Unit II Cloud Services Strategy
Unit II Cloud Services Strategy
Cloud Strategy Fundamentals, Cloud Strategy Management Framework, Cloud Policy, Key Driver for
Adoption, Risk Management, IT Capacity and Utilization, Demand and Capacity matching, Demand
Queueing, Change Management, Cloud Service Architecture.
Strategic Management is the process of formulating, implementing, and evaluating cross functional
decisions that enable an organization to achieve its objectives. The strategic management model
entails strategy assessment, formulation / planning, execution and evaluation.
The strategic management process plays a vital role when an organization is undergoing significant
change, for example when a startup company is transitioning to scale up its business or when a
company has been bought by another competitor. It helps to realign decisions to ensure your business
has the competitive advantage needed to be successful.
The Strategic Management framework has multiple phases and I think the picture below helps to
detail out the various core elements.
There are other SM frameworks and all contain similar core elements.
1. Every Strategic Management framework starts with an Assessment. This is the phase
of gathering data and information to understand the needs of the business, the
company's strategic direction, and the initiatives that will assist in growth and
expansion.
3. Based on the results of the analysis, the business can then formulate a strategy.
Strategy Formulation is the phase of deciding the best course of action for
accomplishing the business's objectives and purpose. This is the stage to develop
a vision and mission, long term objectives, generate alternative strategies and
choose which strategies to pursue.
The bottom line is that there is not one prescription that fits all. Businesses have to create and
adapt a strategic management process that works best for their them and those that they
serve. If done right, it helps to align and connect the dots between the big picture strategy to
the more operational elements, targets and initiatives within the business.
Cloud Policies
Cloud policies are the guidelines under which companies operate in the cloud. Often
implemented in order to ensure the integrity and privacy of company-owned information, cloud
policies can also be used for financial management, cost optimization, performance
management, and network security.
The cloud is not inherently insecure
With regard to the risk of data loss, the cloud is not inherently insecure. Cloud service
providers build their platforms focusing more on security and governance than companies who
build on-premises IT infrastructures that are protected by a firewall. It is the way the cloud is
used that often creates an issue, with developers sometimes failing to take the appropriate
precautions when deploying resources.
Company’s should take advantage of cloud service providers´ tools to encrypt data and control
who has access to it, and to implement cloud policies that address the issue of inappropriately-
protected deployments. To ensure these policies are
enforced, companies can use cloud management platforms that collect and analyze logs and
create audit trails in order to identify and correct policy violations.
Cloud policies for financial management not only help control operational budgets and monitor
cost trends, but can be useful in identifying sudden increases in cloud spend that could be
indicators of a bigger security problem—for example hackers obtaining login credentials and
launching Virtual Machines on the company’s cloud account that are then used for
cryptocurrency mining.
Additionally, establishing a Cloud Financial Management practice can also help cost
optimization process. Cloud Financial Management (CFM), also known as FinOps or Cloud Cost
Management, is a function that helps align and develop financial goals, drive a cost-conscious
culture, establish guardrails to meet financial targets, and gain greater business efficiencies.
In recent years there has been a growth in software solutions for optimizing cloud costs. These
are available from cloud service providers or—if your business operates in a multi-cloud or
hybrid cloud environment—third party software solutions are available from multiple vendors.
These solutions often have the capability to apply cost optimization cloud policies to assets
across multiple platforms.
What some software solutions lack is the capability to manage Reserved Instances, Reserved VM
Instances and Committed Use discounts. The benefit of being able to apply cloud policies to
Reserved Instances is that you will be able to identify when cost savings can be made by
purchasing more Reserved Instances, or when your existing Reserved Instance purchases are not
being fully utilized.
Cloud policies for performance management enable you to specify performance thresholds for
Virtual Machines and storage volumes so you can monitor for underutilized and overutilized
assets. Underutilized Virtual Machines and storage volumes should be downgraded for cost
efficiency, while overutilized assets should be upgraded to avoid performance headaches.
It is important to remember the application of cloud policies for performance management will
affect the policies put in place for financial management and cost optimization. For example, if
you upgrade assets to increase their performance, this will have an impact on operational
budgets and cost optimization. If you downgrade assets, the reverse will apply.
Maintaining a secure perimeter to allow only legitimate traffic onto your network is critical in
the cloud and the leading cloud service providers acknowledge this by supplying tools to
determine which users or group identities should have access to hosted services and
applications. Amazon and Microsoft both call their tools “Security Groups”, Google offers the
“Identity-Aware Service”.
Within each of these tools, the capability exists to apply network security cloud policies that
define what inbound traffic is allowed. As well as using cloud policies for access control, best
practice is to apply policies to alert you to Security Group misconfigurations, when new Security
Groups are created, when Security Groups exist that are not being used, and when assets have
too many rules applied to them.
Prior to creating cloud policies, it is essential to have total visibility over your cloud
environment in order to fully understand what assets your company has deployed in the cloud
and how they are being used. CloudHealth gives you the total visibility required and tools to
analyze costs, usage, performance, and security to enable you to make informed choices when
applying cloud policies.
Risk Management
Cloud computing services have seen exponential growth by individuals, businesses, and
organisations over the past few years. Though cloud services provide a boost to the business
and have immense advantages,
cloud-based information systems are exposed to threats that can have adverse effects on
organisational operations, assets, and individuals. Therefore, risk management plans in cloud
computing are implemented by organisations to mitigate cloud-based risks, improve system
security, and expedite business growth.
Cloud computing is a technology that allows its user to access resources such as storage,
memory, network, and computing; these resources are physically present at any geographical
location, but can be accessed over the internet from anywhere in the globe.
Risk management allows organizations to prevent and mitigate any threats, service disruptions,
attacks or compromises by quantifying the risks below the threshold of acceptable level of risks.
• The inception of the risk management process starts with the identification of the risks
that may negatively influence an organisation's strategy or compromise cloud system
security. Operational, performance, security, and privacy requirements are identified.
The organisation should uncover, recognise and describe risks that might affect the
working environment. Some risks in cloud computing include cloud vendor risks,
operational risks, legal risks, and attacker risks.
• Analyze the risk - After the identification of the risk, the scope of the risk is analyzed. The
likelihood and the consequences of the risks are determined. In cloud computing, the
likelihood is determined as the function of the threats to the system, the vulnerabilities,
and consequences of these vulnerabilities being exploited. In analysis phase, the
organisation develops an understanding of the nature of risk and its potential to affect
organisation goals and objectives.
• Evaluate the risk - The risks are further ranked based on the severity of the impact they
create on information security and the probability of actualizing. The organisation then
decides whether the risk is acceptable or it is serious enough to call for treatment.
• Treat the risk - In this step, the highest-ranked risks are treated to eliminate or modified to
achieve an acceptable level. Risk mitigation strategies and preventive plans are set out to
minimise the probability of negative risks and enhance opportunities. The security
controls are implemented in the cloud system and are assessed by proper assessment
procedures to determine if security controls are effective to produce the desired outcome.
• Monitor or Review the risk - Monitor the security controls in the cloud infrastructure on
a regular basis including assessing control effectiveness, documenting changes to the
system and the working environment. Part of the mitigation plan includes following up
on risks to continuously monitor and track new and existing risks.
This section involves the primary risks associated with cloud computing.
1. Data Breach - Data breach stands for unauthorized access to the confidential data of
the organisation by a third party such as hackers. In cloud computing, the data of the
organisation is stored outside the premise, that is at the endpoint of the cloud service
provider(CSP). Thus any attack to target data stored on the CSP servers may affect all
of its customers.
2. Cloud Vendor Security Risk - Every organisation takes services offered by different
cloud vendors. The inefficiency of these cloud vendors to provide data security and risk
mitigation directly affects the organisation's business plan and growth. Also, migrating
from one vendor to another is difficult due to different interfaces and services provided
by these cloud vendors.
3. Availability - Any internet connection loss disrupts the cloud provider's services,
making the services inoperative. It can happen at both the user's and the cloud
service provider's end. An effective risk management plan should focus on availability
of services by creating redunadancy in servers on cloud such that other servers can
provide those services if one fails.
4. Compliance - The service provider might not follow the external audit process,
exposing the end user to security risks. If a data breach at the cloud service provider's
end exposes personal data, the organisation may be held accountable due to improper
protection and agreements.
Apart from these risks, cloud computing possesses various security risks bound under 2 main
categories.
External security risks are threats to an organisation arising from the improper handling
of the resources by its users and targeted attacks by hackers.
1. Unauthorized Access - The cloud-based deployment of the organisation's
infrastructure is outside the network perimeter and directly accessible from the public
internet. Therefore, it is easier for the attacker to get unauthorized access to the server
with the compromised credentials.
2. Accounts Hijacking - The use of a weak or repetitive password allows attackers to
gain control over multiple accounts using a single stolen password. Moreover,
organizations using cloud infrastructure cannot often identify and respond to such
threats.
3. Insecure APIs - The Application Programming Interfaces(APIs) provided by the cloud
service provider to the user are well-documented for ease of use. A potential
attacker might use this documentation to attack the data and resources of the
organisation.
Risk management enables organisations to ensure any potential threats to cloud- deployments
security, assets, and business plans are identified and treated before they derail the
organisation's goals. It has far-reaching benefits that can fundamentally change the decision
making process of the organisation. Here are some benefits of robust risk management:
1. Forecast Probable Issues - The risk management process in cloud computing identifies
all the possible risks or threats associated with the cloud service provider, the cloud
vendor, the organisation, and the users. It helps an organisations to mitigate risks by
implementing appropiate control strategies and create a better business plan.
The capacity, in regards to organizational resource capacity, is the maximum amount of output
that can be produced in a given period of time through effective
management of an organization’s resources. It refers to the potential of organization
to be effective and productive. The capacity of an organization depends on the
effective allocation of resources and their management.
Organizational resources refer to all the assets that are available at an organization’s
disposal for use during the production process. The four major types of resources used by
organizations around the world are human, financial, physical and information resources.
The aim of effective capacity planning is to make usable capacity match the product
demands and any mismatch between the capacity and demand will result in unhappy
customers and underused resources. So, an effective strategy is required to ensure that
Utilization
From an operations point of view, actual production in any industry is typically less than the
effective capacity and it varies based on how efficiently the workforce is involved, the degree of
disruptions, the product quality, efficiency of the equipment, and a number of other factors.
This leads to the related measure of utilization, which represents the proportion of designed
capacity that is actually being used.
There are two general approaches for accomplishing demand and capacity.
By shifting demand and capacity an organization seeks to shift customers away from periods
in which demand exceeds capacity. Perhaps by convincing them to use the service during
periods of slow demand. This may be possible for some customers but not for others.
• Stretch labour: In many service organizations, employees are asked to work longer
and harder during periods of peak demand. For example, consulting organizations
face extensive peaks and valleys with respect to demand for their services. During
peak demand, associates are asked to take on additional projects and work longer
hours. And front-line service personnel in banks, tourist attractions, restaurants and
telecommunications companies are asked to serve more customers per hour during
busy times.
This basic strategy is sometimes known as a “chase demand” strategy. By adjusting service
resources creatively, organizations can in effect chase the demand curves to match capacity
with customer demand patterns. Time, labour, facilities, and equipment are again the focus,
this time with an eye toward adjusting the basic mix and use of these resources.
• Use part-time employees: In this case, the organization’s labour resource is being
aligned with demand. Retailers hire part-time employees during the holiday rush, tax
accountants engage temporary help during tax season, and tourist resorts bring in
extra workers during peak season. Restaurants often ask employees to work split shifts
(work the lunch shift, leave for a few hours, and come back for the dinner rush) during
peak mealtime hours.
• Outsourcing: Firms that find they have a temporary peak in demand for a service that
they cannot perform themselves may choose to outsource the entire service. For
example, in recent years, many firms have found they don’t have the capacity to fulfil
their own needs for technology support, Web design, and software-related services.
Rather than try to hire and train additional employees, these companies look to
firms that specialize in outsourcing these types of functions as a temporary (or
sometimes
long-term) solution.
Queuing theory refers to the study comprising a queue’s features, functions, and
imperfections. This mathematical study is very relevant in operations research since its
appropriate application helps in eliminating operational bottlenecks and service failures.
• Arrival: The process starts with the arrival of a single individual or a group of
individuals. They may come in different intervals, and it may influence the operations. Check
on the formation of the queue and note down any variation in the arrival. Track every aspect
of the process at this stage.
• Movement: This part mainly focuses on the movement of the queue and the
individual’s behavior. It’s like monitoring their activities and looking at whether the customer is
impatient or is habituated with the situation. Take feedback and see how they react to it.
Please note down where they want any changes. Many times, it is observed huge gatherings in
a small place tend to develop negative attributes towards a business. In such a case, the
customer might choose a different option. Adapt necessary arrangements or alternative
procedures to keep the customer and increase efficiency.
• Service: It is one of the vital parts of the process. If more time is taken to solve the
query, it will increase the line. In addition, it may cause boredom and frustration in
customers. A better understanding and application of the theory is important in reducing
the negative impacts of the long waiting line and long response time.
• Expression: It is the final step of the process. It is important to note that the person
leaving the queue makes an impression on the people standing next to him. An individual’s
negative feedback is bound to affect the business. Therefore, preference should be given to
every person and worked with full diligence. An ideal expression speaks a lot of the services
offered to him.
Let’s look into the basic queuing theory formula for a queuing system explained by
Little’s Law.
L= λ*W
Or
Number of items in the queue = Arrival rate × Average time spent in the queue
Another formula based on the queuing system model by Erlang derived from Little’s
Law is the following:
L = (λ – σ )/ μ
σ: Dropout rate
μ: Departure rate
The goal of cloud service architecture is to ensure that cloud services are reliable,
secure, and meet the needs of the business. It also helps to ensure that costs are
controlled, and that service levels are met.
Application layer
Developers create and manage end users’ cloud-based applications at the application
layer.
Services layer
The services layer includes various services that are utilized by applications to power
their functionality.
Runtime layer
Storage layer
The storage layer is responsible for storing and managing data, including
structured and unstructured information.
Infrastructure layer
The infrastructure layer manages the underlying hardware infrastructure of the cloud,
including compute, network, and storage resources.
The security and management layer ensures that data is protected from unauthorized
access and that the cloud environment is properly monitored and managed.
The client layer, which enables users to access applications and services from any
location,
Front-end layer
The front-end layer provides the user interface for accessing cloud services.
Back-end layer
The back-end layer of a cloud architecture handles all the behind-the-scenes work,
including managing data storage, network communication, and server resources. It
also includes the cloud controller, ensuring the entire system operates efficiently and
securely.