cw13 cloud ddeployment strategy by john rhoton

21
24/01/2013 1 John Rhoton – 2013 Cloud Deployment Strategy Challenges to Consider John Rhoton Cloud Weekend, Giza, Egypt 11-12 May 2013

Upload: inevitablecloud

Post on 20-Nov-2014

328 views

Category:

Technology


2 download

DESCRIPTION

The Inevitable Cloud Conference (CLOUD WEEKEND) is the biggest Cloud Computing event in Egypt that is held annually since 2012. For more information: Facebook: https://www.facebook.com/TheInevitableCloud Linkedin: http://www.linkedin.com/company/2990722?goback=%2Efps_PBCK_inevitable+cloud_*1_*1_*1_*1_*1_*1_*2_*1_Y_*1_*1_*1_false_1_R_*1_*51_*1_*51_true_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2&trk=prof-exp-company-name Contact us: [email protected]

TRANSCRIPT

Page 1: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 1John Rhoton – 2013

Cloud Deployment StrategyChallenges to Consider

John Rhoton

Cloud Weekend, Giza, Egypt11-12 May 2013

Page 2: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 2John Rhoton – 2013

Agenda

• Business/Financial• Risk & Security• Technical• Process

Page 3: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 3John Rhoton – 2013

Business Case

• Sunk Cost– Irrelevant?– Political, Marginal Costs

• Return on Investment– Calculated with NPV / IRR– Payback period

• Cash Flow effects• Revenue impact of flexibility and speed

Page 4: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 4John Rhoton – 2013

Cost Tradeoffs

Initial Ongoing

PrivateCloud

Capital Expenditures

LicensingOperations

PublicCloud

Migration Subscription

Hardware, Software, Deployment, Administration, Support

Page 5: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 5John Rhoton – 2013

Hybrid Usage Profile

Base

Series1

Base Usage Peak

Spikes

Page 6: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 6John Rhoton – 2013

Risk Analysis

• Governance• Risk• Security• Compliance

Page 7: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 7John Rhoton – 2013

Risk Mitigation Options

Data Leakage

Data Loss

Service Loss

Service Impairment

Damaged Reputation

Lock-In

Provider Assessment

Contract Negotiation

Encryption

Additional Backup

Multi-sourcing

Standardization

Page 8: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 8John Rhoton – 2013

• Personal observation• Personal experience• Insight

Employees Contractors

Partners Suppliers

• Public verification• Contracts• Compensation

ExpertsLegal Counsel

AuditorsPublic Scrutiny

SegmentationAccess controls

EncryptionAccess controls

Shifting Trust

Adapt Corporate Culture

Page 9: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 9John Rhoton – 2013

Confidentiality

• Data Governance– Data loss prevention

• Compartmentalization

• Encryption

Classify data, Select and Combine Options

Page 10: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 10John Rhoton – 2013

Compliance

Enforce Logical Barriers

Global Internet versus National Laws

Page 11: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 11John Rhoton – 2013

BusinessContinuity

Eliminate

High Probability

Low Probability

High ImpactLow Impact

Resilience

Risk Treatment

Page 12: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 12John Rhoton – 2013

Technical Considerations

• Technologies• Integration• Availability• Automation

Page 13: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 13John Rhoton – 2013

Lock-in vs. Cloud Stacks

• Servers• Storage• Network• Hypervisor• Operating

System• Orchestration

Proprietary Hardware

Proprietary Software

OpenSource

ConsortiumDriven

Balance ease with flexibility

Page 14: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 14John Rhoton – 2013

Integration• Connectivity• Application Compatibility• Authorization and Isolation

Internal External

Users

Functions

Resources

Page 15: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 15John Rhoton – 2013

Identity Federation

Identity challenges• Password

proliferation• Weak

authentication• Support costs• User

productivityImplement Identity Standards (SAML,

SCIM)

Page 16: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 16John Rhoton – 2013

Redundancy

• Dimensions– Physical– Geographical– Technological– Organizational

• Horizontal Scalability• ACID (Atomic Consistent Isolated Durable)

=> BASE (Basic Availability, Soft-state, Eventual consistency)

Architect for scale

Page 17: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 17John Rhoton – 2013

Automation

• Efficiency, Quality, Traceability, Compliance

• Scripting• Workflow• Sizing• Best practice configuration

• Puppet, Chef, Capistrano• OpenStack Heat, Juju Charms

Page 18: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 18John Rhoton – 2013

Process• Culture

– Job Security Career Enhancement– Political Power shift

• Skills– Virtualization, Networking, Storage– Linux, Python, Ruby, OpenStack, OpenFlow

• Procedures– Workflow definition

• Project Management– Rollout pace, schedule– Continuous integration, continuous deployment

Page 19: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 19John Rhoton – 2013

Emotional vs Factual

• Fear, Uncertainty and Doubt• Increased Effort– Evaluation– Negotiation– Integration– Implementation

• Reduce CAPEX benefits

Plan early, think objectively

Page 20: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 20John Rhoton – 2013

Summary

• Build the business case around agility• New trust model is inevitable• Security challenges real but

addressable• Integration the biggest technical

hurdle• Don’t forget the human element!

Page 21: CW13 Cloud Ddeployment Strategy by John Rhoton

24/01/2013 21John Rhoton – 2013

Contact Details

Follow me: @johnrhotonConnect: linkedin/in/rhotonRead the books:

amazon.com/author/rhotonDownload the presentation:

slideshare.net/rhoton