cloudbrokerage.in

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 13 September 2011

Implementation of Cloud Computing Solutions in Federal Agencies : Part 3 - Cloud Transition Lessons Learned

Posted on 08:00 by Unknown
(This is part 3 of the series entitled "Implementation of Cloud Computing Solutions in Federal Agencies". First published on Forbes.com, this series provides the content of a whitepaper I recently authored. A copy of the complete whitepaper will be available at NJVC.com starting September 7, 2011.)

While the benefits and value of the federal cloud computing policy can be debated, the world’s transition to cloud computing as an integral component of any IT infrastructure cannot be denied. The prudent government executive should, therefore, heed the lessons learned from the many private industry corporations that already have miles behind them on this journey.

When identifying a potential cloud computing project, one should always count on a multi-year transition. Organizations should always use a consistent cloud opportunity identification process to reduce the risk of project failure by leveraging data from successful cloud implementations. Clients need to determine set metrics (economic, operational and service) with direct linkage to specific mission requirement(s). Use of a gate-driven cloud adoption process designed to terminate failed projects early in the project lifecycle and deliver measurable capabilities within a quick timeframe (weeks—not years) is highly recommended.

A risk mitigation plan also must be formalized that addresses each of the following concerns:2
  • Loss of Governance. When moving to a cloud environment, clients relinquish control to the CP on a number of security-related issues. A gap in security defenses may also exist as service level agreements may not adequately address CP-related security requirements.
  • Portability. Issues related to provider lock in are outlined in the Challenges section of this white paper on page 5.
  • Isolation Failure. Multi-tenancy and collaboration are at the core of cloud computing. Resource isolation failure addresses mechanisms separating storage, memory, routing and reputation among different clients on the same cloud (e.g., guest-hopping attacks). However, it must be noted that attacks on these mechanisms are not as pervasive and much more difficult to attempt versus attacks on traditional operating systems.
  • Compliance Risks. Investments in certifications (e.g., industry standard or regulatory requirements) may be compromised or lost when moving to the cloud.
  • Management Interface Compromise. Security is an issue with client management interfaces with the public cloud provider. The reason? These services are provided via the internet and permit access to a larger set of resources than traditional operating systems. Security risk can dramatically increase when this is combined with remote access and web browser vulnerabilities.
  • Data Protection. It may be difficult for clients to effectively check the data-handling practices of their CPs to ensure critical and sensitive data is handled lawfully and ethically. This problem can be aggravated in cases of multiple transfers of data (e.g., between federated clouds). However, it must be noted that some CPs share information on their data-handling practices with clients and others offer certification summaries on their data processing and data security activities and their various security controls (e.g., Statement on Auditing Standards 70 Certification.
  • Insecure or Incomplete Data Deletion. As with most operating systems, when a request to remove a cloud resource is made, a true erase of data may not happen. Adequate or timely data deletion also may not be feasible (or undesirable from a client perspective) because extra copies of data are stored but not readily available or the disk to be destroyed also houses other data from other clients. When multi-tenancies and the reuse of hardware resources are added to the mix, this risk can increase.
  • Malicious Insider. Cloud architectures necessitate the creation of certain staff positions (e.g., CP system administrators and managed security service providers) that can be extremely high risk in terms of internal security threats.
Creating a Cloud Computing Roadmap for Federal Agencies First Steps

According to, GovCloud: Cloud Computing for the Business of Government, when a government agency is ready to undertake the implementation of a cloud-based solution, it must determine which IT services, business functions and processes to deploy in the cloud environment. A five-year roadmap should be created that includes the desired order to move each of the services to the cloud for each year during that time period.3 Requirements for each service to be deployed in the cloud should be developed and a cost/benefits analysis performed to establish the rationale why each targeted service should move to the cloud.  

Implementation of a Low-Risk Test Case

A low-risk test case should be implemented prior to undertaking a wholesale transfer of services to the cloud.4 This is harder than it may sound as some IT services that may seem simple to deploy to the cloud are not so easy. Four questions should be asked (and answered) to decide which IT services are best suited to live in the cloud5:
  1. Can compliance requirements be balanced with other IT prioirities?
  2. Is this an IT function or service the agency has mastered?
  3. Can the agency use a standardized service?
  4. Is the test case easily implementable?
A misconception may exist that just because an application or service being deployed to the cloud isn’t mission critical, the process will be simple and straightforward. This is not always true. If the agency is new to the cloud and wishes to establish a private cloud it will take time to determine the appropriate split of responsibilities between the service provider and the agency’s IT team.6 Compliance and liability issues can also be tricky, as defining compliance conditions and establishing liability for intellectual property protection with cloud vendors reach well beyond the IT world—and, as such, with so many moving parts may take time to properly address and resolved.7 NIST has launched the U.S. Government Cloud Computing Business Case Working Group to assist agencies with the development of cloud-compatible user cases. Email, geospatial data exchange and services management are among the first user cases currently in development.  

Additional Recommendations

The authors of GovCloud: Cloud Computing for the Business of Government also offer seven recommendations that must be considered during the development and implementation of an agency’s cloud roadmap:
  • Own the information, even if you own nothing else. An agency must claim its right to own the information even if it doesn’t own the infrastructure, application or service associated with that information. Any agency is liable for its information—regardless of where it lives—and some education will likely be needed about this fact among its IT team. While it may be unrealistic to prevent departments from provisioning their own cloud application, the agency must institute policies and procedures to ensure it can monitor how information deployed to the cloud is managed. As it is often hard to envision future uses of information, it also is recommended that agencies make sure cloud-dwelling data can be brought back into the enterprise if needed.
  • Don’t take terminology for granted. It is vital to ensure that important terminology is defined in the same way by the agency and the cloud service provider—room for different interpretation always exists. A review of information governance policies must take place to identify the areas of highest risk so authoritative definitions for vocabulary in these areas can be developed and adopted.
  • Hope for standards, but prepare to integrate. In short, the cloud is young and isn’t established enough to have developed standard specifications for platform interoperability and data exchange. Strategic groundwork for future data integration needs to be laid in the early stages of any movement to the cloud. Agencies must insist that their cloud service providers provide clear documentation on the data formats and schemas used for information storage in their systems.
  • Control cloud platform proliferation. Agencies should minimize the number of different cloud platforms that require support to limit information fragmentation and decrease the chance of a future huge integration effort. To the greatest extent possible, an agency’s IT team should help departments look for shared requirements in standardized business functions. The team can identify cloud platforms that meet these needs and consolidate the agency’s services on them, when possible. Not only will the ability to share information increase, this will result in greater leverage when negotiating contract terms and pricing.
  • Make the information “cloud ready.” Agencies that organize their data sets well enough for use across multiple platforms will be best positioned to take advantage of cloud services, and will be better able to deploy enterprise information to the cloud more easily.IT teams need to get into the habit of encrypting data into one common format (probably XML)—a process even more important if data moves through externally operated resources to the cloud.
  • Master solution integration. The shift to the cloud requires IT professionals to change their focus from owning and operating enterprise systems to becoming master information service integrators. In addition to linking legacy databases to SaaS, IT teams need to connect their private and public clouds to create a seamless technology environment that works like a single cloud custom-made for their specific enterprises.

    Bookmark and Share
    Cloud Musings on Forbes
    ( Thank you. If you enjoyed this article, get free updates by email or RSS - KLJ )
    Email ThisBlogThis!Share to XShare to Facebook
    Posted in cloud computing, GovCloud | No comments
    Newer Post Older Post Home

    0 comments:

    Post a Comment

    Subscribe to: Post Comments (Atom)

    Popular Posts

    • Government still wary of cloud computing
      Federal News Radio interviewed Ron Markezich, a corporate vice president of Microsoft, Mike Bradshaw, president of Google federal, and Mich...
    • NRRC Video Series - Video 5 : Boeing Ozone Dashboards for Emergency Management
      In September, the NCOIC delivered the Geospatial Community Cloud (GCC) demonstration . Sponsored by the National Geospatial-Intelligence Ag...
    • So what kind of consultant are you?
      Yesterday over lunch, a good friend of mine from the Limelight Marketing Group and I started talking about my recent transition. As you can...
    • Cloud Computing as a Strategic Asset
      For some reason, this week seems to have more in it than most. While the steady stream of briefing request seem to be increasing, the post b...
    • Iranian Protests Showcase Twitter, Facebook, YouTube (and Cloud Computing) !
      In covering unfolding events in Iran, the world's most powerful news outlets have been entirely dependent on the Twitter-provided flow o...
    • Vivek Kundra Nominated for Federal CIO
      Mr. Kundra's quote from the Wall Street Journal says it all: “I’m a big believer in disruptive technology. If I went to the coffee shop,...
    • MIT Survey: What A Response !!
      We've been quite surprised by the number of survey responses we've received.  THANK YOU !!   That subset of the cloud computing comm...
    • Robert Duffner Interviews Chris Kemp, NASA, and Kevin Jackson, NJVC, on GovCloud
      Recently, I had the pleasure of being interviewed by Mr. Robert Duffner , director of Product Management for Windows Azure , as part of his ...
    • BISNOW Data Center Event Highlight's Cloud
      A big thank you to BISNOW and my fellow panel members for an outstanding discussion and very informative event, last week's Data Center ...
    • CSC and Terremark target US Government with Cloud Computing
      Today's announcement by CSC reinforced the strong wave of cloud computing towards the Federal space. Ranked by Washington Technology Ma...

