Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald



Similar documents
How To Understand Cloud Computing

Kent State University s Cloud Strategy

HP Converged Cloud. Peter Werdenhoff Cloud Lead Sweden

Cloud Roadmap to Success. October, 2014

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE

White Paper: Assessing Performance & Response Time Requirements

Domain 1 The Process of Auditing Information Systems

The Need for Service Catalog Design in Cloud Services Development

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Realizing the Value Proposition of Cloud Computing

DARMADI KOMO: Hello, everyone. This is Darmadi Komo, senior technical product manager from SQL Server marketing.

Leveraging the Cloud. September 22, Digital Government Institute Cloud-Enabled Government Conference Washington, DC

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

NCTA Cloud Architecture

Things You Need to Know About Cloud Backup

security in the cloud White Paper Series

Journey to Cloud 10 Questions

Big Data, Big Risk, Big Rewards. Hussein Syed

Software Defined Hybrid IT. Execute your 2020 plan

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Dell Desktop Virtualization Solutions Enterprise Offering Overview

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis

Innovation through Outsourcing

Planning the Migration of Enterprise Applications to the Cloud

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Federal Cloud Computing Initiative Overview

ITIL in the Cloud. Vernon Lloyd.

How To Run A Cloud Computer System

FISMA Cloud GovDataHosting Service Portfolio

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

Cloud Computing - Advantages and Disadvantages

Security Issues in Cloud Computing

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

Cloud Computing are you ready?

EMC Forum 2012 Bussum 11 th September Hans Reinhart Business Development

Moving Applications To Cloud

Clarity in the Cloud. Defining cloud services and the strategic impact on businesses.

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

PHASE 5: DESIGN PHASE

Auditing Software as a Service (SaaS): Balancing Security with Performance

The Impact of PaaS on Business Transformation

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Data Security and Healthcare

1. From the CIO Strategic Direction for Cloud Computing at Kent State Cloud Computing at Kent State University 5

4/28/2014. What's the Scoop on Cloud Computing. Agenda. Why you are here?

How To Manage Cloud Data Safely

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

journey to a hybrid cloud

Cloud: App-Centric Scalability, Availability, Reliability and Security. Prakash Sinha, Director, Product Management October 27, 2009

THE BLUENOSE SECURITY FRAMEWORK

Technical Management Strategic Capabilities Statement. Business Solutions for the Future

Report on Hong Kong SME Cloud Adoption and Security Readiness Survey

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy

Best Practices for Consolidation Projects

Capacity Plan. Template. Version X.x October 11, 2012

CGS Technology Outsourcing

Production in the Cloud

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers

When Security, Privacy and Forensics Meet in the Cloud

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Overview of Topics Covered

_experience the commitment TM. Seek service, not just servers

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

How To Improve Your Business

Which is Better: Virtualization or Cloud IaaS?

Implementing Hybrid Cloud at Microsoft

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

CLOUD COMPUTING. A Primer

Cloud models and compliance requirements which is right for you?

The Value of Vulnerability Management*

Cloud Computing. Bringing the Cloud into Focus

Cloud Computing: Compliance and Client Expectations

ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING

New Risks in the New World of Emerging Technologies

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Right-Sizing Electronic Discovery: The Case For Managed Services. A White Paper

The transformation of client device and the rise of cloud computing

Cloud Computing and Amazon Web Services

Infrastructure solution Options for

Iowa State University Proposal for HR-01 ISU HR Operating Model

RFP Attachment C Classifications

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services

Data Center Consolidation in the Federal Government Looking beyond the technology

Seeing Though the Clouds

Five Tactics to Hybrid Cloud Success

Transcription:

Federal CIO: Cloud Selection Toolkit Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald

Agenda Project Introduction Agency Cloud Challenges Toolkit Solution Overview Step 1: Data Gathering Step 2: Cloud Readiness Assessment Step 3: Vendor Selection Step 4: Preparing for Change and Risks Conclusion

Project Introduction Gartner defines cloud computing as "a style of computing where scalable and elastic IT-related capabilities are provided 'as a service' to customers using Internet technologies." For cloud computing to be successful, organizations require a thorough and rigorous adoption strategy: One that takes into account the risks and reaps the rewards Ad hoc methods result in increased risk, expenditures and liability

Cloud Computing Service Models Middleware Data Center BPO Information Feeds Packaged Apps Infrastructure as a Service Business Services Information Services Software as a Service Platform As a Service Cloud Enablers The provider optimizes everything below the service boundary, and hides complexity from the consumer. The consumer accesses, configures and/or extends the service and builds everything needed above the service boundary or just uses the service.

Agency Cloud Challenges Funding for restructuring costs No cost savings realized until 2 nd year of cloud projects Rebalance IT workforce and skill levels FISMA compliance and C&A contract vehicles Agencies must avoid compliance mode Three annual moves to Commercial or Gov t clouds Use the 25 Point Plan as an opportunity to strategically plan for future IT success Federal CIO Cloud Selection Toolkit will alleviate political pressures and reduce complexity of cloud investment decisions

Toolkit Solution Overview Develop a rigorous methodology to: Identify potential agency cloud candidates Determine cloud costs and ROI Determine impacts to the organization Identify and vet cloud providers Identify business impacts and risks Mitigate residual risks

Low or Uncertain Benefit High & Clear Business Impact Determines Cloud Investment Decisions Consider Private Embrace Public Avoid Experiment High or Unmanageable Low & Manageable Challenges

Step 1: Data Gathering Architecture Centralized, distributed, localized, etc. Patterns: If legacy app = cost to move to cloud If new app = integration requirements and cost to integrate with another app Elasticity support = new tools required to support? Work Load Average work load requirements CPUs, Memory, Storage, bandwidth, etc. Peak work load requirements Variance of CPU, Memory, Storage, bandwidth, time duration of sustaining peak loads, etc.

Step 1: Data Gathering Technology OS, DB, Application stack vendor Include licensing cost based on model Load balancing between private and public cloud or disparate public clouds Integration of KPIs of app running on cloud with existing monitoring tools Solution type: transactional, reporting, analytic, etc. Release cycle for app Organization # of users # of sites # of vendors (contracted) # of business units impacted # of people impacted

Step 1: Data Gathering Security, Privacy & Compliance Identity & Access Management of users in cloud Cost to implement new controls (i.e. encryption) Cost to maintain existing controls Include: log monitoring, access monitoring, forensic evidence preservation, separation of duties, patching, etc. Demographics # of components # of environments # of servers # of releases per year # of codes maintained # of programming languages # of COTS apps

Step 1: Data Gathering Operations % annual budget spent on software maintenance & training Cost/revenue impact Mission criticality # of trouble tickets # defects outstanding Include average severity of defects outstanding End user/business user Requirements Latency to connect to app Frequency of information accessed SLA requirements on availability & support

Key Deliverable s Key Activities Step 2: Cloud Readiness Assessment The Assessment phase includes conducting a current state analysis, requirements definition, and developing a vision. This phase will further refine and confirm the legacy system can benefit from the joint service offering. Current state IT assessment Current State Assessments Requirements Definition Define Vision Client Go No-Go Current state Financial assessment Current state Operational assessment Requirements Definition Understand legacy system current technical environment Understand legacy system operational environment Assess the fit of product offering Assess organization data compliance and security needs. Assess organization current IT infrastructure for continuity and application interdependencies. Interview key stakeholders Conduct requirements definition workshop Validate requirements Develop Requirements Document Define compliance and security needs for new solution. Define Goals Define short term and long term vision Define level of migration to the new solution. Assess current organization risk tolerance and resource constraints. Current state Document Requirements Document Scope Statement Vision Document

Step 2: Cloud Readiness Assessment Assessment Approach Current state IT Assessment Current Legacy System IT Infrastructure Current Organization Risk Tolerance Current Organization Resource Constraints Technical Requirements Application Complexity Network Bandwidth Infrastructure Requirements Virtualization Candidate Infrastructure Specialization Business Requirements Application Criticality User Impact Service Level Requirements Internal / External Facing Security Concerns Future State Analysis Cost Benefit Analysis Transition Costs Operating Model Implications Management Considerations Cloud Solution Private Community Public Hybrid Agencies must meet assessment criteria at each step prior to passing on to the next; in some cases technical and business requirements may be evaluated concurrently. Agencies will be giving a scorecard for each criteria (red/yellow/green) Even within each area, failure to meet fundamental evaluation criteria would mean that suitability is no longer viable and the application is not suitable for cloud at this time Agency applications exhibit the following attributes and will be assessed accordingly: - Low or moderate application criticality - Minimal to some interdependencies on other apps / data - Uses commodity hardware - Bandwidth requirements - Standalone environments or software stack - Does not depend on specialized appliances - Low / moderate SLA requirements - No confidential data or data can be easily masked

Step 2: Cloud Readiness Assessment Cloud Assessment Criteria Level 1 Current State Assessment Criteria Legacy System Criticality Legacy System Complexity Virtualization Candidate Commodity Infrastructure Explanation (Red/Yellow/Green) Defined by business for production environments, Architecture complexity, dependencies on other applications, databases, middleware Can the workload be virtualized? This depends on the platform OS and virtualization platform Workload runs on commodity infrastructure Level 2 Determine Suitability for Cloud Network Bandwidth Infrastructure Requirements Shared Environments Shared Software Specialized Infrastructure Internal / External Facing User Impact Service Level Requirements Customer / Confidential Data Technical Feasibility (Red/Yellow/Green) LAN or WAN network bandwidth requirements when workload would run in the cloud The scale of requirements for compute, storage and network to support workload Types that would be supported by a shared environment Software (e.g., databases, middleware) share with other software) Dependency on special purpose proprietary appliances, devices, license, hardware, etc Business Feasibility (Red/Yellow/Green) Does the system provide a customer facing service or back office function (e.g., HR)? Impact on the user community due to move of workload to cloud (e.g., lack of access to a subset of users) Availability, response time, Recoverability, Disaster Recovery, etc Does the provider location or other characteristics of the cloud service meet the security requirements of how and where data needs be stored? Level 3 Business Case and Operational Analysis Business Case Analysis Detailed Technical Analysis Operational Analysis Management Considerations Cost / benefit analysis, including initial and migration costs, on-going costs and ROI timeframe What changes will be required for the application? What will the future application architecture look like? What is the operational impact due to the workload moving to cloud? What is support model after workload is moved to cloud? What is provider vs. client responsibility and hand-offs? How is the workload managed in the cloud? E.g., using internal and vendor provided tools, processes, and staff; Go No/Go Based on Assessment Scorecard

Step 2: Cloud Readiness Assessment Cloud Assessment Decision Matrix Level 1: Current State Assessment Level 2: Technical Feasibility Red Yellow Green Go/No-Go Decision Level 3: Business Feasibility Go / No Go Decision Acceptable quantity of Red rating for all categories is at most 1 red rating for Agency Go into the cloud solution, otherwise No Go. Acceptable quantity of Yellow rating for all categories is at most 2 yellow ratings for Agency Go into the cloud solution, otherwise No Go. Acceptable quantity of Green rating for all categories is at least 2 green ratings for Agency Go into the cloud solution, otherwise No Go.

Step 3: Vendor Selection 1. Create a Detailed RFI/RFP 2. Review RFI/RFP Responses: Any vendor that cannot meet service requirements should be removed from consideration May discover that no vendor can meet requirements: Service is cloud-ready, but cloud is not ready for the Service Reassess requirements or maintain services internally

Step 3: Vendor Selection Criteria

Step 3: Vendor Selection 3. Select vendor and devise migration plan: Some vendors may not respond to RFQ: Cloud model is pay-as-you-go; vendors may not negotiate Once vendor is selected, initiate migration planning, and add to cloud adoption road map

Step 4: Change and Risk Management RISK ASSESMENT MATRIX PROBABILITY IMPACT Low Medium High High L M H Medium L M M Low L L L RISK LEVEL High Medium Low RISK DESCRIPTION & NECESSARY ACTIONS If an observation or finding is evaluated as a high risk, there is a strong need for corrective measures. If an observation is rated as medium risk, corrective actions are needed and a plan must be developed to incorporate these actions within a reasonable period of time. If an observation is described as low risk determine whether corrective actions are still required or decide to accept the risk.

Step 4: Change and Risk Management Risk Risk Level Mitigation Costs Privacy Integrity Compliance Availability H M H L M Maintain strict budget Clearly communicate requirements & needs to vendor Establish authentication & access control procedures Implement data encryption Establish incident response program Implement security & configuration best practices Perform vulnerability scanning Audit controls Establish security & disaster recovery processes & procedures

Step 4: Change and Risk Management Phased Approach Education Change Management Transparency Leadership

Next Steps Develop detailed business case, gain OMB and Agency approval Upon approval, develop detailed transition plan Measure project execution and monitor SLAs / contract performance

Conclusion Disciplined and repeatable selection drives rapid cloud adoption and increased success rates Successful transformation begins with strategic selection of cloud deployments Moving away from ad-hoc selection ensures alignment with solutions and reduction of risk The proper portfolio of cloud projects increases the project success rate

References Heiser, Jay, and Mark Nicolett. "Assessing the Security Risks of Cloud Computing." Www.gartner.com. Gartner, Inc., 3 June 2008. Web. 26 July 2011. <http://my.gartner.com/portal/server.pt?open=512>. "HP and Deloitte Alliance - Federal Market Offering Overview." Cloud Computing Forecasting Change. HP and Deloitte, 1 Apr. 2011. Web. 10 July 2011. <https://kx.deloitteresources.com/g1000/lists/publishedcontent/dispform.aspx?id=1074 89&Source>. Jackson, Chris. "Implementing a Decision Framework for Cloud Migration." Cloud Computing in Healthcare. Cloud Computing in Healthcare Conference, 21 June 2011. Web. 1 Aug. 2011. <http://www.iibig.com/conferences/t1101/t1101_images/presentations/chrisjackson_04. 50.pdf>. Reeves, Drue. "Building a Solid Cloud Adoption Strategy: Success by Design." Www.gartner.com. Gartner, Inc., 19 May 2010. Web. 01 Aug. 2011. <http://my.gartner.com/portal/server.pt?open=512>. Stoneburner, Gary, Alice Goguen, and Alexis Feringa. "Risk Management Guide for Information Technology Systems." NIST: National Institute of Standards and Technology. 1 July 2002. Web. 19 July 2011. <http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf>. "Top Threats to Cloud Computing V1.0." Cloud Security Alliance. 1 Mar. 2010. Web. 20 July 2011. <https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf>.