The SoftArc Engineering Ltd, a civil engineering company, is planning to utilize the cloud infrastructure for providing increased level of applicability and a better degree of flexibility for some of their Line of Business (LOS) operations. Moreover, the company board also incorporates the hybrid cloud methodology for achieving significant cost savings in the maintenance of their ICT infrastructure. So, this report focuses on how the hybrid cloud strategy will affect their Business Continuity Plan and their disaster recovery and backup strategies.
For SoftArc Engineering firm which needs to achieve higher flexibility can apply the hybrid cloud strategy on Infrastructure as a Service (IaaS) architecture.
The IaaS cloud infrastructure services are ascetic models for acquiring, auditing, and administering the infrastructures of remote datacenter like virtualized, networking, storage, and networking services such as firewalls. The users can procure IaaS based on their utilization like electricity billing (Sotomayor, Keahey & Foster, 2006).
When compared to IaaS and PaaS architectures, IaaS consumers are authoritative for administering applications, runtime, and Operating Systems. The other services provided by IaaS include databases, virtualization layer services, and messaging queues. Examples for IaaS cloud architecture include Amazon Web Services (AWS), Microsoft Azure, Google Compute Engine, Joyent, and Cisco Metapod. According to the Cisco Research in 2013, the service revenues after utilizing IaaS are increased from $ 15.6 billion to $ 35.4 billion (Nurmi, 2008).
Risks |
Solutions |
The information security threats will be encountered |
The organizations contain some security regulation and contractual requirements. The security demands of the organization can be easily met through strict requirements in their agreements and safety regulations |
The risks are initially related to multi-resident frameworks and employee who provides hardware management at the cloud service provider |
The trust level can be increased through contracts, committed resources, and SLAs. |
Risk evaluation issue is higher than that of the control execution complication |
The company should ensure the techniques through which they issue and use identity associated with public cloud provider does not reduce the safety and security inside their private cloud environment |
The applications vary all the time, and when these applications are extrinsic to the control of the organization, they will not be able to resolve the issue when software update is performed suddenly. So, a modification in single application can produce co-operation issues with other applications, that leads to main confusion within the most condemnatory company applications |
Small firms and small departments in larger firms can select a whole software solution such as office productivity applications e.g. email, word processor, or spreadsheet. These software solutions are separated from other resources of the firms and provide constant administration control which is a portion of the complete solution |
The distinction of prevailing and new application loads will be complicated when the organization is migrated to hybrid cloud |
By differentiating the workloads depending on the security needs, they are formulated into groups serving as a controller to check whether or not the certain workload are compliant with the security procedure when they are executed outside of the firewall |
Another major issue for organizations employing hybrid cloud strategy is the capability of the cloud service providers to provide continual 24/7 service for their business related applications. |
The organization executives ensure that the employed hybrid cloud strategy is made for achieving high availability. The service providers can enhance the organization’s existing disaster recovery strategy, along with the capability to reproduce data in the distributed servers across the globe that reduces the occurrences of data loss. By this way, the implementation of hybrid cloud strategy offers an efficient level of organization continuity when data is hosted in external servers and storage devices. |
The security issues encountered in the incorporation of Hybrid cloud is not because of the hybrid cloud strategy but due to several factors like improper organizational network execution, inefficient security protocols, and ineffective management. The larger barriers for hybrid cloud include incompetent compliance, inadequacy of encryption, lack of risk assessment techniques, deficiency in data redundancy, data loss, etc.
Certain security steps and controls are required to avoid the hybrid cloud security threats listed below:
The security controls for dealing with the above security threats are provide below:
According to the vice president of cloud services at VMware ‘Mathew Lodge’, the hybrid cloud proffers certain advantages for BCP and disaster recovery. It can leads to the inexpensive disaster recovery while improving the agility and flexibility of disaster recovery.
So planning for the recovery of disasters in cloud environment allows the user to note down the failures instantly. Hence, the users have to deploy a business strategy that will match the application’s downtime tolerance.
The cloud platforms for e.g. Microsoft Azure offers geographically divided networks around the globe. These cloud platforms offer abilities that gives support to high availability and various disaster recovery cases (Sotomayor, 2009). Microsoft Azure contains application resiliency and disaster recovery features utilized in many of its cloud services. Hence, by deploying cloud platforms like Azure, the larger business continuity plan can be implemented in SoftArc organization.
The interrelated characteristics like availability, fault tolerance, and scalability contribute to the overall BCP solution. The specified owner must administer the entire disaster recovery, testing, and automation. The implementation of cloud platform like Azure can offer new capacities and additional challenges for crafting robust hybrid cloud applications that can handle failures.
8. Mechanisms for performing Remote Server Administration, Resource, and SLA Management:
The remote administration system, resource management system, and SLA management system offer integrated application programming interfaces and are offered individually as custom software applications or merged into several product suites.
The remote administration mechanism offers configuration management tools for managing cloud-based IT resources.
The remote administration mechanism can generate a portal for accessing management features of several systems including resource administration, billing management, and SLA management systems (Rochwerger, 2008).
Figure 1: Remote Server Administration System
The tasks that can be performed by the cloud users through remote administration system are QOS monitoring, SLA fulfilment, cost management, managing security credentials, authorization management, access control management, capacity planning,
Step 1: Virtual network for multi-tiered SharePoint server and active directory framework should be set up in AWS.
Step 2: The database tier must be launched. An AWS cloud enabled SQL server 2010 Amazon Machine Image is created to authorize configuration of SQL server components of Sharepoint Server farm.
Step 3: Then the application server tier is launched. This involves installing Sharepoint servers using Sharepoint windows PowerShell scripts.
Step 4: After that web Front-end tier is set up. This involves the installation of web Front-end servers for enabling work load balanced acquisition to Sharepoint web application by utilizing Sharepoint Amazon Machine Image created in the above step (Sotomayor,2008). The Amazon elastic load balancer is deployed in front of Web Front End Servers.
Step 5: This includes the configuration of SharePoint farm servers. The application server instances are configured by employing the Sharepoint technologies and Products configuration wizard.
i. The IT security compliance issues are encountered. The AWS Relational Database Management System is not HIPPA compliant with SQL server 2010 (Snell, 2010).
ii. The shared storage required for Microsoft SQL server is not supported in AWS. The third-party solution like SIOS is recommended by Microsoft Azure and AWS.
iii. “Always On availability groups” are not supported in Microsoft SQL server standard edition.
iv. Elastic Beanstalk modifies the instances while provisioning, which leads to issues in the AMI.
v. More time will be consumed for configuring the Sharepoint farm servers through AWS marketplace.
Conclusion:
The migration from a conventional data center based technology environment to cloud-based environment has several advantages. In many cases, the better performance can be achieved by the transition from data center, to private IaaS infrastructure, followed by the migration to Hybrid IaaS cloud environment.
References:
Nurmi, D. (2008, January 8). The Eucalyptus Open-Source Cloud-Computing System. Retrieved from www.cca08.org/papers.php.
Foster, I. (1999). A Distributed Resource Management Architecture that Supports Advance Reservations and Co-Allocation. Proc. Int’l Workshop on Quality of Service, 3(2), 27-36.
Snell, Q. (2000). The Performance Impact of Advance Reservation Meta-Scheduling. Proc. Workshop Job Scheduling Strategies for Parallel Processing (IPDPS 00/ JSSPP 00), 137-153.
Sotomayor, B., Keahey, K. & Foster, I. (2006). Overhead Matters: A Model for Virtual Resource Management, Proc. 1st Int’l Workshop on Virtualization Technology in Distributed Computing (VTDC 06), 5, 2006.
Rochwerger, B. (2008). The Reservoir Model and Architecture for Open Federated Cloud Computing. IBM Systems J, 4(3), 160-178.
Sotomayor, B. (2008, February 9). Capacity Leasing in Cloud Systems using the OpenNebula Engine. Retrieved from www. cca08.org/papers.php.
Sotomayor, B. (2009). Resource Leasing and the Art of Suspending Virtual Machines. Proc. 11th IEEE Int’l Conf. High-Performance Computing and Communications (HPCC 09), 12(4), 59-68.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download