MetaSoft Ltd: Cloud Migration, Security Controls, and BCP Changes

Verified

Added on  2023/06/03

|25
|7627
|167
Report
AI Summary
This report provides a comprehensive analysis of MetaSoft Ltd.'s strategic move to a hybrid cloud environment, focusing on the migration from their Melbourne data center to the Sydney data center and the adoption of a microservices model. It proposes an architecture based on Amazon Web Services (AWS), highlighting the benefits of complete control, integration, security, and accessibility. The report also identifies potential risks associated with hybrid cloud and microservices, including IT architecture design, data management, privacy, unauthorized access, API security, data synchronization, and data staleness, and suggests mitigation strategies. Furthermore, it outlines proposed information security controls, recommendations for MetaSoft, business continuity plan (BCP) changes, hybrid cloud administration and SLA management, and SharePoint migration planning. The report concludes by addressing critical points and issues related to the cloud implementation, providing a detailed roadmap for MetaSoft's successful cloud transition.
Document Page
Running head: CLOUD COMPUTING
CLOUD COMPUTING
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
CLOUD COMPUTING
Table of Contents
Introduction......................................................................................................................................3
Proposed Architectures for a Hybrid Cloud....................................................................................4
Risk report for Hybrid Cloud and Micro services...........................................................................6
Proposed Information Security controls..........................................................................................9
Recommendation for Metasoft..................................................................................................12
BCP Changes.................................................................................................................................13
Hybrid Cloud Administration and SLA Management...................................................................15
SharePoint Migration Planning......................................................................................................17
Critical point and issues.............................................................................................................18
Conclusion.....................................................................................................................................20
References......................................................................................................................................21
Document Page
3
CLOUD COMPUTING
Introduction
The concept of cloud computing is one of the domain of the technology which is playing
an important role. The technology is directly impacting the overall sector of operation which is
relate to the working of different kind of organisation. In majority of the cases it can be seen that
the organisation tries to indulge into the concept of the clod computing due to the different forms
of advantage which is gained from the it. The main sector of the advantage is that the concept
takes control over the vital aspect of the working of the organisation so that the organisation can
concentrate of different vital internal activity. In recent times it can be stated that above from the
different advantage sector there are different forms of risk factor associated within the working.
The main sector of the disadvantage mainly come in different forms which can be easily be
indulged into and mitigation plan can be easily be implemented within the technology which
would be making the technology more adoptable (Hilbrich, Petrlic & Becker,2015). There are
different sorts of implementation details which should be focused and within the working of the
technology there are different infrastructure which are available, it should be the role of the
organisation to take into consideration different aspect and role which they want the concept of
the cloud computing to be playing within the organisation. Physical and dynamic aspect of the
working of the concept of the cloud computing can be one of the implementation sector details
for an organisation trying to adopt to the cloud computing scenario is also one of the focus point
of the report.
The main focus point of the report is to indulge into the different working which is
related to the concept of cloud computing. Metasoft is one of the organisation which is planning
to move to the concept of cloud computing, in the report the main implementation details which
is related to the sector of adaptation of the concept for the organisation is taken into focus. In the
Document Page
4
CLOUD COMPUTING
stages of implementation there can be different types of risk factor which are discussed in te
report and the mitigation plan which can be adopted by the organisation are also taken into
consideration which would be involving a proper adaptation process involving les security risk
involved in it.
Proposed Architectures for a Hybrid Cloud
The proposed architecture for the MetaSoft ltd which deals with the sector of software
development would be the Amazon web service. The concept of the hybrid cloud can be directly
related to the aspect of the allocation of the on premise resources with the resources of the cloud.
Organisations who adopt the concept of the on premise technology directly invest in the sector of
the hybrid cloud which is a primary requirement relating to the cloud adaptation. The concept
relating to the migration of the legacy can be stated to be involving some form of time concept
involved into the approach (Fang & Zhang, 2016). One of the important point which should be
considered is the selection of the cloud providers who would be helping the organisation to
utilize different resources which are available within the concept of the hybrid cloud. The
important consideration which can be focused in the sector of the implementation of the hybrid
cloud without the need relating to the cost investment in the sector of the on premise software
and hardware (Hilbrich, Petrlic & Becker,2015). The AWS can be very much beneficial in the
sector of the closely working with the need of the organisation. some of the benefit which can be
seen in the sector of the implementation of the propose architecture are stated below:
ï‚· Complete control: The organisation would be having the overall control of the different
features of the concept of the cloud computing. The organisation can directly root the
access to each one of them and the interaction with the system would be done. The
feature which is related to the concept can be stopped while directly retaining the data
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
CLOUD COMPUTING
which would be residing in the boot partition. Then the same sequence can be started
again by the same instance using the web service APIs. The instances can be directly
rebooted using the web service APIs.
ï‚· Integrated: The concept of the AWS can easily get nitrated with the different working of
the organisation which can be related to the overall sector of implementation (Fang &
Zhang, 2016). Some of the aspects which can be directly be linked to the aspect can be in
the sector of the amazon simple storage service, amazon virtual private network, amazon
relational database service which directly provides a secure solution of computing,
processing f query and the cloud storage across an application which has a wide range of
service.
ï‚· Security: The data which would be stored in the concept of the AWS would be very
much secured. In the organisation which focused which is the MetaSoft, the
implementation of the AWS would be removing the burden which is related to the
protection mechanism which should be implemented within the data. The security of the
data of the organisation which would be saved in the concept would be provided from the
end of the service providers and the organisation can directly deal with different other
important factors.
ï‚· Access: The data which would be stored within the concept of the AWS can be directly
be accessed at any time. This mainly means the with regards to the security the data can
be available to the organisation when they would be needing the data (Hilbrich, Petrlic &
Becker,2015). This can be stated as one of the major advantage which is related to the
implementation of the AWS. It can be stated that if the data is not accessed and retrieved
during the need of the organisation it can be a major problem which is mainly taken into
Document Page
6
CLOUD COMPUTING
focus by the AWS so that the retrival of the data within the concept would be not
involving time constraint. On the other hand, the quality of the data which would be
retrieved from the AWS would be maintained so that there are no problem relating to the
distribution of the data.
Risk report for Hybrid Cloud and Micro services
There can be different types of risk factor which can be included into the concept of the
working of the hybrid and the micro services. The main aim of the sector is to disrupt the normal
functionality which is related to the concept. The risk factors which are related to the concept can
be discussed with the help of a tabular form which would be affectively discussing all the sectors
of risk which is related to the concept. The table given below describes all the risk factor which
is involved into the concept which can be affecting the sector of operation which is related to the
concept.
Hybrid cloud Micro service strategy
Cloud security Security
Loss of overall control of the data Synchronization of the data.
Discovery Compliance
Management of the data Testing
Latency and bandwidth Monitoring
Failure and disaster recovery Data staleness
Architecture design of the IT Logging and debugging
Document Page
7
CLOUD COMPUTING
The different risk factor which is associated with the concept of hybrid cloud are majorly
discussed below:
Design of thee IT architecture: the concept of the hybrid cloud can be considered to be
a very complex due to the factor that the concept is a mixture of different sector of the working
which is related to the concept. It can be considered to be a mixture which is related to the
private cloud, public cloud and the on premise cloud (Singh et al.,2015). In order to manage the
overall service, it can be stated that there are many operational details which is linked to the
concept which play a major risk factor in the sector of the working of the concept.
Data management: The concept of the data management can be stated as one of the
factor which can be termed as one of the major risk factor which is related to the concept. This is
due to the factor that there are different types of crucial data which is stored in the concept which
should be taken care of and the security implications which are provided from the end of the
cloud providers are not proper (Fang & Zhang, 2016). In the concept it can be stated that there
are no predefined rules which directly define the sector of the security which would be directly
be implemented within the working of the organisation with the data which is stored within the
concept. These data are crucial for the organisation and if there are any form of intruder activity
it be directly impacting the overall operation which is related to the working of the organisation.
Privacy: The privacy of the data which is stored in the concept can be stated to be one of
the major factor which is related to the concept. There are different aspect of privacy dwelling
within the concept which makes the leakage of the data of the organisation (Hilbrich, Petrlic &
Becker,2015). These activities are usually done from the end of the hacker who use the concept
in order to gain their own profit from the sake of the data which is retrieved from the system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
CLOUD COMPUTING
Unauthorised access: The sector of the unauthorised access of the data which is stored
in the concept can be a factor of concern (Tebaa, Zkik & El Hajji, 2015). There can be different
sectors of activity which can be linked to the concept which means that there can be alteration of
the data, modification of the data and deletion of the data which would be directly hammering
the overall functionality of the organisation.
The different types of risk factor which is associated with the micro service are stated
below:
Security: the security of the API can be stated as one of the concern areas which can be
related to the concept. The security of the API can be very much important in the sector of the
working of the data which would be present in the system (Moro, Cortez & Rita, 2015). There
are different implications which can be seen in the sector relating to the concept which can be the
implementation of Kong which is one of the most popular source which can be used in the sector
of the removing the barrier which is related to the security aspect.
Data Synchronization: The concept which is related to the aspect of the data
synchronization can be stated to be one of the concern area which is related to the concept which
would be directly beneficial in the sector of the implementation of the technology (Singh et
al.,2015). In most of the cases it can be stated that the sector of the async messaging system is
one of the major areas of concern which is related to the concept.
Data stainless: The database which is related to the concept should be ideally be
engaging into the different updating and modification so that they are always kept updates. It can
be stated to be a major problem if the data which is stored in the sector of the database is not
updated which can directly impact the operation which is related to the organisation. There is
Document Page
9
CLOUD COMPUTING
different implication which can be seen in the sector to directly mitigate the different problem
which is related to the stainless of the data.
Debugging: the concept which is related to the domain of the micro service can be a
indicated as an complex sector due to the involvement of different functionality which is related
to the concept (Fang & Zhang, 2016). Due to this factor it can be stated that when there are any
types of risk factor associated with the concept of risk issue seen the mitigation aspect control
can be one of the concern areas which is related to the concept. Sometimes it can be seen that the
risk factor directly gets included into the internal working of the organisation which can directly
disruptor the normal functionality which is related to the concept (Tebaa, Zkik & El Hajji, 2015).
It should be taken into consideration that risk identification should be one of the primary factor
which can be related to the concept so that there are no problem relating to the risk identification
and the concept of the implementation of a mitigation plan which would be directly resolving the
risk factor.
Proposed Information Security controls
In the concept of the hybrid cloud there can be different types if security risk which is
involved into the information which is stored in the concept. One of the factor which can be
stated here is that most of the organisation save their important and crucial data in the concept of
the cloud and if these data goes into the hand of another person or intruder it can hamper the
overall working of the organisation (Gangwar, Date & Ramaswamy, 2015). It can be stated here
that the AWS and its different partner directly offer different types of features and tools which
would be helping the security of the data and the controlling aspect of the data which would be
stored in the concept. These security control measures can be directly being placed upon the on
premise architecture which can be used in the sector of the deployment environment. Some of
Document Page
10
CLOUD COMPUTING
the areas which are covered in the concept can be in the range of the access control, network
security, management of configuration and the data security (Hilbrich, Petrlic & Becker,2015).
On the other hand, the concept also provides an enhanced feature relating to the logging and the
mentoring of the tools which can directly provide full visibility into what is happening and being
executing into the environment. Some of the information security aspect which can be seen in the
concept can be discussed taking into consideration some of the crucial areas of the
implementation which are explained below:
Network security
There are different types of aspect which can be directly be related to the aspect of the
security capability and services which would be enhancing the aspect of the control access of the
network and the aspect of the increasing of the privacy of the system. One of the important
feature which can be stated here is the build in firewall, this directly allows the organisation to
create a private network within the concept of the AWS and control access features which is
related to the subnets and the instances (Singh et al.,2015). Encryption it can be stated to be
another aspect which is included into the concept which would be transited with the concept of
the TLS across the different services which are provided. Relating to the connectivity aspect it
directly enables the concept of the private and connections which are dedicated for the on
premise and office environment. The implementation of the technique of the DDoS can be
considered to be a part of the auto scaling process or the strategy relating to the content delivery.
Data encryption
The concept of thee data encryption can be considered as a technique which can be used
in the sector of the encrypting of the data so that it cannot be accessed by anyone apart from the
authorised user (Laudon & Laudon, 2016). Some of the data encryption technique which are
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
CLOUD COMPUTING
implemented within the concept can be stated in the sector of the data base services and the
AWS storages such as thee S3, Glacier, EBS, oracle RDS, Redshift and SQL server RDS. In this
concept it can be stated that the implementation of a flexible key management option is very
crucial which directly allow the organisation to choose whether to have an AWS to manage the
encryption key or to maintain the complete control over the different keys within the
organisation. hardware based key relating to the cryptography option of storage gives the option
to the customer to get themselves satisfied with the compliance requirement (Tebaa, Zkik & El
Hajji, 2015). In addition to this the AWS also provides a API which would be helpful in the
sector of the data protection and the integrated encryption with any of the different services to
engage and deploy the AWS environment.
Configuration and management of inventory
The AWS directly provides a range of tools which directly allow fast and reliable access
of the different features which is related to the concept of the access control and configuration
control which would be directly beneficial for the organisation who would be implementing the
sector (Gangwar, Date & Ramaswamy, 2015). It directly gives the provision of tools of
deployment which would be beneficial in the sector of creation and decommissioning the sector
of the resources which are available in the AWS according to the need of the organisation, the
configuration and the inventory management tools can be implemented in the sector of the AWS
resources which can be managed and tracked according to the changes to the different resources
which are available in the sector. In this sector the template design and the management tools can
be implemented in the sector of the creation of a standard which is predefined and hardened with
the virtual machine for the concept of the EC2 instances.
Monitoring
Document Page
12
CLOUD COMPUTING
The aspect of monitoring can be stated to be one of the important features which can be
related to the concept of the control mechanism which is related to the data and the information
which is saved in the concept (Laudon & Laudon, 2016). There is different sector of
implementation which can be seen in the sector that any form of risk factor which is associated
within the concept can be mitigated before it actually gets indulged into the concept of the
working of the organisation (Schlagwein, Thorogood & Willcocks, 2014). Hence risk evaluation
matrix can be implemented in the sector which would be helping in the sector of the detection of
the problem and planning a risk mitigation aspect so that the security of the data would be
directly prevailing in the system. The main consideration which is taken into focus is that from
were any to were the data is being accessed and delivered so that any form of intruder activity
cannot get indulged into the overall access of the data. Hence it can be stated that monitoring of
the risk can be helpful in the sector of the implementation of the concept so that there is different
sector of working which is related to the concept (Singh et al.,2015). The concept of alert
notification can also be very much helpful in the sector of the working so that whenever there are
nay from of intruder activity detected within the system, the system would be directly notifying
about the circumstances and immediately a plan should be implemented which would be directly
affecting the overall working satiation and providing a control measure which is related to the
concept.
Recommendation for Metasoft
Recommendation 1: The system which is recommended for the organisation should be
very much maintained and understood. This mainly deals with the sector of the implementation
of proper standard of working which is related to the concept so that there are no errors of
problem relating to the adaptation of the concept (Gangwar, Date & Ramaswamy, 2015). The
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]