logo

Security Management and Migration: Assignment

31 Pages6909 Words100 Views
   

Added on  2021-06-16

Security Management and Migration: Assignment

   Added on 2021-06-16

ShareRelated Documents
Security Management and MigrationAssignment-4Name:Register Number:
Security Management and Migration: Assignment_1
Table of Contents1.Introduction............................................................................................................................................................12.Required Cloud Architecture...................................................................................................................................12.1Description of Architectures and Reason for Deploying.......................................................................................12.2Benefits and Issues related to Deployment...........................................................................................................73.Risk Assessment......................................................................................................................................................94.Information Security Assessment...........................................................................................................................155.Changes to BCP.....................................................................................................................................................156.Hybrid Cloud Administration and SLA Management............................................................................................177.SharePoint Migration Planning.............................................................................................................................197.1Migration Plan..................................................................................................................................................197.2Migration Plan’s Critical Points and Issues.......................................................................................................228.Conclusion.............................................................................................................................................................23References......................................................................................................................................................................24
Security Management and Migration: Assignment_2
1.IntroductionThe Company named Regional Gardens Ltd., is considered in this report for which astrategic proposal is required to meet the business requirement. It is a company which runsvarious gardening enterprises. It wishes to improve its current ICT infrastructure, with respect todata storage, monitoring, data flexibility and responsiveness. It looks forward to have a newmanageable cloud based infrastructure. The objective of this report is to provide a specific cloud computing architecture formeeting the business needs, where various cloud computing architectures will be compared andevaluated. The ICT risk management for the cloud computing delivery plan will be represented.The Information Security assessment will be carried out. Migration plan, its critical points andissues will be discussed. 2.Required Cloud ArchitectureThe cloud computing environment helps the grid computing to provide physical andvirtual servers for running the grid applications, which carry out various small tasks (Rouse,2018). The cloud computing requires management like, changing requests, provisioning,reimaging, deprovisioning, monitoring and rebalancing of workload. The cloud computingsystem is divided into front-end and back-end, which are connected with the help of a networki.e., internet. There is a central server which administers the system, by managing tasking like,demands of the clients and traffic monitoring and ensuring everything works smoothly (Sareen,2013).For assisting the Regional Gardens for meeting the Board’s strategy, I would employHybrid Cloud Architecture.2.1Description of Architectures and Reason for Deploying For a cloud based solution, the Cloud Computing Architecture is used which contains onpremise and cloud resources. It ensures to facilitate communication between the stakeholders,and related to high-level design early decisions are documented and can help to reuse thecomponents of the design ("Cloud Computing Architecture", 2010).Today, all the organizations are adopting Hybrid cloud architecture for maintainingcontrol on the privately managed internal cloud, while depending on the public cloud as required(Waite, 2017). 1
Security Management and Migration: Assignment_3
The microservices ensures that the applications become highly resilient, agile andscalable (Ajluni, 2016). The Hybrid cloud architecture shares both the private and public cloud’s resources. Thisarchitecture is an integration of on-premises resources with cloud resources, as shown in thebelow figure. Figure: Hybrid Cloud Topology ("Hybrid Cloud", 2018)2
Security Management and Migration: Assignment_4
Figure: Colocation strategy of Hybrid cloud ("Why a Hybrid Cloud/Colocation Strategy Is Hereto Stay", 2017)Many organizations who have on-premises technology investments, must operate in ahybrid architecture. This is important for adopting the cloud. However, the migrating legacy ITsystems takes time. Thus, it is important to choose a trusted cloud provider, for implementing athoughtful hybrid strategy with less investment on new on-premises hardware and software(Saran, 2018). This helps to simplify the operations and ensures to easily achieve the goals of thebusiness. When it comes to AWS’s close working relation with the enterprises, it has developedthe industry’s broadest set of hybrid capabilities in terms of storage, networking, security,application deployment, and management tools, for easy integration with the cloud ("HybridCloud Architectures", 2018). This acts as a seamless and secure extension the presentinvestments.3
Security Management and Migration: Assignment_5
Figure: Hybrid Cloud Architectures (Gracely, Finos & Floyer, 2015)5 main considerations considered for the IT organizations while evaluating organization’sfuture application are presented below (Gracely, Finos & Floyer, 2015):a)Do Nothing: Certain applications are industry-specific or are delivered on a hardwareappliance, which don’t make sense to change, because of software licensing, or have noidea how it is supported by the application.b)Optimization: According to the perspective of software, most of the existing applicationswon’t be changed, but the IT organizations surely will try to optimize the environmentaround the applications.c)Augmentation: According to the market evolution related to, IoT technologies, Big Dataand Mobile various firms are in search of methods for augmenting their Systems torecord with the new applications which just are designed keeping the engagement modelsof new customer in mind. Thus, it is one of the reason that the companies are actively4
Security Management and Migration: Assignment_6
researching on the Cloud Native applications. Most of the firms are employing the in-house developers for building such applications, because these applications can bringnew change for the business. Moreover, augmentation is a section where the companiescreate integrations between SaaS applications and their in-house Systems of Record, togain the opportunities for effectively aligning the application development team and theoperations team. d)Migrate to Cloud: Despite the IT leaders understanding on the importance of CloudComputing, still evaluation exists on whether it makes sense to migrate the applicationsto a Private Cloud or a Public Cloud. On the other hand, with the growth of Public Cloud,most of the IT organizations are still evolving their Cloud Computing skills. For a PrivateCloud, the migrating applications permits the IT organizations to maintain the presentperformance including the characteristics of security, during local access to theapplication data. However, it is proved that such migrations are highly cost effective. ThePrivate Cloud projects concentrate to deliver automated infrastructure and services whichimitates what could be taken from the Public Clouds like, AWS or Azure. Figure: Public Cloud’s Strengths and Weaknessese)Replacing: Since 15 years, the companies utilize technology for increasing their businessand productivity of employees. But, as time passes the technologies loses its effectivenessfor the business. This increases the company’s interest to replace their previous5
Security Management and Migration: Assignment_7
investment with SaaS equivalents. The applications relate to the following functions andprocesses like, Email, Collaboration, call-center management, Human Resources and,Sales and Marketing.The last consideration decides the application’s future portability, for most of the IT architects.Figure: Hybrid Cloud bridge ("Practical Guide to Hybrid Cloud Computing", 2016)6
Security Management and Migration: Assignment_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Business continuity plan Assignment PDF
|10
|2217
|80

Regional Gardens Cloud Architectures: A Survey
|35
|7774
|328

Hybrid Cloud Strategy Assignment
|14
|3015
|73

The Regional Garden Company
|30
|7288
|345

Cloud Computing: Selection of Cloud Architectures for a Hybrid Cloud
|26
|7544
|430

Cloud Computing for Regional Gardens: Benefits, Risks and Mitigation Strategies
|20
|4796
|398