• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Outsourcing to Public Cloud : How You Should Proceed

By Abhishek Ghosh April 22, 2013 11:13 am Updated on April 22, 2013

Outsourcing to Public Cloud : How You Should Proceed

Advertisement

Outsourcing to Public Cloud includes aspects general objectives, establishment of a Outsourcing management with organizational structures and responsibilities. Any company that benefits from the use of a public cloud should first think about a strategy for outsourcing projects. The outsourcing strategy illustrates how an outsourcing project in the whole strategy has to be integrated,especially in the risk strategy. Strategies for outsourcing to Public Cloud demands organizational structures and responsibilities, the definition of acceptable risk and development of fallback strategies.

 

Introduction to Outsourcing to Public Cloud

 

For setting the strategies for outsourcing to Public Cloud, it must be clarified which functions should not be outsourced to a public cloud (due to legal requirements, to high risks or other reasons). Furthermore, the outsourcing management must be integrated into the management system of the company. As a minimum requirement, no more outsourcing of a function in a public cloud without having the security concepts, SLAs and contracts with defined, measurable benefits may be realized. It is essential to implement an outsourcing process.

 

Suggested Reading For Better Understanding of Cloud Computing Models : Cloud Computing Service Models and Deployment
 

Advertisement

---

Outsourcing to Public Cloud

 

Outsourcing to Public Cloud : How You Should Proceed

 

Planning phase

 

First, different alternatives are for cloud computing needs to be developed at gross level and to undertake an initial “Security Analysis”. Distinguishing features of the alternatives include the localities of data centers, options for limiting the public cloud to certain regions, control options for the data flow and the offered service level (Software as a Service, Platform as a Service or Infrastructure as a Service). The alternatives for outsourcing in the public cloud thinking for a safety aspect – and subjected to risk analysis. In addition, it is determined which law (in particular in data protection) apply and organizational requirements for the various alternatives. For all of these information are to be met as “security requirements”. Then it is decided which alternatives can ever be considered. For a catalog of these alternatives is created, which describes in detail the outsourcing and all the required services including all safety requirements. The offers of the providers can be evaluated on the basis of this performance catalog. Deficits can be identified by providers that have not yet included in the safety analysis before. In addition, a due diligence examination of the provider can be performed. After a decision is made there is need for an alternative list of providers.

 

Contract phase

 

The aim is, contracts and / or service level agreements ( SLAs to agree on a complete and verifiable specifications to ensure quality and information security in the public cloud). Particular attention when drafting contracts require include the following points:

  • Granting audit rights : In general, the provider will want to give their customers no audit rights for its data center. This would be for the provider on the other one hand too costly, on the opposite hand, the level of security would decline, when many foreign auditors of the customers would inspect the data centers. Therefore it makes sense to seek grant audit rights for documents, descriptions and protocols in order to understand about the correct flow of processes. In addition, certifications may be required to ensure a minimum standard for information security (Like ISO 27001 certification). Especially setting the definition of the measurable indicators for confidentiality and integrity protection as goals is not an easy task. Meaningful indicators to be stated by the provider for availability and performance.
  • Interface Definition : Particularly important for the correct operation of the outsourced interfaces for security monitoring and incident handling. This process must be defined with clear responsibilities, escalation and communication paths between customer and provider.
  • Arrangements for the termination of cloud services : Also arrangements for the termination of services of the public cloud are to be taken in to consideration. In particular, it must also be regulated, as to which data are transferred and the data deleted can not be restored.

Migration After conclusion

 

Now, the gradual and planned outsourcing of the function begins. Part of planning the creation of security concepts include both the migration as well as the operation and termination of the swap. The basis for their creation are the results of the risk analysis and the selection process of the planning stage. The implementation and testing of outsourcing to the cloud made in accordance with established security policies.

 

Operational phase

 

During the operational phase of the outsourced functions under the contract and security concepts are operated by the provider. It is important to have a working security monitoring system to identify any deviations from the required security level quickly. The Security Monitoring also demonstrate the fulfillment of the contracted services, continuously improving.

 

Termination of the swap

 

With this step, a controlled termination of cloud services is performed. Also, the termination must be made in accordance with the contractual provisions. The provider must demonstrably clear so that it can not be restored even with sophisticated methods and technologies, particularly data on its systems. These include not only data of the business process, but also operational data such as log data from systems and applications. Outsourcing to Public Cloud can be a difficult phase for the most medium sized companies.
 

Abhishek-Ghosh Tagged With outsourcing to the public cloud

This Article Has Been Shared 152 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Outsourcing to Public Cloud : How You Should Proceed

  • Cloud Computing XaaS : Approaches and Possibilities

    Cloud Computing XaaS is an approach towards everything to provide as a service to make available and consume like we use electricity.Read the important aspects.

  • Cloud computing as a Solution for Virtual Desktops and Applications

    Cloud computing as a solution to the delivery of virtual desktops and applications in the corporate, academic and research purposes becoming more useful.

  • Cloud Computing Risk Analysis

    Cloud Computing Risk Analysis is an important administrative and marketing task. ENISA itself has a pdf guide. However, we will cover a generalized idea.

  • Cloud Computing Open Standards and Interfaces

    Cloud Computing Open Standards and Interfaces promises more flexibility in the cloud. The article explains the benefits of open standards and interfaces.

  • Capabilities Required by the Professionals in the Era of Cloud Computing

    Capabilities required by the professionals in the era of Cloud Computing is not limited to IT sector but it includes the Health, Law and other professionals.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Comments

  1. AvatarISO 27001 is an Information Security Management System standard says

    January 17, 2014 at 4:19 am

    I will immediately seize your own rss feed as I cannot in locating the e-mail monthly subscription url or maybe e-newsletter support. Are there almost any? Make sure you make it possible for me know to ensure I possibly could join. Thanks a lot.

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (21K Followers)
  • Twitter (5.3k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Basics on Python Tornado (web server) March 8, 2021
  • What You Need to Know About Hybrid Mobile App Development March 6, 2021
  • Why Not to Use Your Host for Email Marketing March 5, 2021
  • What You Need to Know About the Microservices March 4, 2021
  • Fix Missing/Bad FileProvider for Freshchat (Android error code 354) March 3, 2021

 

About This Article

Cite this article as: Abhishek Ghosh, "Outsourcing to Public Cloud : How You Should Proceed," in The Customize Windows, April 22, 2013, March 8, 2021, https://thecustomizewindows.com/2013/04/outsourcing-to-public-cloud-how-you-should-proceed/.

Source:The Customize Windows, JiMA.in

 

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy