• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Outsourcing to Public Cloud : How You Should Proceed

By Abhishek Ghosh April 22, 2013 11:13 am Updated on April 22, 2013

Outsourcing to Public Cloud : How You Should Proceed

Advertisement

Outsourcing to Public Cloud includes aspects general objectives, establishment of a Outsourcing management with organizational structures and responsibilities. Any company that benefits from the use of a public cloud should first think about a strategy for outsourcing projects. The outsourcing strategy illustrates how an outsourcing project in the whole strategy has to be integrated,especially in the risk strategy. Strategies for outsourcing to Public Cloud demands organizational structures and responsibilities, the definition of acceptable risk and development of fallback strategies.

 

Introduction to Outsourcing to Public Cloud

 

For setting the strategies for outsourcing to Public Cloud, it must be clarified which functions should not be outsourced to a public cloud (due to legal requirements, to high risks or other reasons). Furthermore, the outsourcing management must be integrated into the management system of the company. As a minimum requirement, no more outsourcing of a function in a public cloud without having the security concepts, SLAs and contracts with defined, measurable benefits may be realized. It is essential to implement an outsourcing process.

 

Suggested Reading For Better Understanding of Cloud Computing Models : Cloud Computing Service Models and Deployment
 

Advertisement

---

Outsourcing to Public Cloud

 

Outsourcing to Public Cloud : How You Should Proceed

 

Planning phase

 

First, different alternatives are for cloud computing needs to be developed at gross level and to undertake an initial “Security Analysis”. Distinguishing features of the alternatives include the localities of data centers, options for limiting the public cloud to certain regions, control options for the data flow and the offered service level (Software as a Service, Platform as a Service or Infrastructure as a Service). The alternatives for outsourcing in the public cloud thinking for a safety aspect – and subjected to risk analysis. In addition, it is determined which law (in particular in data protection) apply and organizational requirements for the various alternatives. For all of these information are to be met as “security requirements”. Then it is decided which alternatives can ever be considered. For a catalog of these alternatives is created, which describes in detail the outsourcing and all the required services including all safety requirements. The offers of the providers can be evaluated on the basis of this performance catalog. Deficits can be identified by providers that have not yet included in the safety analysis before. In addition, a due diligence examination of the provider can be performed. After a decision is made there is need for an alternative list of providers.

 

Contract phase

 

The aim is, contracts and / or service level agreements ( SLAs to agree on a complete and verifiable specifications to ensure quality and information security in the public cloud). Particular attention when drafting contracts require include the following points:

  • Granting audit rights : In general, the provider will want to give their customers no audit rights for its data center. This would be for the provider on the other one hand too costly, on the opposite hand, the level of security would decline, when many foreign auditors of the customers would inspect the data centers. Therefore it makes sense to seek grant audit rights for documents, descriptions and protocols in order to understand about the correct flow of processes. In addition, certifications may be required to ensure a minimum standard for information security (Like ISO 27001 certification). Especially setting the definition of the measurable indicators for confidentiality and integrity protection as goals is not an easy task. Meaningful indicators to be stated by the provider for availability and performance.
  • Interface Definition : Particularly important for the correct operation of the outsourced interfaces for security monitoring and incident handling. This process must be defined with clear responsibilities, escalation and communication paths between customer and provider.
  • Arrangements for the termination of cloud services : Also arrangements for the termination of services of the public cloud are to be taken in to consideration. In particular, it must also be regulated, as to which data are transferred and the data deleted can not be restored.

Migration After conclusion

 

Now, the gradual and planned outsourcing of the function begins. Part of planning the creation of security concepts include both the migration as well as the operation and termination of the swap. The basis for their creation are the results of the risk analysis and the selection process of the planning stage. The implementation and testing of outsourcing to the cloud made in accordance with established security policies.

 

Operational phase

 

During the operational phase of the outsourced functions under the contract and security concepts are operated by the provider. It is important to have a working security monitoring system to identify any deviations from the required security level quickly. The Security Monitoring also demonstrate the fulfillment of the contracted services, continuously improving.

 

Termination of the swap

 

With this step, a controlled termination of cloud services is performed. Also, the termination must be made in accordance with the contractual provisions. The provider must demonstrably clear so that it can not be restored even with sophisticated methods and technologies, particularly data on its systems. These include not only data of the business process, but also operational data such as log data from systems and applications. Outsourcing to Public Cloud can be a difficult phase for the most medium sized companies.
 

Abhishek-Ghosh Tagged With outsourcing to the public cloud

This Article Has Been Shared 361 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Outsourcing to Public Cloud : How You Should Proceed

  • Cloud Computing XaaS : Approaches and Possibilities

    Cloud Computing XaaS is an approach towards everything to provide as a service to make available and consume like we use electricity.Read the important aspects.

  • Cloud computing as a Solution for Virtual Desktops and Applications

    Cloud computing as a solution to the delivery of virtual desktops and applications in the corporate, academic and research purposes becoming more useful.

  • Cloud Computing Risk Analysis

    Cloud Computing Risk Analysis is an important administrative and marketing task. ENISA itself has a pdf guide. However, we will cover a generalized idea.

  • Cloud Computing Open Standards and Interfaces

    Cloud Computing Open Standards and Interfaces promises more flexibility in the cloud. The article explains the benefits of open standards and interfaces.

  • Capabilities Required by the Professionals in the Era of Cloud Computing

    Capabilities required by the professionals in the era of Cloud Computing is not limited to IT sector but it includes the Health, Law and other professionals.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Comments

  1. AvatarISO 27001 is an Information Security Management System standard says

    January 17, 2014 at 4:19 am

    I will immediately seize your own rss feed as I cannot in locating the e-mail monthly subscription url or maybe e-newsletter support. Are there almost any? Make sure you make it possible for me know to ensure I possibly could join. Thanks a lot.

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Exploring the Benefits and Advantages of Microsoft’s Operating System March 22, 2023
  • Web Design Cookbook: Accessibility March 21, 2023
  • Online Dating: How to Find Your Match March 20, 2023
  • Web Design Cookbook: Logo March 19, 2023
  • How Starlink Internet Works March 17, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Outsourcing to Public Cloud : How You Should Proceed," in The Customize Windows, April 22, 2013, March 22, 2023, https://thecustomizewindows.com/2013/04/outsourcing-to-public-cloud-how-you-should-proceed/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT