University Name: Hybrid Cloud Computing Architecture Report

Verified

Added on  2021/06/17

|30
|7288
|345
Report
AI Summary
This report provides a comprehensive analysis of hybrid cloud computing for a regional gardening company. It begins with an executive summary outlining the company's operations and the report's objectives. The core of the report explores proposed architectures for a hybrid cloud, including workload distribution and resource pooling. It then delves into the benefits and issues associated with Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) models. A significant portion of the report is dedicated to a risk assessment for hybrid cloud and microservices, detailing potential risks such as lack of ownership, poor SLA definitions, data compliance issues, and security vulnerabilities, along with proposed preventive actions and contingency plans. The report further outlines proposed information security controls, BCP changes, hybrid cloud administration, SLA management strategies, and SharePoint migration planning. The analysis concludes with a discussion of critical points and key issues, supported by relevant references, providing a complete guide to hybrid cloud implementation.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Hybrid Cloud
Hybrid Cloud
Unit Code
Unit Name
University Name
1
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Hybrid Cloud
Executive Summary
The regional garden company runs a number of gardening related activities. It has a very large
display of garden products and services that open once a year for public viewing. These
initiatives include the company’s Nursery, which supplies plants and gardens for the public, as
well as Regional Gardening planners providing gardening advice and consultancy. This report
includes the capability of various cloud computing architectures, as required by a set of
professional requirements to determine eligibility for cloud computing delivery models. There is
also a highlight in this report about the government and security requirements framework for
planning the ICT risk management for cloud computing and for the cloud computing distribution
plan. Finally, business requirements are also considered in this report to plan for the migration of
cloud model.
Document Page
Hybrid Cloud
Contents
Proposed Architectures for a Hybrid Cloud....................................................................................2
PaaS.................................................................................................................................................3
IaaS..................................................................................................................................................3
Benefits and issues of PaaS.............................................................................................................4
Benefits and issues of IaaS..............................................................................................................5
Risk report for Hybrid Cloud and Microservices............................................................................5
Proposed Information Security controls..........................................................................................8
BCP Changes.................................................................................................................................10
Hybrid Cloud Administration and SLA Management...................................................................14
SharePoint Migration Planning......................................................................................................18
Critical Points and Key issues.......................................................................................................20
References......................................................................................................................................22
Document Page
Hybrid Cloud
Proposed Architectures for a Hybrid Cloud
Workload Distribution Architecture
Load balancer
Cloud service
customers
Cloud service A
Cloud
service A
Virtual server
A
Virtual server
A
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Hybrid Cloud
Workload Distribution & Resource Pooling Architectures
The Cloud architects should implement some concepts or best practice to create extremely
scalable applications. This concept is very critical because of continuous expansions of data sets,
unpredictable traffic pattern, as well as the need for earlier response time. The 2 common basic
cloud planning models are workload distribution architecture moreover resource pool
architecture.
Workload distributional architecture
The workload distribution architectures use information technology assets that may scale out by
using one or more of the same IT resource. This is accomplished using load balancers that
provide run-time logic that evenly distributes workload between available information
technology resources. These models may be apply to several IT assets as well as is usually
utilized with it; the distributed effective server, the cloud storage gadgets furthermore cloud
service. Additionally to the load balancer or the aforementioned assets, all these mechanisms
may be an element of these models:
1) Cloud Usage Monitor may perform data processing and runtime tracking
2) Audit monitors use to monitor system can need to meet statutory necessities
3) The Hypervisor for managing workloads and virtual hosts those need to be distributed
4) Separating the logical network boundaries of the cloud customer network boundary
5) Asset clusters that are usually utilized to support the workload balancing between cluster
nodes
6) The assets replication to generate fresh virtual resource instance under the improved
workloads
Document Page
Hybrid Cloud
Resource Pool Architecture
The resource pool architectures are also based on grouping the same IT assets into teams. Pools
may be virtual and physical resources. This same resource is automatically teamed as well as
maintained by system to ensure they stay in sync. A sample resource pool is as follows: A
physical server pool that contains network server that has an operating system or the other
needed applications available for immediate use.
The virtual server pool is usually configured based on the customer's pre-selected template.
A storage pool consisting of files and block-based storage container.
The networks pool of unusual pre-configured networks devices. Examples; the Virtual
firewall as well as switches for superfluous connection, the load balancing, or link aggregation.
CPU assets are allocated to the virtual server's CPU pool.
It can be used to vertically adjust the physical RAM pool of a newly provisioned physical
server.
Sharing the same IT assets for extensibility may error-prone or there is an issue that makes them
totally synchronize on a continuous basis. Solution to these issues is to utilize automatic
synchronization systems to team the same IT assets into the pool or keep them synchronized. The
following is an example of how a company can use a resource pool in the business using the
Memory PoolCPU Pool Storage pool Network pool
Document Page
Hybrid Cloud
examples in Cloud web Pattern. The asset pool architecture may be used to scale the system
vertically and horizontally, depends on how pool is organized. For Example; If the workload
increase or more CPU, as well as RAM assets, are also required, CPU moreover RAM resource
pools may be used to scale information technology resources (for example virtual servers)
vertically. The virtual servers may extract these assets from RAM and CPU asset pools.
The IT resources may scale out by adding one and more of the same IT assets. The load
balancers also provide run-time logic to consistently distribute workload across the existing IT
assets. Resulting workload’s distribution architecture also reduces the overuse and
underutilization of IT resources to the extent that they rely on the complexity of load balancing
algorithm along with runtime logic. This infrastructure model may be applied to several IT asset,
usually distributed virtual servers, the cloud storage device or the cloud services to support
workload distribution.
Resource pool
The resource pool architecture is based on utilization of single or the more asset pools where the
same IT assets are grouped furthermore also maintained by the system and the system
automatically make sure that they are synchronized.
Here is a general example of an asset pool:
After the resource pool is defined, several instances of information technology assets
from every pool may be formed to provide a pool of "real-time" IT assets.
Maybe advantages and problems of deployment results
Cloud systems need methods that can dynamically scale or shrink IT resources based on demand,
or have a mechanism that can provide redundancy moreover ease of managing IT assets. The
WDA provides the method to distribute workloads among various copies of information
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Hybrid Cloud
technology resources, moreover resource pools provide the way to automatically synchronize IT
asset by using resource pools and provide an on-demand dynamic allocation method of
resources. In short, they may be used to design as well as execute complex architecture to
automatically scale IT resources as workloads increase and decrease, and provide simultaneous
IT resources, provide system redundancy, balance the load among resources, and manage and
audit IT resources.
Benefits
Cost: Here, no calculations or hardware resources are waiting for the balance sheet. Depreciation
and monthly inspection system usage do not exist.
Scale: "Flexibility and resiliency": It can be transferred from the private network to the public
network in order to test the latest applications.
Issues:
1. There is no control over virtual machine processor data is not processed, it is a large security
risk because Regional Gardens Ltd does not know what is actually happening to organization’s
data (Jamshidi, Ahmad & Pahl, 2013).
2. There is no control on the platform according to the cloud offerings
3. The platform is usually a shared platform, such as other customers also running diverse
websites on a similar IIS platform.
Risk report for Hybrid Cloud and Microservices
Risk Description Likelihood Impact Priority Preventive Actions Contingency Plans
Document Page
Hybrid Cloud
Lack of ownership High Low Very High Improved security firewall network
Differentiate the level of security entrance on both the clouds Backup is on
Restrict private data with certified employees
Poorly defined SLA Medium Low Medium Bandwidth must be precise for public cloud
as well as for private cloud.
A separate server must be installed properly. Without the proper basic structure setting, it can
not move to a higher level
Data Compliance High High Low Understand all regulatory compliance laws.
Apart from this, configure the security policy (Nevil.S & C.J, 2016). It is necessary to make
proof of the policy document as well as the parties need to sign it
Security Low High High It is necessary to reduce the intrusion of security tools to
minimize intruder attacks and reducing data redundancy. Considering an urgent situation or
situation which can definitely be measured for high growth
Risks associated AWS hybrid cloud and microservices strategy
Distributed computing gives an essential strategy to get to servers, storing, databases and a wide
course of action of use benefits over the Internet. A Cloud organization arranges, for instance,
Amazon Web Services claims and keeps up the framework related hardware required for these
application organizations, while your course of action and use what you require through a web
application. In a dispersed registering condition, new IT resources are simply ever a tick away,
which suggests association diminish the time it takes to make those benefits available to
Regional Graden's designers from weeks to minutes.
Document Page
Hybrid Cloud
Lack of ownership: Cloud retailers should fully verify the security of processed data. Once the
cloud is deployed, these activities lose the ability to tell their data sets. Enterprise managers
should know what security standards the client can use to avoid accidents.
Solution: Data ownership and security need verification. Avoid suppliers who cannot provide
reasonable proprietary expectations. Identify vendors in well-organized service-level agreements
that cover hybrid IT companies. Know what data is accessible; Provider provides access to logs
and statistics and all jurisdiction or geographical locations to store data (Manias & Baude, 2012).
Security: Many business administrators are disabled if failing to use authentication, identity
management, and permission processes for private and public clouds. Cloud security protocols
should be integrated (Narasimhan G., 2018).
Solution: Change the control of the two clouds. Synchronize ongoing security data or identity
management services with Regional Gardens Ltd and Cloud Systems. Maintain the latest state of
internal data collection for sensitive data that is not suitable for the public cloud.
Explicit definition of SLA
When regional gardens moved to the cloud, they lost the ability to control the data set, which
forced them to rely on service providers to securely secure the data in the public domain. Work
to synchronize security data or run in two clouds with the System Regional Garden Limited,
which use Identity Management Services (Ahmad, Shanmugam, Idris, Samy & Hasan AlBakri,
2013).
Solution: Access permissions and protection must be explained and there is a clear definition of
security measures in the SLA. This applies only to the expectations and needs of the cloud
service providers. The reasonable expectation of the service is to be clearly explained in detail in
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Hybrid Cloud
the SLA so that if the service is not interrupted or the data is compromised then the customer's
shelter. Before signing a contract, it has been reviewed by an attorney (Linthicum, 2017).
Data compliance: More precedential care of hybrid clouds is needed when compliance is needed.
It is difficult to follow and display with hybrid models because the data is moved back.
Solution: It is necessary to coordinate two clouds. Regional Gardens Ltd do not have to make
sure organization only follow its public cloud provider and private cloud. To handle sensitive
data, two clouds must meet the industry standards for data protection.
Document Page
Hybrid Cloud
Risk report for Hybrid Cloud and Microservices
Risk
Description
Likelihoo
d
Impac
t
Priorit
y
Preventive Actions Contingency
Plans
Lack of
ownership
High Low Very
High
Improved security firewall
network
Differentiate the level of
security entrance on both
the clouds
Backup is on
Restrict private
data with
certified
employees
Poorly
defined
SLA
Medium Low Mediu
m
Bandwidth must be precise
for public cloud as well as
for private cloud.
A separate server must be
installed properly.
Without the
proper basic
structure setting,
it can not move
to a higher level
Data
Complianc
e
High High Low Understand all regulatory
compliance laws.
Apart from this, configure
the security policy (Nevil.S
& C.J, 2016).
It is necessary to
make proof of
the policy
document as well
as the parties
need to sign it
Security Low High High It is necessary to reduce
the intrusion of security
tools to minimize intruder
Considering an
urgent situation
or situation
Document Page
Hybrid Cloud
attacks and reducing data
redundancy.
which can
definitely be
measured for
high growth
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Hybrid Cloud
Proposed Information Security controls
The AWS cloud safeties are the uppermost priority. Because an AWS client, the company will
take advantage of information center as well as network architectures that meet necessities of the
most safety-sensitive organization. The AWS provides a security services and infrastructure, as
Regional Gardens and their customers are also responsible for the protected operating system,
data, and platforms. To make sure a safe international infrastructure, the AWS also configures
components of infrastructure, as well as services, provide and the elements that users may use to
enhance a security, for example, recognize furthermore Access Management (IAM) service,
which may be used to direct user or user permission in a subset of the AWS services.
Resource policies apply to situations where users create resources and want to allow another user
to access these assets. In these models, strategy are directly associated with the asset furthermore
describes who may do it with resource. User is controlling resources. Regional Gardens can give
IAM users explicit accesses to the assets. Root AWS accounts have access to the admin asset
policy and are possessor of the all assets created in those account. Or, they may give user explicit
accesses to direct resource permissions.
Capability procedure is typically used to perform company-wide access policies. The
competency policy is allocated directly or indirectly to the IAM user using the IAM groups.
They may also assign to roles that will assume at runtime. The capability policy defines the
function (operation) that the users are allow and denied to perform. They may also override them
by explicitly rejecting resource-based policy permissions.
• IAM policy may be used to restrict the access to definite source IP addresses range, or access
on specific dates or times and other situation.
Document Page
Hybrid Cloud
• Resource policies moreover feature policies, as well as are cumulative: Effective permissions
for individual users are a combination of resource policies and permission permissions granted
directly or through group membership.
Regional Gardens can use local HSM or Cloud HSM to support various use case moreover
applications for example database encryptions, digital right management (DRM), document
signing, or public key infrastructures (PKI), including authentications as well as authorizations.
Cloud HSM presently uses SafeNet's Luna SA HSM. Luna SA is also designed to meet (FIPS)
140-2 or Common Criteria EAL4+ standard, moreover supports the multiplicity of company-
standard encryptions algorithms.
AWS Multifactor Authentication (MFA) also provides the further stage of security for login
credential. When MFA is enabled, when the user logs in to the AWS websites, they are also
prompted to enter their username or the password and the verification codes from their MFA
devices. Regional Garden’s may ask the user to use MFA to remove the S3 object. We also
recommend that Regional Garden’s activate MFA for Regional Garden’s AWS account as well
as Regional Garden’s IAM user to prevent unauthorized accesses to Regional Garden’s AWS
environments. Presently, the AWS also supports company’s hardware’s MFA devices and virtual
MFA device in a form of the smartphone application. The username for an AWS account is
always an email address. The IAM username allows more flexibility. Regional Garden’s AWS
account password may be anything Regional Garden’s describe. Regional Garden’s can force
IAM client passwords to match the policies that Regional Garden’s describe. To handle access to
the asset, Regional Garden’s may have numerous AWS account such as, to isolate the growth
environments from production environments. But, the users from one account can require
accessing assets in another account, for example promoting updates from expansion environment
Document Page
Hybrid Cloud
to production environment. While users working in 2 accounts can have divide identities in every
account, the managing credential for various accounts may make identity organization difficult.
BCP Changes
The company continuity planning is the procedure of creating a prevention as well as recovery
system to handle the company's potential threats. Any events that may have a negative impact on
operations are including in plan, for example, supply chain disruptions, loss, and damage to
serious infrastructures. Therefore, BCP is a subset of hazard organization. In the United States,
government entity refers to this procedure as the continuity of business plans. The Business
Continuity Plans outlines a series of disaster scenarios and steps taken by the company to restore
normal transactions in any given situation. The early writing of BCP may also include preventive
measures. BCP is usually created with the participation of key employees and stakeholders. It is
a series of accidents that can minimize potential harm to the company in adverse situations.
When the companies are interrupted, it can cost money. The Loss of profits plus extra costs
means less profit. The Insurance do not include all expenses or could not replace those clients
who are deficient in competitions. The company continuity planning’s for continuous company
are critical. Developing company continuity plans involve 4 steps: Conduct company impact
recognizes to identify the time-sensitive and critical company function or procedures or the asset
that supports them. Identify record furthermore execute to restore critical company processes and
functions. Organize company continuity teams or write company continuity plans to run
company disruptions. Train business continuity teams and conduct tests or exercise to evaluate
improvement of plans and strategies. IT includes lots of components for example servers,
networks, laptops and desktops, as well as wireless device. Ability to run workplace productivity
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Hybrid Cloud
furthermore enterprise software’s is very dangerous. Thus, IT recovery strategies must be
developing so that technologies may be recovered in time to meets business requirements.
Manual solution must be the element of information technology plan so that the company may
go on while the PC systems are being restored.
Backup is one of the oldest IT tasks, and most business leaders believe its backup and recovery
strategy is working. However, when an incident occurs, the organization's backup strategy enters
the testing phase, and its success or failure will have a lasting impact on business income, brand
value, flexibility, and individual career. Business IT systems are rapidly changing and backup
and data protection strategies need to be changed to remain consistent (Nehru, Mukherjee &
Noel, 2014). As leaders consider shifting workloads to the cloud, data backup is often the first
place they look, because of economies of scale, the "write once, never write" nature of most
backup data, and the data in the cloud. This is especially true for highly regulated industries
because the retention period of these industries requires that the backups remain recoverable for
many years’ regular audits and tests are performed to ensure recoverability. When operational
recovery is required, the disadvantages of the cloud as a backup repository arise. Bandwidth
consumption, the cost of recalling cloud data, and recovery time are all factors that limit cloud
backup use cases and require some backup data to continue to be stored locally. These new
architectures are the way most organizations use private clouds for backup; long-term storage on
external clouds and the latest data on operational recovery on local private or local storage.
Traditionally, complete disaster recovery solutions are complicated and costly. Primarily,
regional parks have two locations: its primary data center if the primary site fails and an
independent location to support this operation (Katzer, 2013). However, maintaining this type of
environment is expensive. That is why a large number of companies are funded at secondary
Document Page
Hybrid Cloud
sites and there are workers and employees with well-funded IT departments. Eventually, regional
parks need server hardware, bandwidth, storage, and human resources to run different two
locations (Furht & Escalante, 2015). Due to the flexible price of the cloud, due to the pricing
model, disaster recovery is suddenly costly to less effective, because small businesses do not
need much capital investment in physical resources, so small companies can use the cost of their
income-tax budget in an unprecedented way. In addition, instant availability of the built-in
Windows tools such as Hyper-V replication and several SaaS-based applications helps in
removing regional gardens data and managing disaster recovery operations without purchasing
additional license, so that this secondary site is easier as well as in a more affordable way than
ever (Weinman, 2015).
Simplified DR Management
The simplicity of hybrid clouds is one of the major advantages of recovering from disaster.
While working with cloud service providers, vendors take responsibility for establishing,
configuring, and maintaining physical environments (Gilster, 2015). For users, it is equally easy
to switch between the primary and secondary DR sites in the central interface to manage this
double infrastructure. This is a big deal for any organization level. Many companies can benefit
from saving time so that they can focus on their original potential and also create competitive
advantages. Traditionally, complete disaster recovery solutions are complicated and costly
(Höllwarth, 2012).
The ideal backup target
It is not enough to back up only one copy of data. Regional Gardens need a copy, they can visit
the site immediately, and at least one copy will go off-site. Hybrid clouds help Regional Gardens
to guard against data protection strategies by providing secondary backup targets. If Regional
Document Page
Hybrid Cloud
Gardens cannot access other facilities for whatever the reason is the public cloud framework can
be used as a location for offsite backup. Cloud storage is usually cheaper than the traditional
storage, therefore designating it just as a backup target may have a perfect commerce sense for
Regional Gardens.
Resilience
To date, corporate IT efforts to ensure that a solid foundation for business activities has been
made, although admirable, have not yet reached the standard. The staggering economic losses
portray a very painful picture of the realities of American companies today. vCAir products
provide a partial solution to data loss and application availability risks. Once Regional Gardens
have a vCAir connector, Regional Gardens can choose to use VMware Corporation's managed
storage as a backup for the current VDC. Again, this is a pay-as-you-go service that allows
corporate IT departments to abandon the painful behavior of capital expenditures and
management of the infrastructure needed to perform backups and restore applications (requires a
DR subscription to enable this feature). To meet the needs of disaster recovery subscriptions,
Regional Gardens can see that VMware not only provides a backup mechanism, but also
provides a mechanism for operational disaster recovery. Once the subscription is in place, the
configuration behavior is very simple. So is this the ultimate goal of virtual disaster recovery?
1) Not all workloads are virtualized. Regional Gardens still need an existing disaster recovery
solution to complete this task.
2) For compliance and regulatory reasons, not all workloads may leave the company. (No one
looks good in an orange suit).
3) Most CSOs will be conservative around applications that have strict/unique security
requirements.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Hybrid Cloud
4) Some applications RTO / RPO will require significant investment in network infrastructure.
In some cases, the required investment will make the solution cost too high.
5) VMware provides a good solution for most of our virtualized workloads. As the solution
matures (more in-depth automation and richer APIs), I believe this will be the cornerstone of
enterprise IT backup and DR strategies.
Document Page
Hybrid Cloud
Hybrid Cloud Administration and SLA Management
Remote management is defined as a program or method that controls a computing device from a
remote location. This process always needs to use some software that has been developed to
adapt to this process. This software, which allows control from some remote location, is
becoming more and more common in the modern world and is often used worldwide when it is
close to the system so that it is impractical or difficult to use it physically.
However, it is worth noting that remote management may be legal or illegal, such as hacking.
Hackers have developed malicious computer programs such as Trojan horses, which actually
guide users to the real intentions they really need. Hackers have developed a system known as
owned hacking, which actually originated in the early 1990s. Have a computer that involves
rooting or gaining executive power and controlling another person.
Some of the requirements for successful resource management may include:
Resource management software
These are instructions/tools for automating and assisting with the resource allocation process.
This clearly helps the organization to clearly understand and understand the number of
employees with the required skills. This also helps organizations ensure that employees are
assigned to various projects within the organization
2. Resource allocation
This technology aims to reduce the excess shortage and inventory. It also helps smooth the
upcoming resources.
The main goal of resource management is to ensure the maximum utilization of available
resources and labor within the organization. Service Level Agreements (SLAs) refer to the
contracts that exist between service providers and end users (clients). They define the service
Document Page
Hybrid Cloud
standards and levels that end users should expect from service providers. They specifically
define what the customer will get from the service provider. SLAs may come from external or
internal providers. The SLA provided by an Internet Service Provider (ISP) represents a basic
example of an external provider.
Application flexibility: In general, application resiliency is defined as the vitality of an
application to respond to the problems and challenges of its components, and is still the best
service provider. AWS actually needs resilient applications to enable rapid software
implementation through a multi-tier, multi-technology infrastructure.
Multiple technical environments tend to have failures and security issues, so testing the elasticity
of applications is very important. When testing elasticity, it will provide the ability to check the
following:
AWS is also cost-effective, flexible and very simple-to-utilize CC platform. The AWS provides
sets of IS that may be used to deploy the application. To get most out of Regional Garden’s
cloud platforms, we also recommend Regional Garden’s take advantage of AWS' free services
furthermore follow good practices. The organizations that invest time or assets prior to
deployment to assess their operational readiness have higher levels of satisfaction than those that
have not been put to use. In performing this work, the checklist can be a valuable mechanism for
ensuring that applications are consistently and thoroughly evaluated. This list can be used to
evaluate Regional Garden’s application and then start production on AWS. It also includes
typical question asked by the AWS solution architect when seeking guidance to ignore general
defects that are not apparent to the latest user. When every item is checked out with satisfying
positive answers Regional Garden’s may assertively deploy company’s applications to cloud.
The checklist item is intended to encourage proper dialogue on whether a particular service or
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Hybrid Cloud
concept is applicable to a regional garden application or, if therefore, whether it has adequately
resolved. The regional garden must plan to modernize this list as a fresh applications service start
and identify best practices.
For the different reasons, clients use many AWS accounts, including security quarantining or
adding bills and reclaiming granularity. The Consolidated billing account may be used to
aggregates billing for numerous accounts; but, this approaches increase organizational overhead
linked with the organization as well as sharing assets across several accounts. The Combined
billing allows clients to obtain the single bill for several AWS accounts furthermore potentially
reduce the costs by aggregate utilize of this account. The Invoice billings allow AWS clients to
obtain their AWS bill through invoice instead of business and own credit cards clients may
optimize their cost on the AWS by selecting appropriate size, automating environment according
to the use and schedule to scaled up and down environments, as well as using most suitable
pricing models (reservation, on-demand, and spot instance). The Security or access
administrations are very vital for AWS or our clients. The organization must review moreover
incorporate following assets into its accesses management strategies. The Integrating AWS
accesses credential into association existing inner credential administration procedures and
policies are vital furthermore often uncomplicated operations for a client. Connection to
association’s AWS moreover corporate environments should be understood well furthermore
may take benefit of hardware, Internet and software virtual personal network and direct
connection. AWS Amazon VPC Connectivity Options white papers discuss some of this option
in a detail. AWS recommends at least two connections for HA furthermore fault tolerances. The
clients may choose the combination of a connection option to provide the redundant failover
mechanisms when appropriate.
Document Page
Hybrid Cloud
Part 6: AWS Migration Planning
Amazon Work Mail is a hosted email and calendaring service that provides powerful security
controls and supports for existing desktops moreover mobile consumers. AWM is a hosted email
and calendaring service with powerful security controls and supports existing desktop and
mobile email clients. Whether Regional Garden’s use Microsoft Outlook, browsers or iOS and
Android mobile devices, Regional Garden’s can access their emails, contacts and calendars.
Regional Garden’s may integrate AWM with Regional Gardens' existing corporate directories
furthermore control a keys for encrypted information and location of the stored data. This may be
time-consuming activities: In the order to utilize Amazon's collaborative tools. I have study the
all available documentation on sites or it’s very helpful. Software is not simple to setups, but
instructions are comprehensive. Software supports particular account migrations or batch
migrations, which are how technicians say multi-account migration. For first attempt, I already
use single account migration furthermore setup was too simple. Of all issues in the migration to
cloud (AWS Work Mail), all setup steps are simply compared to manual migrations. Amount of
information migrated in twenty five accounts is fifty GB, of which 14 have been successfully
migrated and 11 have been completed or renewed. Software is requiring documentation or
update to explain why it failed through some E-mails. What I recommend to Regional Garden’s
is that if Regional Garden’s want to migrate 50,000 e-mail accounts, Regional Garden’s should
use manual methods to ignore rework. One of benefit of migration is to reduce costs, because
they have dedicated servers in the office, so they must give corresponding maintenance.
The AWS WorkMail is a secure, hosted business email and calendar service that supports
existing desktop and mobile email client applications. Amazon employees can easily access their
emails using their chosen client applications (native iOS applications, Microsoft Outlook and
Document Page
Hybrid Cloud
Android email applications, applications based on any client supporting IMAP protocol and
directly in web-based browsers), contacts and calendars. A regional garden can include the AWS
WorkMail according to its existing corporate guidelines, using email logging to meet regulatory
compliance requirements, and controlling data encrypting keys and data storage locations.
Regional giants can also establish interoperability with Microsoft Exchange Server and can
manage users, groups, and resources through the program using Amazon WorkMail SDK.
Amazon securely integrates with existing Microsoft Active Directory in the WorkMail Regional
Gardens, in which users can access their mailbox using their existing credentials. It makes it easy
to manage users and groups who use familiar system management tools such as Active Directory
users and computer users can synchronize with their e-mail, Android, Amazon Fire and
Windows Phone devices. If a company is migrated from a local Microsoft Exchange server, then
the user's mobile device cannot automatically connect with Amazon WorkMail and the end user
will not change the user experience without configuring it. Feature-rich web clients are also
available to help users access their email, calendar, and contacts.
Key points and key issues
When Amazon introduced its cloud-based enterprise WorkMail e-mail product, it emphasized
the fact that it would use high-level encryption and that enterprise users might control their
personal decryption keys. However, Amazon ignores mentioning that it will surely retain
complete access to this information, while also being able to examine the information data for
Regional Garden’s marketing and provide data to regulation enforcement agencies when the
subpoenas occur. The company will use the accessible AWS Privacy Policies, which almost
allows them to do whatever they want. Given that a company's email data may contain all
sensitive as well as proprietary information of the Regional Gardens. In case Regional Garden is
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Hybrid Cloud
looking for someone to host their email instances may place access control at the top of its
requisite list. For Amazon, the potential of Big Data is an inevitable consideration as well as the
tempting proposition; the solution to the problem is almost certainly two-tiered. A service does
not imply that data or information will never be easily accessed by anonymized cross-references
and analysis, however, another type of service may be.
AWS has millions of active customers each month, and each imaginable vertical business unit in
the enterprise uses AWS in a meaningful way. Each organization has its own unique reasons and
limitations, but we have seen customers apply the common drivers consistently when migrating
to the cloud:
Concerns before migrating email instances to AWS
Operating costs: The key component of the operating cost is the infrastructure unit price, which
can match the supply and demand relationship, find alternatives, and adopt flexible cost base and
transparency.
Labor productivity: In general, productivity increases two key factors: Regional Gardens don't
have to wait for the infrastructure, and Regional Gardens can use AWS WorkMail with more
than 90 services to access AWS breadth and depth for its use, otherwise organization needs to
build and maintain these services. In fact, after large-scale migration, it is common to see that
employee productivity increases by 30-50%.
Avoid costs: No hardware updates and ongoing maintenance plans are key factors to avoiding
costs. We found that customers are not interested in the cost and effort required to perform large
refresh cycles or data center updates.
Document Page
Hybrid Cloud
Operational flexibility: This seems obvious, but reducing the risk profile of the organization will
also reduce the cost of risk mitigation. With 42 regions (AZ) consisting of 16 regions, AWS
WorkMail has increased uptime around the world, reducing risk-related costs.
Business agility: Migrating to AWS WorkMail Clouds helps improve overall operational agility.
This allows Regional Gardens to react more quickly to market conditions by expanding new
markets, selling business lines, and acquiring available assets that provide a competitive
advantage. The process of migrating existing applications to AWS WorkMail is complex and
often involves stakeholders in each part of the organization. Therefore, taking the time to
acknowledge in advance that cloud migration is not just an IT project is very important - it
affects many different teams and often requires close collaboration between finance, compliance,
products, systems and other teams if Regional Gardens preparing to migrate, first understand the
standard AWS migration process.
Document Page
Hybrid Cloud
References
Ahmad, A., Shanmugam, B., Idris, N., Samy, G., & Hasan AlBakri, S. (2013). Danger Theory
Based Hybrid Intrusion Detection Systems for Cloud Computing. International Journal Of
Computer And Communication Engineering, 650-654. doi: 10.7763/ijcce.2013.v2.267
Garber, D., Malik, J., Fazio, A., Carrasco, N., & Sneed, R. (2013). Windows azure hybrid cloud.
Indianapolis, Indiana: John Wiley & Sons, Inc.
Gordon, A. (2016). The Hybrid Cloud Security Professional. IEEE Cloud Computing, 3(1), 82-
86. doi: 10.1109/mcc.2016.21
Hatef, M., Shaker, V., Jabbarpour, M., Jung, J., & Zarrabi, H. (2017). HIDCC: A hybrid
intrusion detection approach in cloud computing. Concurrency And Computation: Practice And
Experience, 30(3), e4171. doi: 10.1002/cpe.4171
Ellison, M., Calinescu, R., & Paige, R. (2018). Evaluating cloud database migration options
using workload models. Journal Of Cloud Computing, 7(1). doi: 10.1186/s13677-018-0108-5
Furht, B., & Escalante, A. (2015). Handbook of cloud computing. New York: Springer.
Gilster, R. (2015). CompTIA cloud+ CVO-001 in depth. Boston, MA: Cengage Learning PTR.
Höllwarth, T. (2012). Cloud Migration. Verlagsgruppe Hüthig Jehle Rehm.
IEEE Cloud Computing Call for Papers Connecting Fog and Cloud Computing. (2016). IEEE
Cloud Computing, 3(4), c2-c2. doi: 10.1109/mcc.2016.83
Jamshidi, P., Ahmad, A., & Pahl, C. (2013). Cloud Migration Research: A Systematic Review.
IEEE Transactions On Cloud Computing, 1(2), 142-157. doi: 10.1109/tcc.2013.10
Katzer, M. (2013). Moving to Office 365.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Hybrid Cloud
Khan, N., & Al-Yasiri, A. (2015). Framework for Cloud Computing Adoption: A Roadmap for
Smes to Cloud Migration. International Journal On Cloud Computing: Services And
Architecture, 5(5/6), 01-15. doi: 10.5121/ijccsa.2015.5601
Kumar, R., & Prashar, T. (2016). A bio-inspired hybrid algorithm for effective load balancing in
cloud computing. International Journal Of Cloud Computing, 5(3), 218. doi:
10.1504/ijcc.2016.080047
Linthicum, D. (2016). Emerging Hybrid Cloud Patterns. IEEE Cloud Computing, 3(1), 88-91.
doi: 10.1109/mcc.2016.22
Linthicum, D. (2017). Cloud-Native Applications and Cloud Migration: The Good, the Bad, and
the Points Between. IEEE Cloud Computing, 4(5), 12-14. doi: 10.1109/mcc.2017.4250932
Manias, E., & Baude, F. (2012). A component-based middleware for hybrid grid/cloud
computing platforms. Concurrency And Computation: Practice And Experience, 24(13), 1461-
1477. doi: 10.1002/cpe.2822
Narasimhan G., L. (2018). Database Migration on Premises to AWS RDS. EAI Endorsed
Transactions On Cloud Systems, 3(11), 154463. doi: 10.4108/eai.11-4-2018.154463
Nehru, I., Mukherjee, S., & Noel, J. (2014). Energy Aware Migration Model for Efficient
Resource Management in Cloud. Applied Mechanics And Materials, 573, 537-542. doi:
10.4028/www.scientific.net/amm.573.537
Nevil.S, A., & C.J, K. (2016). Optimized cloud migration using reliabilty framework.
International Journal Of Engineering And Computer Science. doi: 10.18535/ijecs/v5i5.51
Premarathne, U., Abuadbba, A., Alabdulatif, A., Khalil, I., Tari, Z., Zomaya, A., & Buyya, R.
(2016). Hybrid Cryptographic Access Control for Cloud-Based EHR Systems. IEEE Cloud
Computing, 3(4), 58-64. doi: 10.1109/mcc.2016.76
Document Page
Hybrid Cloud
Rountree, D., & Castrillo, I. (2014). The basics of cloud computing. Waltham, Mass.: Syngress.
Rana, O. (2014). The Costs of Cloud Migration. IEEE Cloud Computing, 1(1), 62-65. doi:
10.1109/mcc.2014.24
Sill, A. (2016). Cloud Standards as Roadmaps for Migration. IEEE Cloud Computing, 3(2), 64-
70. doi: 10.1109/mcc.2016.49
Shukla, S., & Arora, D. (2015). A Hybrid Optimization Approach for Load Balancing in Cloud
Computing. International Journal Of Private Cloud Computing Environment And Management,
2(2), 11-22. doi: 10.21742/ijpccem.2015.2.2.02
Sood, S. (2013). Hybrid Data Security Model for Cloud. International Journal Of Cloud
Applications And Computing, 3(3), 50-59. doi: 10.4018/ijcac.2013070104
Weinman, J. (2015). Cloudonomics. Hoboken, N.J.: Wiley.
Weinman, J. (2016). Hybrid Cloud Economics. IEEE Cloud Computing, 3(1), 18-22. doi:
10.1109/mcc.2016.27
Yousif, M. (2016). Hybrid Clouds. IEEE Cloud Computing, 3(1), 6-7. doi: 10.1109/mcc.2016.9
Zalieckaitė, L., Kazakevičiūtė, V., & Kalinovienė, V. (2015). Migracijos į debesų kompiuterijos
aplinką modelis. Management Theory And Studies For Rural Business And Infrastructure
Development, 37(2), 331-344. doi: 10.15544/mts.2015.30
chevron_up_icon
1 out of 30
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]