Professor’s name:
Affiliation:
Date:
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Hybrid Cloud Implementation [Student name, Number]
Executive Summary
Cloud computing improves the flexibility of IT companies, and enables them to only
choose those solutions that are only appropriate and relevant to themselves, while at the same
time maximizing on cost efficiency. As more businesses continue to adopt this infrastructure,
adoption and deployment of hybrid strategies keeps going up. However, more issues keep
rising up in how to deal with this new hybrid cloud technologies. Since DTGOV will rely on
hybrid cloud model technology to support the success of its service delivery, process
optimization and constant testing is crucial. Using business process management tools, third
party vendors may work with DTGOV to ensure that the new hybrid cloud model supports the
company’s need for adoption of modern technologies to achieve high performance and
business growth.
2
Executive Summary
Cloud computing improves the flexibility of IT companies, and enables them to only
choose those solutions that are only appropriate and relevant to themselves, while at the same
time maximizing on cost efficiency. As more businesses continue to adopt this infrastructure,
adoption and deployment of hybrid strategies keeps going up. However, more issues keep
rising up in how to deal with this new hybrid cloud technologies. Since DTGOV will rely on
hybrid cloud model technology to support the success of its service delivery, process
optimization and constant testing is crucial. Using business process management tools, third
party vendors may work with DTGOV to ensure that the new hybrid cloud model supports the
company’s need for adoption of modern technologies to achieve high performance and
business growth.
2
Running Title: Hybrid Cloud Implementation [Student name, Number]
Table of Contents
Executive Summary....................................................................................................................................2
Introduction:...............................................................................................................................................2
PROPOSED ARCHITECTURES FOR A HYBRID CLOUD..................................................................................3
The benefits of implementing the identified architectures.......................................................................7
RISKS REPORT FOR HYBRID CLOUD AND MICROSERVICES........................................................................8
Challenges that DTGOV may face while implementing the Hybrid Cloud.......................................10
Implementation of the Hybrid Cloud and Integration with On-Premises Apps...............................12
PROPOSED INFORMATION SECURITY CONTROLS....................................................................................12
PROPOSED RECOMMENDATIONS TO BE INCLUDED IN “DTGOV” BCP....................................................15
Steps included in plan...............................................................................................................................21
The important issues that will be checked include:.................................................................................21
Conclusion:................................................................................................................................................22
1
Table of Contents
Executive Summary....................................................................................................................................2
Introduction:...............................................................................................................................................2
PROPOSED ARCHITECTURES FOR A HYBRID CLOUD..................................................................................3
The benefits of implementing the identified architectures.......................................................................7
RISKS REPORT FOR HYBRID CLOUD AND MICROSERVICES........................................................................8
Challenges that DTGOV may face while implementing the Hybrid Cloud.......................................10
Implementation of the Hybrid Cloud and Integration with On-Premises Apps...............................12
PROPOSED INFORMATION SECURITY CONTROLS....................................................................................12
PROPOSED RECOMMENDATIONS TO BE INCLUDED IN “DTGOV” BCP....................................................15
Steps included in plan...............................................................................................................................21
The important issues that will be checked include:.................................................................................21
Conclusion:................................................................................................................................................22
1
Hybrid Cloud Implementation [Student name, Number]
Introduction:
“Cloud computing” basically is a network of hosted remote servers. Cloud computing
helps in the storage, management and processing of data. This is antitypical to what we in our
local servers and personal computers, in storage of data and hosting of applications (Krutz, &
Vines 2010).
Hybrid cloud infrastructure is fast becoming tone of the most popular cloud computing
trends, leading to the hybrid cloud deployments strategy that is now being adopted by business
companies globally. According to the (Garrison, & Wakefield 2012) hybrid cloud strategy had
been adopted by 78 percent of leading companies in the world, according to the survey.
Additionally, predicted that adoption of hybrid IT infrastructures will triple by 2018. There are
obvious benefits of adopting the hybrid infrastructure (Garrison, & Wakefield 2012). Cloud
computing improves the flexibility of IT companies, and enables them to only choose those
solutions that are only appropriate and relevant to themselves, while at the same time
maximizing on cost efficiency. As more businesses continue to adopt this infrastructure,
adoption and deployment of hybrid strategies keeps going up. However, more issues keep
rising up in how to deal with this new hybrid cloud technologies.
As a general rule, hybrid cloud environments should meet this given criteria:
1. Availability of private infrastructure or on-premises which should be operating
separate from the public cloud.
2. The public cloud and the private cloud should have infrastructures with the
ability to communicate with one another through an .
3. The public and private environments should be designed for the portability, such
that there is faster workload transfer between them.
Implementation
2
Introduction:
“Cloud computing” basically is a network of hosted remote servers. Cloud computing
helps in the storage, management and processing of data. This is antitypical to what we in our
local servers and personal computers, in storage of data and hosting of applications (Krutz, &
Vines 2010).
Hybrid cloud infrastructure is fast becoming tone of the most popular cloud computing
trends, leading to the hybrid cloud deployments strategy that is now being adopted by business
companies globally. According to the (Garrison, & Wakefield 2012) hybrid cloud strategy had
been adopted by 78 percent of leading companies in the world, according to the survey.
Additionally, predicted that adoption of hybrid IT infrastructures will triple by 2018. There are
obvious benefits of adopting the hybrid infrastructure (Garrison, & Wakefield 2012). Cloud
computing improves the flexibility of IT companies, and enables them to only choose those
solutions that are only appropriate and relevant to themselves, while at the same time
maximizing on cost efficiency. As more businesses continue to adopt this infrastructure,
adoption and deployment of hybrid strategies keeps going up. However, more issues keep
rising up in how to deal with this new hybrid cloud technologies.
As a general rule, hybrid cloud environments should meet this given criteria:
1. Availability of private infrastructure or on-premises which should be operating
separate from the public cloud.
2. The public cloud and the private cloud should have infrastructures with the
ability to communicate with one another through an .
3. The public and private environments should be designed for the portability, such
that there is faster workload transfer between them.
Implementation
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Hybrid Cloud Implementation [Student name, Number]
There are prerequisites for a company that would need to move its services and
applications to the cloud. The following is a checklist to test the readiness of DTGOV
implementing their strategy:
i. Determining the solution components needed
ii. Integration with existing systems
iii. Handling an increasing management responsibility
iv. Data security in every aspect of the hybrid cloud
v. Implementation of operational procedures
PROPOSED ARCHITECTURES FOR A HYBRID CLOUD
Choosing the best architecture to implement a hybrid cloud will depend much on the
resources and readiness of a particular organization. The choice of a particular architecture for
implementation of a hybrid cloud is based on the following factors:
i. Integrating private and public clouds that are provided by different
vendors.
ii. Using a single vendor to offer both private and public clouds as a
package.
iii. The organization uses and manages its own private cloud then integrates
it with a public cloud that is serviced by a third party vendor.
A hybrid cloud model can be implemented through more than one models, as shown in
the figure below:
3
There are prerequisites for a company that would need to move its services and
applications to the cloud. The following is a checklist to test the readiness of DTGOV
implementing their strategy:
i. Determining the solution components needed
ii. Integration with existing systems
iii. Handling an increasing management responsibility
iv. Data security in every aspect of the hybrid cloud
v. Implementation of operational procedures
PROPOSED ARCHITECTURES FOR A HYBRID CLOUD
Choosing the best architecture to implement a hybrid cloud will depend much on the
resources and readiness of a particular organization. The choice of a particular architecture for
implementation of a hybrid cloud is based on the following factors:
i. Integrating private and public clouds that are provided by different
vendors.
ii. Using a single vendor to offer both private and public clouds as a
package.
iii. The organization uses and manages its own private cloud then integrates
it with a public cloud that is serviced by a third party vendor.
A hybrid cloud model can be implemented through more than one models, as shown in
the figure below:
3
Hybrid Cloud Implementation [Student name, Number]
Figure 1: Hybrid cloud using different cloud deployment models
A high program compatibility, ease of access of services and storage scalability are the
three major reasons why DTGOV are adopting a hybrid cloud infrastructure.
A hybrid cloud computing model combines two clouds; the public and private clouds.
This creates a hybrid cloud, which is basically a mass of virtual resources that end users can
access on –demand through portals. Hybrid architecture will allow DTGOV to operate
workloads in the public and private clouds. Resources can be pulled from one cloud to another,
and the clouds can be used interchangeably (Sutton-Grier, Wowk & Bamford 2015).
For the hybrid cloud to be successfully implemented, first of all resources will need to be
virtualized and pooled together in the cloud, after which automation software will do allocation
of the resources. It is only until the two clouds (the public cloud and the private cloud) have
been interconnected that we will have a hybrid cloud. This is possible by use of wide area
networks (WAN), compatibility programs and virtual private networks (VPNs) (Zhang, Cheng &
Boutaba 2010).
Hybrid clouds can only work through interconnectivity. Without interconnectivity, we
will just have two separate clouds. The effectiveness of a hybrid cloud largely depends on how
4
Figure 1: Hybrid cloud using different cloud deployment models
A high program compatibility, ease of access of services and storage scalability are the
three major reasons why DTGOV are adopting a hybrid cloud infrastructure.
A hybrid cloud computing model combines two clouds; the public and private clouds.
This creates a hybrid cloud, which is basically a mass of virtual resources that end users can
access on –demand through portals. Hybrid architecture will allow DTGOV to operate
workloads in the public and private clouds. Resources can be pulled from one cloud to another,
and the clouds can be used interchangeably (Sutton-Grier, Wowk & Bamford 2015).
For the hybrid cloud to be successfully implemented, first of all resources will need to be
virtualized and pooled together in the cloud, after which automation software will do allocation
of the resources. It is only until the two clouds (the public cloud and the private cloud) have
been interconnected that we will have a hybrid cloud. This is possible by use of wide area
networks (WAN), compatibility programs and virtual private networks (VPNs) (Zhang, Cheng &
Boutaba 2010).
Hybrid clouds can only work through interconnectivity. Without interconnectivity, we
will just have two separate clouds. The effectiveness of a hybrid cloud largely depends on how
4
Hybrid Cloud Implementation [Student name, Number]
well connections have been made between the public and private clouds. It is important to
note that the operating system behind a hybrid cloud will either produce a strong dependable
hybrid cloud system or a weak one.
In order for the DTGOV to migrate their services to the hybrid cloud, there are many
consideration that have to be made. Migrating services and applications to the cloud is one of
the many IT problems that often require deep expertise, time and determination reach find the
desired solution. Moving services and applications to the cloud means a lot. Stored procedures
have to be turned into micro services, the databases used must be of a scalable nature and
massive data stores have to be instantiated.
Hybrid cloud can utilize resources from all architectures of cloud computing, that is,
Infrastructure as a service (IaaS) model, platform as a service model (PaaS) and Software as a
service model (SaaS). Below is a diagrammatic view of the hybrid cloud that has been
implemented using a number of deployment models:
Table showing architectures to implement this hybrid model:
Architecture Description Reasons for
deploying it
“Load Distribution
Architecture”
This architecture is
based on the principle of
reducing or eliminating over-
exploitation of IT resources.
It also considers under-usage
factors. The infrastructure
relies on runtime’s ability to
implement “load-balancing”,
logics and algorithms
(Sotomayor et al 2009).
It includes the “cloud
usage monitor” in its
package. It does this by
carrying the tracking of the
runtime workload.
Furthermore, it is very
efficient in information
processing.
5
well connections have been made between the public and private clouds. It is important to
note that the operating system behind a hybrid cloud will either produce a strong dependable
hybrid cloud system or a weak one.
In order for the DTGOV to migrate their services to the hybrid cloud, there are many
consideration that have to be made. Migrating services and applications to the cloud is one of
the many IT problems that often require deep expertise, time and determination reach find the
desired solution. Moving services and applications to the cloud means a lot. Stored procedures
have to be turned into micro services, the databases used must be of a scalable nature and
massive data stores have to be instantiated.
Hybrid cloud can utilize resources from all architectures of cloud computing, that is,
Infrastructure as a service (IaaS) model, platform as a service model (PaaS) and Software as a
service model (SaaS). Below is a diagrammatic view of the hybrid cloud that has been
implemented using a number of deployment models:
Table showing architectures to implement this hybrid model:
Architecture Description Reasons for
deploying it
“Load Distribution
Architecture”
This architecture is
based on the principle of
reducing or eliminating over-
exploitation of IT resources.
It also considers under-usage
factors. The infrastructure
relies on runtime’s ability to
implement “load-balancing”,
logics and algorithms
(Sotomayor et al 2009).
It includes the “cloud
usage monitor” in its
package. It does this by
carrying the tracking of the
runtime workload.
Furthermore, it is very
efficient in information
processing.
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Hybrid Cloud Implementation [Student name, Number]
“Resources pooling
Architecture”
It is based on the
principle of employing
resource pools. IT resources
of are pooled together in
groups, and system
controlling is also done. It has
also ensures that they are
synchronized automatically.
It includes a number
of “cloud usage monitors”
during the runtime process.
This is useful for effecting the
tracking and synchronization
of all the elements required
by the pooled IT resources. In
this infrastructure, some
management systems are
included.
“Dynamic Scalability
Architecture”
This infrastructure is
based on scaling systems that
are already predefined,
which trigger the IT resources
allocation dynamically from
the resource pools (Zhang et
al 2009).
It has independent
cloud usage monitors that
track utilization of the
runtime. This is to reduce
dynamic fluctuation during
runtime. This benefit is the
greatest advantage of his
infrastructure
“Elastic Resource
Capacity Architecture”
This infrastructure is
related with virtual server
provisioning dynamically. It
Cloud usage
monitoring gathers IT usage
data used previously and
6
“Resources pooling
Architecture”
It is based on the
principle of employing
resource pools. IT resources
of are pooled together in
groups, and system
controlling is also done. It has
also ensures that they are
synchronized automatically.
It includes a number
of “cloud usage monitors”
during the runtime process.
This is useful for effecting the
tracking and synchronization
of all the elements required
by the pooled IT resources. In
this infrastructure, some
management systems are
included.
“Dynamic Scalability
Architecture”
This infrastructure is
based on scaling systems that
are already predefined,
which trigger the IT resources
allocation dynamically from
the resource pools (Zhang et
al 2009).
It has independent
cloud usage monitors that
track utilization of the
runtime. This is to reduce
dynamic fluctuation during
runtime. This benefit is the
greatest advantage of his
infrastructure
“Elastic Resource
Capacity Architecture”
This infrastructure is
related with virtual server
provisioning dynamically. It
Cloud usage
monitoring gathers IT usage
data used previously and
6
Hybrid Cloud Implementation [Student name, Number]
uses allocation and
reclaiming systems using the
RAM and the CPUs.
during runtime, after which
scaling of resources is done.
The benefits of implementing the identified architectures
Low Cost - there are computing resources or hardware, and no monthly depreciation
and reviewing of system usage.
Scale: The infrastructure is flexible and is highly elastic: It also has the ability to fast
transfer of information from private clouds to the public clouds in testing for the most recent
applications.
Speed: The virtual resources can be easily accessed to enable the business meet its
objectives. There has been a wide expansion bandwidth of speeds, hence making it more
effective as opposed to the traditional local server storage infrastructure.
Integration: It is easy to integrate with the traditional “SQL” databases to allow for
accessibility into the private cloud. It further gives analytical opportunities to limitless business
requirements.
Issues Associated with these architectures
The decision by DTGOV to adopt a hybrid cloud strategy requires an understanding of
what hybrid clouds are. This strategy will only be successful if only the project will draw
supporting components into the scene, so as to power the connectivity of both the public and
private clouds through the Wide area network (WAN).
Organizations that choose a hybrid architecture can realize a number of issues that can
arise as follows:
7
uses allocation and
reclaiming systems using the
RAM and the CPUs.
during runtime, after which
scaling of resources is done.
The benefits of implementing the identified architectures
Low Cost - there are computing resources or hardware, and no monthly depreciation
and reviewing of system usage.
Scale: The infrastructure is flexible and is highly elastic: It also has the ability to fast
transfer of information from private clouds to the public clouds in testing for the most recent
applications.
Speed: The virtual resources can be easily accessed to enable the business meet its
objectives. There has been a wide expansion bandwidth of speeds, hence making it more
effective as opposed to the traditional local server storage infrastructure.
Integration: It is easy to integrate with the traditional “SQL” databases to allow for
accessibility into the private cloud. It further gives analytical opportunities to limitless business
requirements.
Issues Associated with these architectures
The decision by DTGOV to adopt a hybrid cloud strategy requires an understanding of
what hybrid clouds are. This strategy will only be successful if only the project will draw
supporting components into the scene, so as to power the connectivity of both the public and
private clouds through the Wide area network (WAN).
Organizations that choose a hybrid architecture can realize a number of issues that can
arise as follows:
7
Hybrid Cloud Implementation [Student name, Number]
i. Flexible, pricing models based on subscription
ii. Flexibility in shifting workloads based on cost and need.
iii. Advantage of access to additional cloud resources
iv. low-cost of entry
v. consistent and immediate, access to on-demand computing resources
RISKS REPORT FOR HYBRID CLOUD AND MICROSERVICES
Hybrid cloud computing grants almost an unlimited accessory online computing
resources. It also allows for easy deployment of these resources across the world, and it is
probably the reason why cloud computing is becoming popular to many organizations.
