Key Pointers to Plot the Blueprint of Application Migration on cloud
#cloud Migration strategy

Key Pointers to Plot the Blueprint of Application Migration on cloud

 The adoption of clouds nowadays is a blooming requirement in the market. Most of the organizations already started the journey of cloud adoption and some of them are preparing to start the same. Considering this, cloud architecture is playing a crucial role to decide the migration strategy. Below are a few key pointers that any cloud architect should understand before plotting the blueprint of migration strategy.

Based on my experience and understanding I have added below a few key pointers that any cloud architect should ask or understand before developing or plotting the blueprint of migration strategy.

Purposefully I have not exhausted the list as the intention is to add only the key pointers to develop the initial or high-level blueprint of developing an application migration strategy on the cloud

Feel free to add if you have any key pointers.

 

 Key pointers to plot the blueprint of application migration on the cloud

  •  Understand the reason/s for migration. like DC exit or better user experience or higher SLA.
  • Understand the migration approach like re-host, re-platform, re-factor, and re-purchase.
  • Understanding of current application architecture which should cover network, Security, and infrastructure components furthermore traffic flow also.
  • Current challenges/issues if any.
  • Intended audience locations like the applications are accessing globally or regionally.
  • Applications authentication methods.
  • SLA requirements.
  • Last 3 to 6 months' incidents details
  • Current backup or failover process.


Apoorv Singh

Vice President - APAC & ME @ AlgoSec | Cybersecurity | Key Account & People Management | Revenue Growth | New Customer Acquisition, Retention, Expansion | Channels & MSSP | Unlock Emerging Markets

1y

Nicely summarized Samir! Discovering and mapping the Applications, understanding their connectivity architecture, assesing the traffic flows across hybrid cloud enviornment and migrating the security policies (securely) to cloud is the most daunting, time taking and error prone activity during cloud migration. AlgoSec nicely automates this end to end Samir. Would love to help your clients if needed..

navin gupta

Security Consultant at BT global services

1y

Nicely explained!!

To view or add a comment, sign in

More articles by Samir Paul

  • Agent-based VS Agentless Security

    There are two approaches to deploying cloud security software. One – the agent-based and agentless security.

    4 Comments
  • Cloud Security Posture Management

    Why CSPM? A typical public cloud can contain thousands of resources spinned across hundreds of regions and accounts…

  • PaloAlto Deployment with AWS GWLB

    AWS Gateway Load Balancer helps to easily deploy, scale, and manage network virtual appliances (NVA) like Palo Alto…

    1 Comment

Insights from the community

Others also viewed

Explore topics