    Categories

    • 3Tera
    • 451
    • A. K. Cebrowski
    • ACT
    • ACT-IAC
    • adhoc information system
    • Air Force Maj. Gen. David Edgington
    • ajax
    • Akamai
    • Akamai Boeing Company
    • All Things Considered
    • amazon
    • Amazon Web Services
    • Amazon.
    • ambient awareness
    • American Council for Technology
    • Andres Seabrook
    • Andrew McLaughlin
    • Animoto
    • Appirio
    • Appistry
    • AppJet
    • AppLogic
    • Apptis
    • Army
    • ASD NII
    • Assistant Secretary of Defense
    • ATT
    • auto-scaling
    • Avner Algom
    • Azure
    • BAE Systems
    • BAH
    • Ballmer
    • Balmer
    • bandwidth auction
    • bandwidth cloud
    • bandwidth-on-demand
    • barack obama
    • Battle for Clicks
    • battlegroup cloud
    • Berkely Cloud Computing
    • BerkelyDB
    • Bigtable
    • bill clinton
    • Bill Gerety
    • blue business platform
    • BMC
    • Bob Gourley
    • Bob Lozano
    • Bob Marcus
    • Boeing
    • Booz Allen Hamilton
    • Brand Niemann
    • budgeting process
    • CANES
    • capital expenditures
    • carl ichan
    • CDC
    • Center for Strategic and International Studies
    • Centers for Disease Control and Prevention
    • child development group of mississippi
    • children's defense fund
    • China
    • Chirag Mehta
    • Chris Capossela
    • chris kemp
    • Chris Pearson
    • Christian Science Monitor
    • Christophe Bisciglia
    • Chrome
    • chuck mehle
    • CIA
    • Cinematic Artificial Intelligence
    • cio 2.0
    • CIO Survey
    • Cisco
    • cloud broker
    • cloud broker; cloud computing
    • cloud computing
    • cloud computing benefits
    • Cloud Computing Center
    • cloud computing concerns
    • Cloud Computing Decision
    • cloud computing dictionary
    • cloud computing events
    • Cloud Computing Expo
    • cloud computing group
    • Cloud Computing Guides
    • Cloud computing journal
    • Cloud Computing Marketplace
    • Cloud computing offerings
    • cloud computing portal
    • cloud computing research
    • cloud computing security
    • cloud computing survey
    • cloud computing taxonomy
    • Cloud Computing Twiki
    • Cloud computing use
    • Cloud computing value
    • Cloud Computing War Game
    • Cloud Computing Wargame
    • Cloud Economic Models
    • cloud interoperability
    • cloud rating
    • cloud redundancy
    • cloud reliability
    • Cloud Security
    • cloud services
    • cloud spectator
    • cloud standards
    • cloud vendors
    • CloudCamp
    • CloudCamp Federal
    • CloudCamp: Federal
    • Cloudera
    • CloudExpo
    • CloudNow
    • CNBC
    • CNET
    • Cohesiveft
    • Col. Vincent Valdespino
    • Colin McNamara
    • Collabnet
    • Controlled Unclassified Information
    • COOP
    • correlative analysis
    • Cryptographic data splitting
    • CSC
    • cubit
    • CUI
    • Customs and Border Patrol
    • Cybersecurity
    • Daoli
    • Dark Cloud
    • data center
    • Dataline
    • Dave Douglas
    • Dave Stegon
    • David Douglas
    • David Lindquist
    • David Mihelcic
    • David Ryan
    • Dawn Leaf
    • DDOS
    • defense
    • Defense Intelligence Agency CTO
    • definition operations
    • Dell
    • Department of Interior
    • DHS
    • Diane Bryant
    • DICOM
    • Dion Hinchcliffe
    • DISA
    • DISA CTO
    • Dissemination
    • DoD
    • DoD Cloud Computing
    • Dr. Brand Niemann
    • EAGLE
    • Earth Builder
    • Earthbuilder
    • ebook
    • EC2
    • Elastic Block Store
    • Elastra
    • EMC
    • Enomaly
    • Enomoly
    • enStratus
    • eric schmidt
    • Eurocloud
    • European Defense Agency
    • eweek
    • Exchange
    • Explaining Cloud Computingchristopher Barnatt
    • Exploitation
    • FBI
    • fccI
    • Fedcloud
    • Federal
    • Federal CIO
    • Federal Cloud Computing Wiki
    • Federal News Radio
    • Federal SOA Community of Practice
    • FedRAMP
    • FIPS
    • FirstChoice
    • FISMA
    • Forrester
    • FOSE 2009
    • gaming cloud
    • gartner
    • GEOINT
    • george bush
    • george mason university
    • George Reese
    • George W. Casey
    • Georgia
    • Geva Perry
    • Glenn Dasmalchi
    • Global Content Delivery Service
    • Go Grid
    • Golden Phoenix
    • Goldman
    • Google
    • Google Docs
    • google mindshare
    • google trends
    • GovCloud
    • Government
    • government cloud computing
    • Gravitant
    • green cloud computing
    • Greg Boss
    • grid computing
    • GSA
    • GSA FedRAMP Apps.gov
    • GSAW
    • HaaS
    • Hadoop
    • Harrison Donnelly
    • Henry Sienkiewcz
    • Hewlett Packard
    • high performance computing
    • hillary clinton
    • HL7
    • home depot
    • homeland security
    • HP
    • hype cycle
    • IaaS
    • IAC
    • IBM
    • IGT
    • Implemetation of Network-Centric Warfare
    • Industry Advisory Council
    • information
    • information operations
    • Information Sharing
    • Information Sharing Environment
    • Information Week
    • Inforworld
    • inmobile
    • intel
    • intelligence community
    • intelligence support
    • intelligence support information operations
    • intellipedia
    • Irving Wladasky-Berger
    • Israel
    • IT budget
    • Japan
    • Jason Miller
    • java
    • Jeff Barr
    • Jeffrey A. Sorenson
    • Jeremy Geelan
    • Jill Singer
    • Joe McKendrick
    • John Dvorak
    • John Foley
    • John Garing
    • John Grimes
    • john mccain
    • joint forces command
    • joint intelligence laboratory
    • Joint Warfighting Conference 08 (JWC 08)
    • jott
    • Juniper Networks
    • JWICS
    • Katie Lewin
    • Kevin Jackson
    • KMI Media
    • LANDWARNET
    • Larry Ellison
    • latency
    • Lauren States
    • law enforcement
    • Leslie Lenert
    • Letitia long
    • library of national intelligence
    • LinkedIn Answers
    • location based services
    • MaaS
    • maneuver warfare
    • marian wright edelman
    • MashupOS
    • McKinsey
    • MEDWEB
    • mentat
    • Michael Farber
    • Michael Vizard
    • microsoft
    • Midori
    • Mike Bradshaw
    • Mike Cameron
    • Mike Krieger
    • Military information technology
    • military secure mobile communications
    • MIT
    • MIT Survey
    • mobile
    • MobileMe
    • Mongo
    • National Defense University. IRM College
    • National Office for Cyberspace
    • National Public Radio
    • National Science Foundation
    • national security
    • NATO
    • NATO Communications and Information Systems Services Agency
    • Navy
    • Navy CIO Robert Carey
    • Navy Marine Corps Intranet
    • Navy Next Generation Enterprise Network
    • NC3
    • NCES
    • NCIC
    • NCOIC
    • NCOIC Plenary Session
    • NCSA
    • net-centric warfare
    • Netcentric Corporation
    • Network Centic Operations Industry Consortium
    • Network Centric Operations Industry Consortium
    • Networx
    • NextGen
    • Nexus
    • NGA
    • NGEN
    • Nicholas Carr
    • NIPRNet
    • NIST
    • NJVC
    • NLETS
    • NMCI
    • North Carolina
    • Northrop Grumman
    • Northrop Grumman Mission Systems
    • NPR
    • NRO
    • NSA
    • NSG
    • NVTC
    • O'Reilly Media
    • Office Commuincations
    • Office of Force Transformation
    • OMB
    • On The Frontlines
    • ontology
    • operational expenditures
    • Oracle
    • Oracle On Demand
    • oral history
    • OSD Cloud ComputingD
    • PaaS
    • Parabon
    • Parker Harris
    • Paul Strassmann
    • Pauline Healy
    • PED
    • Peter Coffee
    • Peter Nickolov
    • Petra Mayer
    • platform-as-a-service
    • plenary
    • PlugIntoTheCloud.com
    • PostPath
    • private clouds
    • Processing
    • project hydrazine
    • public - private clouds
    • Q-layer
    • RACE
    • Rackspace
    • RAID
    • Ramat Gan
    • Randall Stross
    • Red Herring
    • relational databases
    • Republican National Convention
    • Reuven Cohen
    • Richard Martin
    • RightScale
    • RNC
    • Rob Vietmeyer
    • robert brewin
    • Robert Carey
    • robert duffner
    • Rod Fontecilla
    • Roger Baker
    • Ron Markezich
    • Russia
    • SaaS
    • Sachs
    • SAIC
    • salesforce.com
    • SAP
    • scalability computing
    • Scott Lowe
    • secure cloud computing
    • security
    • security risk
    • Sensitive But Unclassified
    • Servervault
    • service level agreements
    • shane robinson
    • SharePoint
    • SinpleDB
    • SIPRNet
    • SISO
    • situational awareness
    • six degrees of separation
    • SLA
    • SOA
    • SOA Predictions
    • SOA-R
    • SOA-R Interactive Network Group
    • solar powered mobile communications
    • Soraya Correa
    • sourceforge
    • space situational awareness
    • speech
    • stateless computing
    • Steam Cloud
    • Steve Mills
    • steve stroh
    • Steven L Armentrout
    • Stevie Clifton
    • sun
    • Susanne Balle
    • SYS-CON
    • tactical cloud
    • tactical simulations
    • TECH Bisnow Washington
    • technology
    • TechWeb
    • Terremark
    • Terremark Worldwide
    • Terry Morgan
    • The Big Switch
    • The Economist
    • TIC
    • Tim May
    • Tivoli
    • Todd Wiseman
    • TPM
    • trademark
    • Traditional vs. Cloud
    • transcloud
    • Transition Study Group
    • Trezz Media
    • Tsinghua University
    • Twitter
    • UAV
    • USJFCOM
    • USPTO
    • utility computing
    • Valiant Angel
    • Valve
    • VanRoekel
    • VDC-OS
    • Verizon
    • Veteran's Administration
    • Virtual Network Link
    • virtualization
    • Virtustream
    • Vista
    • Vivek Kundra
    • Vivwk Kundra
    • VMware
    • voiceinteraction
    • Wall Street Journal
    • Walt Mossberg
    • web2.0
    • Werner Vogels
    • White House
    • William Forrest
    • wireless
    • Wohl Centre
    • World Summit of Cloud Computing
    • XCalibre
    • XEN
    • yahoo
    • ZeroNines

    Blog Archive

    • ►  2013 (39)
      • ►  December (7)
      • ►  November (7)
      • ►  October (2)
      • ►  September (2)
      • ►  August (3)
      • ►  July (3)
      • ►  June (2)
      • ►  May (3)
      • ►  April (4)
      • ►  March (3)
      • ►  February (3)
    • ►  2012 (27)
      • ►  December (2)
      • ►  November (4)
      • ►  October (4)
      • ►  September (2)
      • ►  August (3)
      • ►  July (3)
      • ►  May (2)
      • ►  April (1)
      • ►  March (4)
      • ►  February (1)
      • ►  January (1)
    • ▼  2011 (32)
      • ►  December (1)
      • ►  November (2)
      • ►  October (6)
      • ▼  September (4)
        • Implementation of Cloud Computing Solutions in Fed...
        • Implementation of Cloud Computing Solutions in Fed...
        • Implementation of Cloud Computing Solutions in Fed...
        • Implementation of Cloud Computing Solutions in Fed...
      • ►  August (1)
      • ►  July (2)
      • ►  June (2)
      • ►  May (2)
      • ►  April (4)
      • ►  March (3)
      • ►  February (1)
      • ►  January (4)
    • ►  2010 (54)
      • ►  December (4)
      • ►  November (3)
      • ►  October (4)
      • ►  September (3)
      • ►  August (5)
      • ►  July (3)
      • ►  June (5)
      • ►  May (4)
      • ►  April (3)
      • ►  March (5)
      • ►  February (5)
      • ►  January (10)
    • ►  2009 (115)
      • ►  December (1)
      • ►  November (6)
      • ►  October (6)
      • ►  September (7)
      • ►  August (10)
      • ►  July (13)
      • ►  June (10)
      • ►  May (8)
      • ►  April (11)
      • ►  March (13)
      • ►  February (14)
      • ►  January (16)
    • ►  2008 (200)
      • ►  December (19)
      • ►  November (22)
      • ►  October (23)
      • ►  September (23)
      • ►  August (23)
      • ►  July (30)
      • ►  June (26)
      • ►  May (34)
    Powered by Blogger.

    About Me

    Unknown
    View my complete profile