Furthermore, it allows for optimization of resources and hence leads to reduction of costs and
labor of maintaining computing resources (Krutz & Vines 2010).
Before an infrastructure is moved to the cloud, reduction of migration-related risks has
to be considered, so as to ensure that the speed of implementing the process is not
compromised by privacy, security issues or regulations of the government. This is where hybrid
cloud comes in. The foundational principle for hybrid cloud infrastructure is the shifting of
services to the cloud, where they form part of the infrastructure deployed in the data center
(Jadeja, & Modi 2012).
Strategies for cloud migration involve lift and shift models, which are one of the most
popular. The model holds that the process of migration must be organized into two steps:
i. Lift – the process of shifting already existing infrastructure to the cloud.
ii. Shift – it works on a presumption that an infrastructure is being adopted to the cloud for
optimization of an already existing cloud infrastructure.
8
i. Flexible, pricing models based on subscription
ii. Flexibility in shifting workloads based on cost and need.
iii. Advantage of access to additional cloud resources
iv. low-cost of entry
v. consistent and immediate, access to on-demand computing resources
RISKS REPORT FOR HYBRID CLOUD AND MICROSERVICES
Hybrid cloud computing grants almost an unlimited accessory online computing
resources. It also allows for easy deployment of these resources across the world, and it is
probably the reason why cloud computing is becoming popular to many organizations.
Furthermore, it allows for optimization of resources and hence leads to reduction of costs and
labor of maintaining computing resources (Krutz & Vines 2010).
Before an infrastructure is moved to the cloud, reduction of migration-related risks has
to be considered, so as to ensure that the speed of implementing the process is not
compromised by privacy, security issues or regulations of the government. This is where hybrid
cloud comes in. The foundational principle for hybrid cloud infrastructure is the shifting of
services to the cloud, where they form part of the infrastructure deployed in the data center
(Jadeja, & Modi 2012).
Strategies for cloud migration involve lift and shift models, which are one of the most
popular. The model holds that the process of migration must be organized into two steps:
i. Lift – the process of shifting already existing infrastructure to the cloud.
ii. Shift – it works on a presumption that an infrastructure is being adopted to the cloud for
optimization of an already existing cloud infrastructure.
8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Hybrid Cloud Implementation [Student name, Number]
Possible control for the risks
Operation of cloud computing services comes with a number of risks as well as
opportunities. Cloud computing service delivery is helpful but it is associated with many risks.
Some of these risks are;
Information loss due malicious practices such as hacking. It therefore requires
frequent surveillance and maintenance so as to reduce this risk.
Liability of running operations at low IT costs. To mitigate this risk, Organizations
may rent more servers from third party vendors to avoid maintaining servers conveniently,
without added responsibilities of updating them.
Risking of information availability and business success risk. In cloud computing,
continuity of a Business is risked in because of internet instability. Internet stability is not
always assured in maintaining a steady business operation.
Loss of control risks Cloud security risks Compliance Risks
Hybrid cloud computing
can lead the loss of
management The responsibility
of overseeing the day to day
operations in the organization
have been taken over in
organizations. General control
on each technology section has
been done away with, as most
of these sections have been
shifted to the cloud. As cloud-
based infrastructure is being
implemented, many changes
There has been a great
deal in regards to the dangers
of the hybrid cloud computing.
The security measures of the
market have been shooting up
day by day. This indicates that
there are a number of security
risk issues with this
infrastructure.
There have been some
key challenges in security for
companies that offer hybrid
This problem is
associated with the afore-
mentioned challenges in
security. DTGOV needs to
ensure that every strategy
regarding the hybrid cloud is
consistent with standards and
regulations of the industry. It
important that information
transferred between private
and public clouds is
guaranteed.
9
Possible control for the risks
Operation of cloud computing services comes with a number of risks as well as
opportunities. Cloud computing service delivery is helpful but it is associated with many risks.
Some of these risks are;
Information loss due malicious practices such as hacking. It therefore requires
frequent surveillance and maintenance so as to reduce this risk.
Liability of running operations at low IT costs. To mitigate this risk, Organizations
may rent more servers from third party vendors to avoid maintaining servers conveniently,
without added responsibilities of updating them.
Risking of information availability and business success risk. In cloud computing,
continuity of a Business is risked in because of internet instability. Internet stability is not
always assured in maintaining a steady business operation.
Loss of control risks Cloud security risks Compliance Risks
Hybrid cloud computing
can lead the loss of
management The responsibility
of overseeing the day to day
operations in the organization
have been taken over in
organizations. General control
on each technology section has
been done away with, as most
of these sections have been
shifted to the cloud. As cloud-
based infrastructure is being
implemented, many changes
There has been a great
deal in regards to the dangers
of the hybrid cloud computing.
The security measures of the
market have been shooting up
day by day. This indicates that
there are a number of security
risk issues with this
infrastructure.
There have been some
key challenges in security for
companies that offer hybrid
This problem is
associated with the afore-
mentioned challenges in
security. DTGOV needs to
ensure that every strategy
regarding the hybrid cloud is
consistent with standards and
regulations of the industry. It
important that information
transferred between private
and public clouds is
guaranteed.
9
Hybrid Cloud Implementation [Student name, Number]
are being witnessed in
organizations.
Applications change
from time to time. The
applications a recorded as ill-
equipped updating attempts,
since they are outside of the
organization of the
management. A single change
in a solitary application may
affect different projects,
bringing disturbances to the
normal running of applications
in business.
cloud methodologies. These
include management risk,
security administration risk,
and improperly developed
agreements on administration
levels. Many of these issues
come from these confusions.
These risks arise majorly
because private and public
clouds are both used
concurrently.
On the presumption
that organizations have been
working with “debit card” data,
it is under the regulations
outlined by international
standards on data security.
These regulations
should be abided with
appropriately, and with
particular conditions, so as to
allow the hybrid could run
successfully.
Challenges that DTGOV may face while implementing the Hybrid Cloud
1. Networking
Shifting of cloud services to the cloud is no different as setting up a data center..
However, hybrid cloud infrastructure requires not just an internet provider, but a cloud
provider. Due to this hindrance, the selected cloud provider must fulfill the following
conditions:
i. Must allow for design and implementation of the virtual private cloud networks
within a range of IP addresses
ii. Compatibility with other hardware or software
10
are being witnessed in
organizations.
Applications change
from time to time. The
applications a recorded as ill-
equipped updating attempts,
since they are outside of the
organization of the
management. A single change
in a solitary application may
affect different projects,
bringing disturbances to the
normal running of applications
in business.
cloud methodologies. These
include management risk,
security administration risk,
and improperly developed
agreements on administration
levels. Many of these issues
come from these confusions.
These risks arise majorly
because private and public
clouds are both used
concurrently.
On the presumption
that organizations have been
working with “debit card” data,
it is under the regulations
outlined by international
standards on data security.
These regulations
should be abided with
appropriately, and with
particular conditions, so as to
allow the hybrid could run
successfully.
Challenges that DTGOV may face while implementing the Hybrid Cloud
1. Networking
Shifting of cloud services to the cloud is no different as setting up a data center..
However, hybrid cloud infrastructure requires not just an internet provider, but a cloud
provider. Due to this hindrance, the selected cloud provider must fulfill the following
conditions:
i. Must allow for design and implementation of the virtual private cloud networks
within a range of IP addresses
ii. Compatibility with other hardware or software
10
Hybrid Cloud Implementation [Student name, Number]
iii. Ability to support a two way connection between the online private data center and
services provided by leaders in the market, for example Azure.
iv. Support connectivity between the data center and local resources pooling center.
Advance.
2. Migration
Hybrid cloud migration is implemented by following the following steps:
1. Migration of the server, the server has to be moved from the on-premise state
to online hosted state.
2. Data migration, needed when data in the file system and the database is
required to be shifted to the cloud. This transition must be carried out without interruption
without service interruption.
3. Encryption
In today’s world, data is money. No one wants data leakage. As a result, the government
has come up with restrictions in seeking to protect data. It becomes a challenge to comply with
those rules. This is where data encryption is needed.
4. Access and identity management
For most of enterprise applications, a sign in is an important user experience especially
when it has to do with the cloud. Cloud infrastructures need proper authentication to avoid
data loss. . The users’ database has to be well integrated with the application (Goyal 2014).
5. Compliance
Compliance can be seen as shown below:
i. Legal compliance. Ensures that the provider has satisfied all certifications as required by
the government.
11
iii. Ability to support a two way connection between the online private data center and
services provided by leaders in the market, for example Azure.
iv. Support connectivity between the data center and local resources pooling center.
Advance.
2. Migration
Hybrid cloud migration is implemented by following the following steps:
1. Migration of the server, the server has to be moved from the on-premise state
to online hosted state.
2. Data migration, needed when data in the file system and the database is
required to be shifted to the cloud. This transition must be carried out without interruption
without service interruption.
3. Encryption
In today’s world, data is money. No one wants data leakage. As a result, the government
has come up with restrictions in seeking to protect data. It becomes a challenge to comply with
those rules. This is where data encryption is needed.
4. Access and identity management
For most of enterprise applications, a sign in is an important user experience especially
when it has to do with the cloud. Cloud infrastructures need proper authentication to avoid
data loss. . The users’ database has to be well integrated with the application (Goyal 2014).
5. Compliance
Compliance can be seen as shown below:
i. Legal compliance. Ensures that the provider has satisfied all certifications as required by
the government.
11
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Hybrid Cloud Implementation [Student name, Number]
ii. Technical compliance. While the cloud provider may be responsible for all the technical
work, the user must be responsible for configuration of the software and ensuring that
the application is secure.
While there are unavoidable risks involved in implementation of hybrid cloud
infrastructures, there are solutions for all these risks. DTGOV has to determine all the needs
and prioritize them, so as to form a comprehensible plan of what is expected from cloud
providers so as to also get benefits from the hybrid cloud (Talia 2011).
Implementation of the Hybrid Cloud and Integration with On-Premises Apps
Integrating of local servers to on-cloud services to make the hybrid cloud may extend
the lifecycle of your system, but its implementation is critical. For DTGOV, the following
considerations must be made
PROPOSED INFORMATION SECURITY CONTROLS TO SECURE THE HYBRID CLOUD.
RISK Control Strategy
Migration Risk Determination of the type of deployment
model for the cloud - Shifting from on-
premise hosting system to hybrid cloud
requires a scrupulous assessment of all the
needs and processes that would be involved to
make the process a success. One of the most
important steps is to define the appropriate
data to be migrated first. Secondly, the models
of deployment are carefully considered, and
the most appropriate is selected. The
deployment alternatives include on-site
12
ii. Technical compliance. While the cloud provider may be responsible for all the technical
work, the user must be responsible for configuration of the software and ensuring that
the application is secure.
While there are unavoidable risks involved in implementation of hybrid cloud
infrastructures, there are solutions for all these risks. DTGOV has to determine all the needs
and prioritize them, so as to form a comprehensible plan of what is expected from cloud
providers so as to also get benefits from the hybrid cloud (Talia 2011).
Implementation of the Hybrid Cloud and Integration with On-Premises Apps
Integrating of local servers to on-cloud services to make the hybrid cloud may extend
the lifecycle of your system, but its implementation is critical. For DTGOV, the following
considerations must be made
PROPOSED INFORMATION SECURITY CONTROLS TO SECURE THE HYBRID CLOUD.
RISK Control Strategy
Migration Risk Determination of the type of deployment
model for the cloud - Shifting from on-
premise hosting system to hybrid cloud
requires a scrupulous assessment of all the
needs and processes that would be involved to
make the process a success. One of the most
important steps is to define the appropriate
data to be migrated first. Secondly, the models
of deployment are carefully considered, and
the most appropriate is selected. The
deployment alternatives include on-site
12
Hybrid Cloud Implementation [Student name, Number]
premises, public clouds, private clouds and or
a combination of these.
Integration risks Enterprise systems integration – controlling
interfaces are put in place so as to enable the
components of the cloud service to be
integrate with the on-premise systems. This
can always be achieved by technologies such
as API interfaces. For this risk to be
controlled, the integration has to consider
both management and business aspects.
Functional integration of systems is also very
important in controlling this risk. Integration
of cloud services requires that back-up
standards be put in place.
Networking Risk Addressing the connectivity requirements –
integration of on-cloud services with on-
premise services produces a risk of network
problems. Hence, to control this risk, the
needs of each component needs to be
carefully considered. Network virtualization
should be considered if possible. The network
connectivity has to be of such a nature as to
support resiliencies and offer disaster
13
premises, public clouds, private clouds and or
a combination of these.
Integration risks Enterprise systems integration – controlling
interfaces are put in place so as to enable the
components of the cloud service to be
integrate with the on-premise systems. This
can always be achieved by technologies such
as API interfaces. For this risk to be
controlled, the integration has to consider
both management and business aspects.
Functional integration of systems is also very
important in controlling this risk. Integration
of cloud services requires that back-up
standards be put in place.
Networking Risk Addressing the connectivity requirements –
integration of on-cloud services with on-
premise services produces a risk of network
problems. Hence, to control this risk, the
needs of each component needs to be
carefully considered. Network virtualization
should be considered if possible. The network
connectivity has to be of such a nature as to
support resiliencies and offer disaster
13
Hybrid Cloud Implementation [Student name, Number]
recovery alternatives.
Compliance Risk Development of agreements on services so as
to comply with established policies, standards
and guidelines- Compliance with the current
frameworks of governance has to be done
promptly. Enough time has to be allowed for
DTGOV to habituate and educate itself with
across the physical requirements as given by
the governance. Furthermore, all the process
running have to meet the required standards
of efficiency, and harmonization has to be
done. Gap identification also has to be
performed. Ample time has to be given for
change in management to be done.
Access and identity management
Risk
Assessment and resolving of security and
privacy challenges - The running interfaces in
the administration of the private cloud has to
be done. This involves the administrations of
the on-premises and the open cloud. Proper
security measures have to be applied. Datasets
within the arrangement of the hybrid cloud
have to be done. Control and encryption
services have to be freely accessible. Privacy
14
recovery alternatives.
Compliance Risk Development of agreements on services so as
to comply with established policies, standards
and guidelines- Compliance with the current
frameworks of governance has to be done
promptly. Enough time has to be allowed for
DTGOV to habituate and educate itself with
across the physical requirements as given by
the governance. Furthermore, all the process
running have to meet the required standards
of efficiency, and harmonization has to be
done. Gap identification also has to be
performed. Ample time has to be given for
change in management to be done.
Access and identity management
Risk
Assessment and resolving of security and
privacy challenges - The running interfaces in
the administration of the private cloud has to
be done. This involves the administrations of
the on-premises and the open cloud. Proper
security measures have to be applied. Datasets
within the arrangement of the hybrid cloud
have to be done. Control and encryption
services have to be freely accessible. Privacy
14
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Hybrid Cloud Implementation [Student name, Number]
controls have to be checked especially when
relocating segments of the application
systems across environments.
For the hybrid cloud to be effective, the following security steps and controls needs to
be considered.
i. Understanding the API Options
For DTGOV, shifting to a hybrid cloud model will involve the integration of its on-
premises applications with software-as-a-service services that will be delivered through the
cloud. Before implementation, understanding of the options for application program interface
(API) is essential.
For selection of APIs, cost is another important factor that needs to be evaluated. An
evaluation has to be made on whether APIs to sync up on-premises legacy apps with cloud
resources are available. Some third party vendors offer API access to users at an additional fee.
While this may make sense for some businesses’ integration needs, others find may find the
additional fee way up prohibitive (Peng et al 2009).
ii. Data Workload balancing
While a hybrid cloud model may offer extensible and a good opportunity for
organizations to expand the services they offer, their implementation should be based on prior
research on how the computing resources are needed, basing this on statistics on on-premises
applications. So as to plan for the needed capacity in case of cloud bursting, essential to
understand when the workload may occur (Sinn 2014).
15
controls have to be checked especially when
relocating segments of the application
systems across environments.
For the hybrid cloud to be effective, the following security steps and controls needs to
be considered.
i. Understanding the API Options
For DTGOV, shifting to a hybrid cloud model will involve the integration of its on-
premises applications with software-as-a-service services that will be delivered through the
cloud. Before implementation, understanding of the options for application program interface
(API) is essential.
For selection of APIs, cost is another important factor that needs to be evaluated. An
evaluation has to be made on whether APIs to sync up on-premises legacy apps with cloud
resources are available. Some third party vendors offer API access to users at an additional fee.
While this may make sense for some businesses’ integration needs, others find may find the
additional fee way up prohibitive (Peng et al 2009).
ii. Data Workload balancing
While a hybrid cloud model may offer extensible and a good opportunity for
organizations to expand the services they offer, their implementation should be based on prior
research on how the computing resources are needed, basing this on statistics on on-premises
applications. So as to plan for the needed capacity in case of cloud bursting, essential to
understand when the workload may occur (Sinn 2014).
15
Hybrid Cloud Implementation [Student name, Number]
iii. Integration and Automation of User Access
When making a transition of on-premises services to integrate with cloud resources,
management of user access can be a key challenge. It even can be more difficult for businesses
without programs for extensive data governance. It’s essential therefore in order to avoid
underestimation of the value of management of user identity during a transition to a hybrid
cloud. When considering integration of on-premise services to on-cloud services, it's a problem
that will always get bigger. However, it is not the main challenge when it comes to cloud
services integration.
During the implementation planning phase for the DTGOV cloud model, the company
should look for a hybrid cloud vendor who will work with them so as to address the following
challenges that are related with governance:
1. Which users should have access to on-premises applications
2. The levels of user roles and the priority to be given to each user.
3. Policies for password changing and creation of strong credential for access.
4. Automation of account creation and updating password.
5. Automation of account deactivation.
6. Enhancement for compliance to required user activities reporting.
The documentation phase for user access presents a big opportunity for organizations
to scale their information security through discovery and deletion of unused accounts, and
reduction of access to usual employees to a strictly ‘need-to-know’ basis (Vecchiola, Calheiros,
Karunamoorthy & Buyya 2012).
iv. Test and Optimization of the process Performance
For DTGOV, people and customers will be dependent on the success of its hybrid cloud
model, and its effectiveness in communicating and sharing data through the integrated
platform. Depending on the services to be integrated with the public cloud services and
16
iii. Integration and Automation of User Access
When making a transition of on-premises services to integrate with cloud resources,
management of user access can be a key challenge. It even can be more difficult for businesses
without programs for extensive data governance. It’s essential therefore in order to avoid
underestimation of the value of management of user identity during a transition to a hybrid
cloud. When considering integration of on-premise services to on-cloud services, it's a problem
that will always get bigger. However, it is not the main challenge when it comes to cloud
services integration.
During the implementation planning phase for the DTGOV cloud model, the company
should look for a hybrid cloud vendor who will work with them so as to address the following
challenges that are related with governance:
1. Which users should have access to on-premises applications
2. The levels of user roles and the priority to be given to each user.
3. Policies for password changing and creation of strong credential for access.
4. Automation of account creation and updating password.
5. Automation of account deactivation.
6. Enhancement for compliance to required user activities reporting.
The documentation phase for user access presents a big opportunity for organizations
to scale their information security through discovery and deletion of unused accounts, and
reduction of access to usual employees to a strictly ‘need-to-know’ basis (Vecchiola, Calheiros,
Karunamoorthy & Buyya 2012).
iv. Test and Optimization of the process Performance
For DTGOV, people and customers will be dependent on the success of its hybrid cloud
model, and its effectiveness in communicating and sharing data through the integrated
platform. Depending on the services to be integrated with the public cloud services and
16
Hybrid Cloud Implementation [Student name, Number]
resources, DTGOV must hire IT experts to advice on which services may be conformable and
which ones need to be separated.
Since DTGOV will rely on hybrid cloud model technology to support the success of its
service delivery, process optimization and constant testing is crucial. Using business process
management tools, third party vendors may work with DTGOV to ensure that the new hybrid
cloud model supports the company’s need for adoption of modern technologies to achieve high
performance and business growth. Additionally, the following control measures should also be
considered:
i. Determining cloud deployment model for the data:
This important step is to define a proper data. Methods for deployment may include on
premises, public clouds, personal clouds or combineof all of these.
ii. Integrating the current enterprise systems:
Related interfaces are integrated using cloud service components which have ability to
effect desktop-based systems. This can be implemented by technologies such as management
of API. The management and business areas of integration should be considered. This also
requires that system functional integration be done (Chou 2015).
iii. Addressing connectivity requirements:
Consideration of the requirements of each link in the set up should be done. This
requirement may span across various cloud-services. Furthermore, they may assure availability
of connectivity for all the requirements. Virtualization of network trend is also considered. The
ability of the connectivity that supports resiliency and disaster recovery requirements are too
considered.
iv. Development of governance policies and service agreements:
17
resources, DTGOV must hire IT experts to advice on which services may be conformable and
which ones need to be separated.
Since DTGOV will rely on hybrid cloud model technology to support the success of its
service delivery, process optimization and constant testing is crucial. Using business process
management tools, third party vendors may work with DTGOV to ensure that the new hybrid
cloud model supports the company’s need for adoption of modern technologies to achieve high
performance and business growth. Additionally, the following control measures should also be
considered:
i. Determining cloud deployment model for the data:
This important step is to define a proper data. Methods for deployment may include on
premises, public clouds, personal clouds or combineof all of these.
ii. Integrating the current enterprise systems:
Related interfaces are integrated using cloud service components which have ability to
effect desktop-based systems. This can be implemented by technologies such as management
of API. The management and business areas of integration should be considered. This also
requires that system functional integration be done (Chou 2015).
iii. Addressing connectivity requirements:
Consideration of the requirements of each link in the set up should be done. This
requirement may span across various cloud-services. Furthermore, they may assure availability
of connectivity for all the requirements. Virtualization of network trend is also considered. The
ability of the connectivity that supports resiliency and disaster recovery requirements are too
considered.
iv. Development of governance policies and service agreements:
17
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Hybrid Cloud Implementation [Student name, Number]
Assessment of the current framework of compliance and governance is accomplished.
Furthermore, processes harmonization and gap identification is done. Enough time has to be
allowed here so as to educate and habituate all alterations across DTGOV. Here is where
measurement and management visibility gaps are identified (Zhang et al 2009).
v. Assessment of challenges related to security:
Understanding of the intermediary platforms between the IT resources in the private
cloud is considered. This may also include the administration of the public cloud its on-
premises. Steady and proper security measures of each section is applied. Evaluation of
datasets positions is done within the arrangement of hybrid-cloud. Furthermore, access of
encryption and control guarantee is given. It is until relocation of segments of applications
within the environments is complete that supervision of privacy controls is done.
PROPOSED RECOMMENDATIONS TO BE INCLUDED IN “DTGOV” BCP
Adoption of the hybrid cloud strategy may be due to various reasons, but chiefly, it is for
the many benefits that are to be accrued from this shift (Qiu et al 2010). The least of these
benefits are resilience in business, faster recuperation in case of disaster and reinforcement.
The key advantage is that it will give the company ability to enable it to cover remote and local
storages.
The hybrid architecture will help in giving alternatives to the company. This will take
place especially when there is a chance in an open cloud that is leveraged for backing up.
Realistically, utilizing the hybrid cloud resources must get beyond a mere objective where
information is just dumped. This is the first phase for utilization of the cloud in reestablishing,
restarting, continuing, revamping, reconstituting and remaking of the condition of on-premises
for recovery of disasters (Sarna 2010).
A hybrid cloud set up is desktop based because it requires regulation of current
resources, integrating both private and public clouds. Hybrid infrastructure can be secured.
Additionally, the usefulness of the cloud could be enhanced to make the operating atmosphere
18
Assessment of the current framework of compliance and governance is accomplished.
Furthermore, processes harmonization and gap identification is done. Enough time has to be
allowed here so as to educate and habituate all alterations across DTGOV. Here is where
measurement and management visibility gaps are identified (Zhang et al 2009).
v. Assessment of challenges related to security:
Understanding of the intermediary platforms between the IT resources in the private
cloud is considered. This may also include the administration of the public cloud its on-
premises. Steady and proper security measures of each section is applied. Evaluation of
datasets positions is done within the arrangement of hybrid-cloud. Furthermore, access of
encryption and control guarantee is given. It is until relocation of segments of applications
within the environments is complete that supervision of privacy controls is done.
PROPOSED RECOMMENDATIONS TO BE INCLUDED IN “DTGOV” BCP
Adoption of the hybrid cloud strategy may be due to various reasons, but chiefly, it is for
the many benefits that are to be accrued from this shift (Qiu et al 2010). The least of these
benefits are resilience in business, faster recuperation in case of disaster and reinforcement.
The key advantage is that it will give the company ability to enable it to cover remote and local
storages.
The hybrid architecture will help in giving alternatives to the company. This will take
place especially when there is a chance in an open cloud that is leveraged for backing up.
Realistically, utilizing the hybrid cloud resources must get beyond a mere objective where
information is just dumped. This is the first phase for utilization of the cloud in reestablishing,
restarting, continuing, revamping, reconstituting and remaking of the condition of on-premises
for recovery of disasters (Sarna 2010).
A hybrid cloud set up is desktop based because it requires regulation of current
resources, integrating both private and public clouds. Hybrid infrastructure can be secured.
Additionally, the usefulness of the cloud could be enhanced to make the operating atmosphere
18
Hybrid Cloud Implementation [Student name, Number]
more efficient. This can only occurs in a perfect scenario where formulation of a dynamic and
flexible condition can be created.
Application Resilience
An application resilience is the ability of a particular application to solve all problems
within its components and still retain itself as the best service provider (Mateescu, Gentzsch, &
Ribbens 2011). DTGOV will need applications that are resilient so as to rapidly continue with
the implementation of the cloud system infrastructure.
Different environments have different failures and security challenges, and therefore it
is important that the resilience the application be tested. Testing for resilience may also provide
ability for check the following;
1. Security and Privacy Issues
DTGOV requires constant maintenance of its security so as to offer excellent services. A
resilient application will help reducing security issues which may frequently arise because of
cybercrimes such as hacking and other nefarious attacks.
2. Scalability
Scalability refers to the potential to respond to fluctuation or responsiveness (Wind
2011). DTGOV needs application resilience that will enable it to cope with changes in their
applications, for example web service maintenance.
3. Business Risk
DTGOV will need a cloud infrastructure that will give the least risk to the organization in
case of failure of the cloud system especially when running updates.
Disaster Recovery and Back up of Applications
19
more efficient. This can only occurs in a perfect scenario where formulation of a dynamic and
flexible condition can be created.
Application Resilience
An application resilience is the ability of a particular application to solve all problems
within its components and still retain itself as the best service provider (Mateescu, Gentzsch, &
Ribbens 2011). DTGOV will need applications that are resilient so as to rapidly continue with
the implementation of the cloud system infrastructure.
Different environments have different failures and security challenges, and therefore it
is important that the resilience the application be tested. Testing for resilience may also provide
ability for check the following;
1. Security and Privacy Issues
DTGOV requires constant maintenance of its security so as to offer excellent services. A
resilient application will help reducing security issues which may frequently arise because of
cybercrimes such as hacking and other nefarious attacks.
2. Scalability
Scalability refers to the potential to respond to fluctuation or responsiveness (Wind
2011). DTGOV needs application resilience that will enable it to cope with changes in their
applications, for example web service maintenance.
3. Business Risk
DTGOV will need a cloud infrastructure that will give the least risk to the organization in
case of failure of the cloud system especially when running updates.
Disaster Recovery and Back up of Applications
19
Hybrid Cloud Implementation [Student name, Number]
Back-up refers to the process of copying and archiving data to allow for restoration of
the original data in case of loss of data. The key aim for backing-up data is to enable its
restoration after an unfortunate deletion or an eventful corruption (Sarna 2010).
DTGOV cloud system will handle massive data within its system. This data may liable for
loss because of accidental deletion or file corruption. It is, therefore prudent that DTGOV to
continuously backs up their data in order to avoid loss permanent loss of data.
Disaster Recovery
Disaster recovery is the procedures and policies that are set in place to allow for
recovery of material information or for its maintenance (Javadi, Abawajy & Buyya 2012). It is,
therefore, prudent for DTGOV to initiate and implement strategies that will provide for disaster
recovery. This coupled with application back-up will allow DTGOV to minimize the risk of losing
important information through hacking, file corruption or deletion.
The measures for disaster recovery that need to be strategized by DTGOV need to be
grouped onto into detective, corrective and preventive.
ADMINISTRATION OF HYBRID CLOUDS AND SLA MANAGEMENT
Remote Server Administration Tools
Remote Administration is the procedural technique of controlling, directing and
computing devices remotely (Chang 2014). This process involves usage of pre-developed
software that is suitable for this process. Such systems are increasingly being used in this
technological age. The software allows control from a remote location, whereby o person
doesn’t have to be near a system in order to use it. .
Sometimes, remote administration can be considered as be legal or illegal e.g. hacking
may actually lead to great harm when attackers may gain entry to a system in order t achieve
their nefarious intents. For example, computer programs are developed by Hackers have
20
Back-up refers to the process of copying and archiving data to allow for restoration of
the original data in case of loss of data. The key aim for backing-up data is to enable its
restoration after an unfortunate deletion or an eventful corruption (Sarna 2010).
DTGOV cloud system will handle massive data within its system. This data may liable for
loss because of accidental deletion or file corruption. It is, therefore prudent that DTGOV to
continuously backs up their data in order to avoid loss permanent loss of data.
Disaster Recovery
Disaster recovery is the procedures and policies that are set in place to allow for
recovery of material information or for its maintenance (Javadi, Abawajy & Buyya 2012). It is,
therefore, prudent for DTGOV to initiate and implement strategies that will provide for disaster
recovery. This coupled with application back-up will allow DTGOV to minimize the risk of losing
important information through hacking, file corruption or deletion.
The measures for disaster recovery that need to be strategized by DTGOV need to be
grouped onto into detective, corrective and preventive.
ADMINISTRATION OF HYBRID CLOUDS AND SLA MANAGEMENT
Remote Server Administration Tools
Remote Administration is the procedural technique of controlling, directing and
computing devices remotely (Chang 2014). This process involves usage of pre-developed
software that is suitable for this process. Such systems are increasingly being used in this
technological age. The software allows control from a remote location, whereby o person
doesn’t have to be near a system in order to use it. .
Sometimes, remote administration can be considered as be legal or illegal e.g. hacking
may actually lead to great harm when attackers may gain entry to a system in order t achieve
their nefarious intents. For example, computer programs are developed by Hackers have
20
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Hybrid Cloud Implementation [Student name, Number]
developed hacking systems that are able to take control of a person’s computer and bar all
other users from accessing it. Hacking therefore becomes a serious problem to remote
administration and DTGOV needs to take this into consideration as a security risk as they
implement their cloud infrastructure.
More especially, this has been the requirement because the Windows 8 Server is
incorporating a number of management consoles that re relatively new. Additionally, the server
has adopted new command line tools.
Requirements of resource management:
By using cloud managers, resources in the cloud can be effectively managed. It will also
help to avoid replication of information in the hybrid storage. (Garrison, Kim & Wakefield
2012).
Requirements for a remote administration:
1. Internet
For remote control to take place, internet connection is needed. The systems that are
to be operated remotely must be connected to the internet and their physical addresses.
2. Server Software
Remote operation is intended to allow for good-willed administration (Mell & Grance
2009). So as to enable this, server software has to be enabled on the host system or server. This
will allow access of the host system from another system using the installed software.
Requirements for Resource Management and SLA Management
In organizational studies, resource management refers to the efficient and effective
development of the resources when needed (Chandran & Kempegowda 2010). These may
include IT, financing or production resources and human skills.
21
developed hacking systems that are able to take control of a person’s computer and bar all
other users from accessing it. Hacking therefore becomes a serious problem to remote
administration and DTGOV needs to take this into consideration as a security risk as they
implement their cloud infrastructure.
More especially, this has been the requirement because the Windows 8 Server is
incorporating a number of management consoles that re relatively new. Additionally, the server
has adopted new command line tools.
Requirements of resource management:
By using cloud managers, resources in the cloud can be effectively managed. It will also
help to avoid replication of information in the hybrid storage. (Garrison, Kim & Wakefield
2012).
Requirements for a remote administration:
1. Internet
For remote control to take place, internet connection is needed. The systems that are
to be operated remotely must be connected to the internet and their physical addresses.
2. Server Software
Remote operation is intended to allow for good-willed administration (Mell & Grance
2009). So as to enable this, server software has to be enabled on the host system or server. This
will allow access of the host system from another system using the installed software.
Requirements for Resource Management and SLA Management
In organizational studies, resource management refers to the efficient and effective
development of the resources when needed (Chandran & Kempegowda 2010). These may
include IT, financing or production resources and human skills.
21
Hybrid Cloud Implementation [Student name, Number]
Resource Management Software
These includes the instructions and all tools for automation and aiding in allocation of
resources. This helps organizations to know the number of employees that have the required
skills. This may also help the organization in ensuring that the workforce is distributed to
various project handlers in the organization. While a hybrid cloud model may offer extensible
and a good opportunity for organizations to expand the services they offer, their
implementation should be based on prior research on how the computing resources are
needed, basing this on statistics on on-premises applications. So as to plan for the needed
capacity in case of cloud bursting, essential to understand when the workload may occur.
Resource Leveling
This is a technique whose aim is to reduce shortage and excessiveness of inventories (Li
et al 2012). It also helps in smoothening resources at hand. The main objective of resource
management is ensuring that there is effective utilization of the available workforce and
resources within the organization.
SLA Management
Shifting of services to the cloud has a number of numerous challenges. Most of these
are direct changes to the SLA standards. In the past, IT groups have always controlled their
assets and this has usually been can characterized by their SLAs based on the abilities of their
domains. The presentation of the open cloud may separate conventional boundaries of data
center (Zhang, Cheng & Boutaba 2010). Furthermore, since the hybrid cloud contains on-
premises and cloud assets, SLAs require that IT setups be covered up.
Service Level Agreement (SLA) is basically the contract between the user and the service
provider which defines the standards and the services that the end user may expect the service
provider to give. They SLA specifically defines the services that the customer will receive from
the service provider. SLA can either be from an internal or external provider. For example, the
22
Resource Management Software
These includes the instructions and all tools for automation and aiding in allocation of
resources. This helps organizations to know the number of employees that have the required
skills. This may also help the organization in ensuring that the workforce is distributed to
various project handlers in the organization. While a hybrid cloud model may offer extensible
and a good opportunity for organizations to expand the services they offer, their
implementation should be based on prior research on how the computing resources are
needed, basing this on statistics on on-premises applications. So as to plan for the needed
capacity in case of cloud bursting, essential to understand when the workload may occur.
Resource Leveling
This is a technique whose aim is to reduce shortage and excessiveness of inventories (Li
et al 2012). It also helps in smoothening resources at hand. The main objective of resource
management is ensuring that there is effective utilization of the available workforce and
resources within the organization.
SLA Management
Shifting of services to the cloud has a number of numerous challenges. Most of these
are direct changes to the SLA standards. In the past, IT groups have always controlled their
assets and this has usually been can characterized by their SLAs based on the abilities of their
domains. The presentation of the open cloud may separate conventional boundaries of data
center (Zhang, Cheng & Boutaba 2010). Furthermore, since the hybrid cloud contains on-
premises and cloud assets, SLAs require that IT setups be covered up.
Service Level Agreement (SLA) is basically the contract between the user and the service
provider which defines the standards and the services that the end user may expect the service
provider to give. They SLA specifically defines the services that the customer will receive from
the service provider. SLA can either be from an internal or external provider. For example, the
22
Hybrid Cloud Implementation [Student name, Number]
Internet Service Provider (ISP) provides a SLA which is a good representation of a SLA from an
external provider (Lu 2014).
Earl’s Guidelines
These are the Service Level Agreement (SLA) standards that are globally acceptable
recommendable. Some of these standards that can be deployed in DTGOV include;
1. Neutrality to Technological changes.
Neutralization in technology is important. Cloud computing services should be flexible
and extensible. An SLA therefore needs to be flexible and have ability to move within all extents
of technological development (Leavitt 2013). This is clearly outlined in the neutrality of
technology standard. DTGOV should implement only SLA’s that can be easily neutralized
according to changes in technology. DTGOV should provide SLA’s that show flexibility especially
when a change in technology is required.
2. Applicability
These guidelines stipulate that SLA’s should internationally applicable. For example,
Internet service is a channel that allows communication for global communication. It is also
built on international standards. Cloud services also have audience globally that ranges from
small businesses to NGO’s. DTGOV should provide cloud computing services taking into
consideration both national and local legislations, standards and policies that are internationally
applicable and acceptable.
3. Conformance
Earl’s guidelines hold that SLA’s for business models should be neutral (Babaoglu,
Marzolla & Tamburini 2012). The provision further holds that SLA’s for the cloud are required
to be neutral when it comes to a given concept. The Cloud Service providers need to fully
23
Internet Service Provider (ISP) provides a SLA which is a good representation of a SLA from an
external provider (Lu 2014).
Earl’s Guidelines
These are the Service Level Agreement (SLA) standards that are globally acceptable
recommendable. Some of these standards that can be deployed in DTGOV include;
1. Neutrality to Technological changes.
Neutralization in technology is important. Cloud computing services should be flexible
and extensible. An SLA therefore needs to be flexible and have ability to move within all extents
of technological development (Leavitt 2013). This is clearly outlined in the neutrality of
technology standard. DTGOV should implement only SLA’s that can be easily neutralized
according to changes in technology. DTGOV should provide SLA’s that show flexibility especially
when a change in technology is required.
2. Applicability
These guidelines stipulate that SLA’s should internationally applicable. For example,
Internet service is a channel that allows communication for global communication. It is also
built on international standards. Cloud services also have audience globally that ranges from
small businesses to NGO’s. DTGOV should provide cloud computing services taking into
consideration both national and local legislations, standards and policies that are internationally
applicable and acceptable.
3. Conformance
Earl’s guidelines hold that SLA’s for business models should be neutral (Babaoglu,
Marzolla & Tamburini 2012). The provision further holds that SLA’s for the cloud are required
to be neutral when it comes to a given concept. The Cloud Service providers need to fully
23
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Hybrid Cloud Implementation [Student name, Number]
document their strategies towards achieving their goals. DTGOV should therefore clearly
document their SLA and their Service Level Objectives (SLO)
4. Informative SLA
Standards recommendations provide that cloud service SLAs should be more
informative, apart from just providing the structure. They should instead clearly illustrate and
specify the concepts that should be addressed. Apart from the structure, material information
on the SLA should also be provided (Goyal 2014).
DTGOV should provide detailed SLA information based on cloud service provisions.
Hence, they will conform to the required standards for giving a SLA that is informative.
Steps included in plan
The common point over the DTGOV needs to be run. This is to provide for rapid scaling
and deployment of the cloud model very fast. DTGOV cloud will provide many advantages that
are beneficial, and must be of such a nature as to allow for data integrity, scalability, and
affordable pricing so as to efficiently run the current SharePoint workloads.
The important issues that will be checked include:
Confirmation of the appropriate route table entries for KMS access should be done.
i. The DTGOV AWS security regulations should be compared with the Windows
firewall rules.
ii. The PV driver version checking is to be done.
iii. The registry key for the “Real-Times-Universal” should be confirmed.
iv. The gateway default settings are to be implemented.
v. Checking for bugs the mini dump file should be done.
Conclusion:
24
document their strategies towards achieving their goals. DTGOV should therefore clearly
document their SLA and their Service Level Objectives (SLO)
4. Informative SLA
Standards recommendations provide that cloud service SLAs should be more
informative, apart from just providing the structure. They should instead clearly illustrate and
specify the concepts that should be addressed. Apart from the structure, material information
on the SLA should also be provided (Goyal 2014).
DTGOV should provide detailed SLA information based on cloud service provisions.
Hence, they will conform to the required standards for giving a SLA that is informative.
Steps included in plan
The common point over the DTGOV needs to be run. This is to provide for rapid scaling
and deployment of the cloud model very fast. DTGOV cloud will provide many advantages that
are beneficial, and must be of such a nature as to allow for data integrity, scalability, and
affordable pricing so as to efficiently run the current SharePoint workloads.
The important issues that will be checked include:
Confirmation of the appropriate route table entries for KMS access should be done.
i. The DTGOV AWS security regulations should be compared with the Windows
firewall rules.
ii. The PV driver version checking is to be done.
iii. The registry key for the “Real-Times-Universal” should be confirmed.
iv. The gateway default settings are to be implemented.
v. Checking for bugs the mini dump file should be done.
Conclusion:
24
Hybrid Cloud Implementation [Student name, Number]
Cloud computing has been a key the goal for the stakeholders of DTGOV. Yet, due to the
prevailing security risks, the company has been reluctant to transfer their services to the cloud.
Fortunately, apart from the basic innovation of cloud administrations, new models for cloud
computing are arising and are offering a dependable footing for many businesses. Hybrid cloud
is one of the cloud computing innovations that has positively impacted on businesses that rely
on cloud computing. The decision to shift services to the cloud using a hybrid cloud
infrastructure is the most successful venture for DTGOV. Hybrid cloud model is most
appropriate for DTGOV since it has a big concern over privacy issues and particular physical
demands. In spite of the obvious risks that are associated with a hybrid cloud modl, permission
of access from an open cloud is still uncertain.
In summary, hybrid cloud model will enable businesses to use its abilities to carry out
their businesses more conveniently and efficiently while economically stabilizing themselves.
For DTGOV especially, adoption of a cloud service model will increase its adaptability in carrying
out its business operations while maintaining the quality of the services they offer to their
users. However, there are a number of factors that must be successfully implemented so as to
achieve the overall success of the DTGOV board’s strategy. These include: remote
administration, resource management, application resilience, disaster recovery, data backup
and a number of others that have been considered. The will result to opening positive
opportunities that will lead to customer satisfaction in relation to services provided along with
resources. There are many risks that are associated with this strategy, which include cyber
security risks, resource risks, technical risks, and quality risks.
25
Cloud computing has been a key the goal for the stakeholders of DTGOV. Yet, due to the
prevailing security risks, the company has been reluctant to transfer their services to the cloud.
Fortunately, apart from the basic innovation of cloud administrations, new models for cloud
computing are arising and are offering a dependable footing for many businesses. Hybrid cloud
is one of the cloud computing innovations that has positively impacted on businesses that rely
on cloud computing. The decision to shift services to the cloud using a hybrid cloud
infrastructure is the most successful venture for DTGOV. Hybrid cloud model is most
appropriate for DTGOV since it has a big concern over privacy issues and particular physical
demands. In spite of the obvious risks that are associated with a hybrid cloud modl, permission
of access from an open cloud is still uncertain.
In summary, hybrid cloud model will enable businesses to use its abilities to carry out
their businesses more conveniently and efficiently while economically stabilizing themselves.
For DTGOV especially, adoption of a cloud service model will increase its adaptability in carrying
out its business operations while maintaining the quality of the services they offer to their
users. However, there are a number of factors that must be successfully implemented so as to
achieve the overall success of the DTGOV board’s strategy. These include: remote
administration, resource management, application resilience, disaster recovery, data backup
and a number of others that have been considered. The will result to opening positive
opportunities that will lead to customer satisfaction in relation to services provided along with
resources. There are many risks that are associated with this strategy, which include cyber
security risks, resource risks, technical risks, and quality risks.
25
Hybrid Cloud Implementation [Student name, Number]
REFERENCES
Babaoglu, O., Marzolla, M., & Tamburini, M. (2012, March). Design and implementation of a
P2P Cloud system. In Proceedings of the 27th Annual ACM Symposium on Applied
Computing (pp. 412-417). ACM.
26
REFERENCES
Babaoglu, O., Marzolla, M., & Tamburini, M. (2012, March). Design and implementation of a
P2P Cloud system. In Proceedings of the 27th Annual ACM Symposium on Applied
Computing (pp. 412-417). ACM.
26
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Hybrid Cloud Implementation [Student name, Number]
Chandran, D., & Kempegowda, S. (2010, December). Hybrid E-learning platform based on cloud
architecture model: A proposal. In 2010 International Conference on Signal and Image
Processing (pp. 534-537). IEEE.
Chang, D. W. S., Patra, A., Epstein, J. A., Puthiyaparambil, A., Debroy, D., & Civilini, M. (2014).
U.S. Patent Application No. 14/058,041.
Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards & Interfaces,
38, 72-77.
Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud computing.
Communications of the ACM, 55(9), 62-68.
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical review.
International Journal of Computer Network and Information Security, 6(3), 20.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In
2012 International Conference on Computing, Electronics and Electrical Technologies
(ICCEET) (pp. 877-880). IEEE.
Javadi, B., Abawajy, J., & Buyya, R. (2012). Failure-aware resource provisioning for hybrid Cloud
infrastructure. Journal of parallel and distributed computing, 72(10), 1318-1331.
Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud
computing. Wiley Publishing.
Leavitt, N. (2013). Hybrid clouds move to the forefront. Computer, (5), 15-18
Li, S., Xu, L., Wang, X., & Wang, J. (2012). Integration of hybrid wireless networks in cloud
services oriented enterprise information systems. Enterprise Information Systems, 6(2),
165-187.
27
Chandran, D., & Kempegowda, S. (2010, December). Hybrid E-learning platform based on cloud
architecture model: A proposal. In 2010 International Conference on Signal and Image
Processing (pp. 534-537). IEEE.
Chang, D. W. S., Patra, A., Epstein, J. A., Puthiyaparambil, A., Debroy, D., & Civilini, M. (2014).
U.S. Patent Application No. 14/058,041.
Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards & Interfaces,
38, 72-77.
Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud computing.
Communications of the ACM, 55(9), 62-68.
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical review.
International Journal of Computer Network and Information Security, 6(3), 20.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In
2012 International Conference on Computing, Electronics and Electrical Technologies
(ICCEET) (pp. 877-880). IEEE.
Javadi, B., Abawajy, J., & Buyya, R. (2012). Failure-aware resource provisioning for hybrid Cloud
infrastructure. Journal of parallel and distributed computing, 72(10), 1318-1331.
Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud
computing. Wiley Publishing.
Leavitt, N. (2013). Hybrid clouds move to the forefront. Computer, (5), 15-18
Li, S., Xu, L., Wang, X., & Wang, J. (2012). Integration of hybrid wireless networks in cloud
services oriented enterprise information systems. Enterprise Information Systems, 6(2),
165-187.
27
Hybrid Cloud Implementation [Student name, Number]
Lu, Y., Xu, X., & Xu, J. (2014). Development of a hybrid manufacturing cloud. Journal of
Manufacturing Systems, 33(4), 551-566.
Mateescu, G., Gentzsch, W., & Ribbens, C. J. (2011). Hybrid computing—where HPC meets grid
and cloud computing. Future Generation Computer Systems, 27(5), 440-453.
Mell, P., & Grance, T. (2009). Effectively and securely using the cloud computing paradigm.
NIST, Information Technology Laboratory, 2(8), 304-311.
Peng, J., Zhang, X., Lei, Z., Zhang, B., Zhang, W., & Li, Q. (2009, December). Comparison of
several cloud computing platforms. In 2009 Second international symposium on
information science and engineering (pp. 23-27). IEEE.
Qiu, J., Ekanayake, J., Gunarathne, T., Choi, J. Y., Bae, S. H., Li, H., ... & Hughes, A. (2010,
December). Hybrid cloud and cluster computing paradigms for life science applications.
In BMC bioinformatics (Vol. 11, No. 12, p. S3). BioMed Central.
Sarna, D. E. (2010). Implementing and developing cloud computing applications. Auerbach
Publications.
Sinn, R. (2014). U.S. Patent No. 8,789,157. Washington, DC: U.S. Patent and Trademark Office.
Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure
management in private and hybrid clouds. IEEE Internet computing, 13(5), 14-22.
Sutton-Grier, A. E., Wowk, K., & Bamford, H. (2015). Future of our coasts: The potential for
natural and hybrid infrastructure to enhance the resilience of our coastal communities,
economies and ecosystems. Environmental Science & Policy, 51, 137-148.
Talia, D. (2011, July). Cloud Computing and Software Agents: Towards Cloud Intelligent Services.
In WOA (Vol. 11, pp. 2-6).
28
Lu, Y., Xu, X., & Xu, J. (2014). Development of a hybrid manufacturing cloud. Journal of
Manufacturing Systems, 33(4), 551-566.
Mateescu, G., Gentzsch, W., & Ribbens, C. J. (2011). Hybrid computing—where HPC meets grid
and cloud computing. Future Generation Computer Systems, 27(5), 440-453.
Mell, P., & Grance, T. (2009). Effectively and securely using the cloud computing paradigm.
NIST, Information Technology Laboratory, 2(8), 304-311.
Peng, J., Zhang, X., Lei, Z., Zhang, B., Zhang, W., & Li, Q. (2009, December). Comparison of
several cloud computing platforms. In 2009 Second international symposium on
information science and engineering (pp. 23-27). IEEE.
Qiu, J., Ekanayake, J., Gunarathne, T., Choi, J. Y., Bae, S. H., Li, H., ... & Hughes, A. (2010,
December). Hybrid cloud and cluster computing paradigms for life science applications.
In BMC bioinformatics (Vol. 11, No. 12, p. S3). BioMed Central.
Sarna, D. E. (2010). Implementing and developing cloud computing applications. Auerbach
Publications.
Sinn, R. (2014). U.S. Patent No. 8,789,157. Washington, DC: U.S. Patent and Trademark Office.
Sotomayor, B., Montero, R. S., Llorente, I. M., & Foster, I. (2009). Virtual infrastructure
management in private and hybrid clouds. IEEE Internet computing, 13(5), 14-22.
Sutton-Grier, A. E., Wowk, K., & Bamford, H. (2015). Future of our coasts: The potential for
natural and hybrid infrastructure to enhance the resilience of our coastal communities,
economies and ecosystems. Environmental Science & Policy, 51, 137-148.
Talia, D. (2011, July). Cloud Computing and Software Agents: Towards Cloud Intelligent Services.
In WOA (Vol. 11, pp. 2-6).
28
Hybrid Cloud Implementation [Student name, Number]
Vecchiola, C., Calheiros, R. N., Karunamoorthy, D., & Buyya, R. (2012). Deadline-driven
provisioning of resources for scientific applications in hybrid clouds with Aneka. Future
Generation Computer Systems, 28(1), 58-65.
Wind, S. (2011, September). Open source cloud computing management platforms:
Introduction, comparison, and recommendations for implementation. In 2011 IEEE
Conference on Open Systems (pp. 175-179). IEEE.
Zhang, H., Jiang, G., Yoshihira, K., Chen, H., & Saxena, A. (2009, July). Intelligent workload
factoring for a hybrid cloud computing model. In 2009 Congress on Services-I (pp. 701-
708). IEEE.
Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research
challenges. Journal of internet services and applications, 1(1), 7-18.
29
Vecchiola, C., Calheiros, R. N., Karunamoorthy, D., & Buyya, R. (2012). Deadline-driven
provisioning of resources for scientific applications in hybrid clouds with Aneka. Future
Generation Computer Systems, 28(1), 58-65.
Wind, S. (2011, September). Open source cloud computing management platforms:
Introduction, comparison, and recommendations for implementation. In 2011 IEEE
Conference on Open Systems (pp. 175-179). IEEE.
Zhang, H., Jiang, G., Yoshihira, K., Chen, H., & Saxena, A. (2009, July). Intelligent workload
factoring for a hybrid cloud computing model. In 2009 Congress on Services-I (pp. 701-
708). IEEE.
Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research
challenges. Journal of internet services and applications, 1(1), 7-18.
29
1 out of 31
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.