Look at the following 5 things to migrate data center applications to cloud services
Source: Internet
Author: User
KeywordsCloud services data center cloud migration
According to foreign media reports, a recent in-depth survey of 240 information it and security professionals found that although there was a frequent problem of applying connection outages during the migration of data center applications to cloud services, there were also Many organizations plan to migrate data center applications to cloud services, and here are five things that organizations should consider before migrating data center applications to cloud services.
1. Understand that application connections are bound to the firewall rules
in a recent survey, 32% of respondents said their data centers had more than 100 important applications, and 19% said they had more than 200 important data center applications. business applications are called very important and very many in the data center. Modern data centers not only have a large number of commercialization applications from vendors such as SAP and SharePoint, but they are also highly complex applications. As the number of applications grows and complexity increases, the pressure on the IT team is not only to ensure the availability and security of these applications, but also to keep these applications up to speed with the business.
An unexpected interruption of importance can have a negative impact on the business, not only on the technical but also on the financial impact. At the technical level, the structure needs to understand that the changes in the firewall are determined primarily by the business application connectivity requirements. All firewall change requirements should be linked to appropriate applications. You must understand the impact of firewall changes on these applications and networks.
2. Cancel access rule when application is deactivated
When an application is deactivated, the organization often keeps the rules of the firewall intact, fearing that if the rules of the firewall are revoked, there may be an outage. While critical application disconnection can have a significant impact on the business, the organization should prioritize the prompt and accurate cancellation of unwanted access rules, which could lead to vulnerabilities that attackers can exploit. In addition, organizations should use their own firewall rules to identify network components and applications that can be removed to successfully eliminate unwanted access without impacting the business.
3. Identify risks from a business perspective
Traditional risk management practices focus primarily on technology, showing the risks of servers, IP addresses, and other factors that are rarely understood by business units. But according to a recent survey, nearly half of respondents said they were looking at risk based on business applications, while only 30% per cent of respondents looked at the risk according to the exposure of the network segment, and 22% per cent viewed the risk according to the condition of the server or equipment. This is important because it not only allows security teams to communicate more effectively with business owners, but also prepares them and encourages them to "take risks".
Implementing this application-centric approach to risk management is to combine security policy management with the vulnerabilities scanners already in use in the organization. By viewing the risk based on the application, this allows the organization to make better decisions to eliminate risk when considering the business.
4. Understanding Shadow It
The availability and convenience of the public cloud presents the IT team with a second threat called Shadow it. When it fails to address the requirements of developers and business owners, they can quickly leverage public cloud services to solve these problems without even telling the IT department. This creates serious security vulnerabilities, and the organization does not even know that these vulnerabilities exist. As a result, the security team must ensure that it shifts from an "unwanted" or "bottleneck" to a department that drives business development, using flexible and well-planned processes to support the cloud environment and rapid application delivery.
5. Reduce complexity in the security change process
Modern data centers have many commercial applications. These applications include complex, multi-tiered architectures, countless components, and subtle basic communication methods that drive network security policies. While each rule supports a variety of applications, a "communication" may be forced to go through a number of enforcement policy points. Dozens of or hundreds of devices to set up hundreds of rules and contain multiple interdependent relationships.
Along with this complexity is the challenge of keeping up with the dynamic business requirements, whether it is to enable new applications or to retain relevant existing applications for the user, the agency must deal with and support this change. In a recent survey, One-fourth of respondents said they had to wait 11 weeks before a new application could begin to be used. It requires more time to deploy the application update than the business unit needs. 59% of respondents need 8 hours to modify the connection for each application. Optimizing and automating this modification process ensures business agility while ensuring the accuracy and security of these modifications.
"Edit Recommendation"
Cloud Services Trusted! 2013 The IT giants burned in the data center by those Qian service agents or will be the future of cloud computing cloud migration after the death of governance methods and Amazon cloud Service competition IBM and SAP very sad "responsible editor: Iris Wei TEL: (010) 68476606"
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.