SlideShare une entreprise Scribd logo
1  sur  13
Cloud Computing Initiative Vision and Strategy Document (DRAFT) February 2010 GSA Confidential and Proprietary – Not for Distribution
Federal Cloud Computing  Vision and Mission ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],This information is draft and has not been published, please do not disseminate
Cloud Capabilities Must be Tailored to Government’s Unique Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security & Data Privacy Delivery & Operations Offer different levels of security and data privacy based on the application and nature of the services provided. Potential standardize Low, Med and High categories for Simplicity. Enable adoption of Cloud Computing services in different Cloud models including Public, Private, Hybrid and Community models. Develop interoperability standards in conjunction with the industry to provide interoperability at the data infrastructure, platform and application levels.  Interoperability & Integration Cloud Computing  Services Federal Government  Considerations for Cloud Computing GSA Confidential and Proprietary – Not for Distribution
The NIST Definition Offers Multiple Delivery Models for Cloud Computing Public Internet Public Cloud: The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Community Cloud: The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Hybrid Cloud: The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting). Private Cloud Commercially Hosted: Publically available Cloud Computing services offered through commercial sources that are dedicated and separate from the Public both physically and logically and must to remain within the U.S. borders to support heighted data security and privacy requirements.  Access to these services are provided through a dedicated Government Intranet and is not accessible from the Public Internet. Government  Dedicated Intranet Private Government Cloud : The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Cloud Sourcing Models Outsourced Government Trust (Security and Data Privacy) High Low Private Government  Cloud Private  Commercially Hosted  Cloud Public Cloud Hybrid Government  Cloud  Community Cloud GSA Confidential and Proprietary – Not for Distribution
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Federal Cloud Computing  Goals and Objectives This information is draft and has not been published, please do not disseminate
Enable Support Lead Federal Cloud Computing  Goals and Primary Objectives and Initiatives Establish and Manage Governance Provide Procurement Leadership Facilitate Implementation Operate as a Solutions Provider Conduct Outreach Activities Drive Cloud Technology Innovation Enable Sustainable & Cost-Effective Computing  (Green IT, TCO) Goal Area Establish a Security Working Group Develop Acquisition Vehicles to Ease Agency Procurement of Cloud Computing Solutions Assist & Guide Agencies to Implement Cloud Solutions (e.g. Service Provisioning) Develop the Cloud Services Business Model Design and Implement a Central Information Portal for Federal Cloud Computing Identify Common Cloud Services & Foster Standards Development & Security Policies Identify Cloud Computing Performance Metrics Primary Objective Establish Security Initiative and Implement and Manage a Federal C&A Process  Develop Acquisition Roadmap Identify and Facilitate Cloud Computing Agency Pilots Develop Services Roadmap Establish Communications Initiative and Develop Portal Develop Requirements for Portability Standards Establish Performance Metrics Initiative Primary Initiative Define Data Center Optimization Strategy Develop Data Center Analysis and Agency Goals Create Federal policies on security, standards, and governance Provide cloud computing solutions in support of Federal agency missions Provide strategic roadmaps, best practices, and acquisition guidance This information is draft and has not been published, please do not disseminate
Federal Cloud Computing  Transition Plan Assist Agencies in Implementing/Providing Cloud Solutions and Services Identify Cloud Computing Performance Metrics Stand Up Federal C&A Process  Develop Acquisition Roadmap Identify Technology Center Initiatives and Agency Pilots Develop Services Roadmap Develop Portal Establish Performance Metrics Initiative Program Management/ Governance/ Communications Standards Security Acquisition/ Procurement/ Services Develop Cloud Computing Maturity Model Develop Cloud Computing Implementation Guide for Agencies Develop Cloud Segment Architectures 2011 … Workstream Manage ESC, CCAC and Working Groups (ongoing) Adoption and Implementation (Sustainable and Cost-Effective Computing and Data Center Consolidation and Optimization) Conduct Outreach Activities (Summits, Online Discussions, Training, etc.) 2010 Coordinate with Working Groups and Agencies to Collect Content for Portal (ongoing) Identify Interoperability and Portability Standards Requirements Identify Security Standards Requirements Identify Manageability Standards Requirements Work with Industry Standards Bodies (ongoing) Develop Standards Roadmap Fully Inventory Security Challenges (e.g. identify FISMA gaps) Identify Pilots or Other Projects that can Test Security Issues Develop Analytic Framework Develop Data Center Assessment Guide and Maturity Model Assist Agencies in Data Center Optimization Strategies Award IaaS Release PaaS RFI Develop Guidelines for Leveraging Contract Vehicles Identify Integration and Coordination Points between Working Groups and other Government Fora (ongoing) Coordinate Policy and Strategy Development (eDiscovery, Records Management, Privacy, etc.) Maintenance of Apps.Gov (ongoing) Work with Agencies on Enabling Standards Adoption (ongoing) Validate Standards Use Cases Work with Agencies and Industry to Facilitate Use of the Federal C&A (ongoing) Coordinate Across the Federal Acquisition Community to Implement Procurement Policies Facilitate Adoption of Apps.Gov Establish, Manage and Coordinate Developer Communities and Application Libraries  Identify Security Policy Issues, Coordinate Feedback and Determine Recommendations Implement and Manage Pilots Identify Data Center Pilots and Develop Tools Conduct Data Center Analysis Implement, Manage Pilots and Capture Best Practices and Lessons Learned Develop Data Center Recommendations for Agencies Finalize Communications Plan Develop and Manage Templates Develop Draft SOWs This plan is currently under consideration and should be considered Notional/Draft.
The Cloud Computing PMO is the nucleus of Cloud Computing Initiative for the Federal Government, setting direction, establishing guidelines and defining the future vision and architecture Cloud Computing Initiative: Governance Model  Gov Agencies Vendors CCESC/ CCAC CC PMO ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security Standards Ops Excellence Comm Cloud Computing Working Groups ,[object Object],[object Object],[object Object],[object Object],[object Object]
Working Groups Provide Support Across All of the Goal Areas and are Driven by the CCPMO ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Establish and Manage Governance Provide Procurement Leadership Enable Adoption and Implementation Operate as a Service Provider Conduct Outreach Activities Drive Cloud Technology Innovation Enable Sustainable & Cost-Effective Computing (Green IT, TCO) Goal Area Cloud Computing Program Management Office Each Working Group will ultimately establish its own objectives and plan of action – items referenced here are just a sample
Government Cloud Services Model Online User Interface GSA Confidential and Proprietary – Not for Distribution
Federal Cloud Computing Cloud Program Services Model Customizable User Page Collaboration Online User Storage Access / Connectivity Cloud Standards / Interoperability Security / Data Privacy Provisioning / Admin Tools Application Library 1 2 3 4 5 6 7 8 Cloud Services GSA Confidential and Proprietary – Not for Distribution 1 2 3 4 5 6 7 8 To deliver the Online User Interface, the government must address the following Service Components… Components Description Customizable  User Page ,[object Object],Application  Library ,[object Object],Online User Storage ,[object Object],Collaboration ,[object Object],Access / Connectivity ,[object Object],Cloud Standards / Interoperability ,[object Object],Provisioning / Admin Tools ,[object Object],Security / Data Privacy ,[object Object]
Government Cloud Services Model Cloud Relationship View Behind the scenes are the core cloud services that support the daily functions for Government employees  Commercially Hosted Private Clouds  Public Cloud Vendors Internet  Government  Hybrid Clouds Provisioning Integration Procurement Financials Reporting  Management Security  C&A Public Cloud Vendors Government  Private Clouds Government  Private Clouds DMZ DMZ Single  Sign on GSA Confidential and Proprietary – Not for Distribution
Federal Cloud Computing  Draft Services Framework User Tools Infrastructure as a  Service (IaaS) Platform as a  Service (PaaS) Software as a Service (SaaS) / Applications User/ Admin Portal Reporting & Analytics Service Mgmt &  Provisioning Analytic Tools Data Mgmt Reporting Knowledge Mgmt Citizen Engagement Application Integration API’s Workflow Engine EAI Mobile Device Integration Data Migration Tools  ETL Wikis / Blogs Social Networking Agency Website Hosting Email / IM  Virtual Desktop Office Automation Business Svcs Apps Core Mission  Apps Legacy Apps (Mainframes) Gov Productivity Gov Enterprise Apps Database Testing Tools Developer Tools DBMS Directory Services Security &  Data Privacy Data/Network Security Data Privacy Certification & Compliance Authentication & Authorization Auditing & Accounting Service Provisioning SLA Mgmt Inventory Mgmt CoS/QoS Mgmt Utilization Monitoring App Perf Monitoring DR / Backup Operations Mgmt Storage Virtual Machines Web Servers Server Hosting CDN Data Center  Facilities Routers / Firewalls LAN/WAN Internet Access Hosting Centers Core Foundational Capabilities Cloud Services GSA Confidential and Proprietary – Not for Distribution User Profile Mgmt Trouble Mgmt Product Catalog Order Mgmt Billing / Invoice Tracking Customer / Account  Mgmt

Contenu connexe

Tendances

cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Microsoft Azure in 5 minutes
Microsoft Azure in 5 minutesMicrosoft Azure in 5 minutes
Microsoft Azure in 5 minutesBrian Blanchard
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack FundamentalsCenk Ersoy
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachJoanne Klein
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Cloudera - The Modern Platform for Analytics
Cloudera - The Modern Platform for AnalyticsCloudera - The Modern Platform for Analytics
Cloudera - The Modern Platform for AnalyticsCloudera, Inc.
 
Azure SQL Database Managed Instance
Azure SQL Database Managed InstanceAzure SQL Database Managed Instance
Azure SQL Database Managed InstanceJames Serra
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Introduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxIntroduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxEverestMedinilla2
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud ServicesDavid J Rosenthal
 
Azure architecture
Azure architectureAzure architecture
Azure architectureAmal Dev
 
Google Cloud Connect Korea - Sep 2017
Google Cloud Connect Korea - Sep 2017Google Cloud Connect Korea - Sep 2017
Google Cloud Connect Korea - Sep 2017Google Cloud Korea
 
Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...
Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...
Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...Amazon Web Services
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 

Tendances (20)

cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Microsoft Azure in 5 minutes
Microsoft Azure in 5 minutesMicrosoft Azure in 5 minutes
Microsoft Azure in 5 minutes
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack Fundamentals
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team Approach
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Cloudera - The Modern Platform for Analytics
Cloudera - The Modern Platform for AnalyticsCloudera - The Modern Platform for Analytics
Cloudera - The Modern Platform for Analytics
 
Azure SQL Database Managed Instance
Azure SQL Database Managed InstanceAzure SQL Database Managed Instance
Azure SQL Database Managed Instance
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Introduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptxIntroduction to the Microsoft Azure Cloud.pptx
Introduction to the Microsoft Azure Cloud.pptx
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
Azure architecture
Azure architectureAzure architecture
Azure architecture
 
Google Cloud Connect Korea - Sep 2017
Google Cloud Connect Korea - Sep 2017Google Cloud Connect Korea - Sep 2017
Google Cloud Connect Korea - Sep 2017
 
AWS for Backup and Recovery
AWS for Backup and RecoveryAWS for Backup and Recovery
AWS for Backup and Recovery
 
Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...
Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...
Deep Dive on Amazon S3 Storage Classes: Creating Cost Efficiencies across You...
 
Azure Cost Management
Azure Cost ManagementAzure Cost Management
Azure Cost Management
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 

En vedette

Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
 
Banking on the CIO for Digital Success
Banking on the CIO for Digital SuccessBanking on the CIO for Digital Success
Banking on the CIO for Digital SuccessCognizant
 
New processing technology for agri fiber stalks
New processing technology for agri fiber stalksNew processing technology for agri fiber stalks
New processing technology for agri fiber stalksDavid James
 
Overview - ESBs and IBM Integration Bus
Overview - ESBs and IBM Integration BusOverview - ESBs and IBM Integration Bus
Overview - ESBs and IBM Integration BusJuarez Junior
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud securityAsmaa Ibrahim
 
Cloud Computing Architecture
Cloud Computing Architecture Cloud Computing Architecture
Cloud Computing Architecture Vasu Jain
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Securityneicher
 
Oracle cloud computing strategy
Oracle cloud computing strategyOracle cloud computing strategy
Oracle cloud computing strategyjameskenney
 
Oracle Cloud Computing Strategy
Oracle Cloud Computing StrategyOracle Cloud Computing Strategy
Oracle Cloud Computing StrategyRex Wang
 
Cloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabiliesCloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabiliesVinay Dwivedi
 
NIST Cloud Computing Security Reference Architecture 800-299
NIST Cloud Computing Security Reference Architecture  800-299NIST Cloud Computing Security Reference Architecture  800-299
NIST Cloud Computing Security Reference Architecture 800-299David Sweigert
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Digital Bank: What and How
Digital Bank: What and HowDigital Bank: What and How
Digital Bank: What and HowIvano Digital
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 

En vedette (20)

Cloud Computing Strategy and Architecture
Cloud Computing Strategy and ArchitectureCloud Computing Strategy and Architecture
Cloud Computing Strategy and Architecture
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
Banking on the CIO for Digital Success
Banking on the CIO for Digital SuccessBanking on the CIO for Digital Success
Banking on the CIO for Digital Success
 
Banking on experience
Banking on experienceBanking on experience
Banking on experience
 
New processing technology for agri fiber stalks
New processing technology for agri fiber stalksNew processing technology for agri fiber stalks
New processing technology for agri fiber stalks
 
Overview - ESBs and IBM Integration Bus
Overview - ESBs and IBM Integration BusOverview - ESBs and IBM Integration Bus
Overview - ESBs and IBM Integration Bus
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Cloud Computing Architecture
Cloud Computing Architecture Cloud Computing Architecture
Cloud Computing Architecture
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Oracle cloud computing strategy
Oracle cloud computing strategyOracle cloud computing strategy
Oracle cloud computing strategy
 
Oracle Cloud Computing Strategy
Oracle Cloud Computing StrategyOracle Cloud Computing Strategy
Oracle Cloud Computing Strategy
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabiliesCloud computing architecture and vulnerabilies
Cloud computing architecture and vulnerabilies
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
NIST Cloud Computing Security Reference Architecture 800-299
NIST Cloud Computing Security Reference Architecture  800-299NIST Cloud Computing Security Reference Architecture  800-299
NIST Cloud Computing Security Reference Architecture 800-299
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Digital Bank: What and How
Digital Bank: What and HowDigital Bank: What and How
Digital Bank: What and How
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

Similaire à Government cloud computing_strategy

Cloud computing strategy_0
Cloud computing strategy_0Cloud computing strategy_0
Cloud computing strategy_0KANKIPADU
 
GSA on Cloud Computing and More
GSA on Cloud Computing and MoreGSA on Cloud Computing and More
GSA on Cloud Computing and Moreguest163bca0
 
Brand Niemann12102009
Brand Niemann12102009Brand Niemann12102009
Brand Niemann12102009guest8c518a8
 
Webinar: Make Your Cloud Strategy Work for 2016
Webinar: Make Your Cloud Strategy Work for 2016Webinar: Make Your Cloud Strategy Work for 2016
Webinar: Make Your Cloud Strategy Work for 2016Alexandra Sasha Tchulkova
 
OpenStack in the Enterprise - Interop Las Vegas 2014
OpenStack in the Enterprise - Interop Las Vegas 2014OpenStack in the Enterprise - Interop Las Vegas 2014
OpenStack in the Enterprise - Interop Las Vegas 2014Seth Fox
 
How to Get Cloud Architecture and Design Right the First Time
How to Get Cloud Architecture and Design Right the First TimeHow to Get Cloud Architecture and Design Right the First Time
How to Get Cloud Architecture and Design Right the First TimeDavid Linthicum
 
OpenNASA v2.0 Slideshare Large File
OpenNASA v2.0 Slideshare   Large FileOpenNASA v2.0 Slideshare   Large File
OpenNASA v2.0 Slideshare Large FileMegan Eskey
 
10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud OfferingsVishal Sharma
 
Pilot Texas Cloud Offering
Pilot Texas Cloud OfferingPilot Texas Cloud Offering
Pilot Texas Cloud OfferingGovCloud Network
 
Moving to the cloud: cloud strategies and roadmaps
Moving to the cloud: cloud strategies and roadmapsMoving to the cloud: cloud strategies and roadmaps
Moving to the cloud: cloud strategies and roadmapsJisc
 
Cloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudCloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudSourabh Saxena
 
IT Transformation in the Public Sector
IT Transformation in the Public SectorIT Transformation in the Public Sector
IT Transformation in the Public SectorAmazon Web Services
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saasRahul Parmar
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saasRahul Parmar
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saaskavinalli
 
Dennis Wendland_The i4Trust Collaboration Programme.pptx
Dennis Wendland_The i4Trust Collaboration Programme.pptxDennis Wendland_The i4Trust Collaboration Programme.pptx
Dennis Wendland_The i4Trust Collaboration Programme.pptxFIWARE
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security EssayJennifer Wood
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 

Similaire à Government cloud computing_strategy (20)

Cloud computing strategy_0
Cloud computing strategy_0Cloud computing strategy_0
Cloud computing strategy_0
 
GSA on Cloud Computing and More
GSA on Cloud Computing and MoreGSA on Cloud Computing and More
GSA on Cloud Computing and More
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 
Brand Niemann12102009
Brand Niemann12102009Brand Niemann12102009
Brand Niemann12102009
 
Webinar: Make Your Cloud Strategy Work for 2016
Webinar: Make Your Cloud Strategy Work for 2016Webinar: Make Your Cloud Strategy Work for 2016
Webinar: Make Your Cloud Strategy Work for 2016
 
Make your cloud strategy work for 2016 webinar 1.13.16
Make your cloud strategy work for 2016 webinar 1.13.16Make your cloud strategy work for 2016 webinar 1.13.16
Make your cloud strategy work for 2016 webinar 1.13.16
 
OpenStack in the Enterprise - Interop Las Vegas 2014
OpenStack in the Enterprise - Interop Las Vegas 2014OpenStack in the Enterprise - Interop Las Vegas 2014
OpenStack in the Enterprise - Interop Las Vegas 2014
 
How to Get Cloud Architecture and Design Right the First Time
How to Get Cloud Architecture and Design Right the First TimeHow to Get Cloud Architecture and Design Right the First Time
How to Get Cloud Architecture and Design Right the First Time
 
OpenNASA v2.0 Slideshare Large File
OpenNASA v2.0 Slideshare   Large FileOpenNASA v2.0 Slideshare   Large File
OpenNASA v2.0 Slideshare Large File
 
10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings
 
Pilot Texas Cloud Offering
Pilot Texas Cloud OfferingPilot Texas Cloud Offering
Pilot Texas Cloud Offering
 
Moving to the cloud: cloud strategies and roadmaps
Moving to the cloud: cloud strategies and roadmapsMoving to the cloud: cloud strategies and roadmaps
Moving to the cloud: cloud strategies and roadmaps
 
Cloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudCloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloud
 
IT Transformation in the Public Sector
IT Transformation in the Public SectorIT Transformation in the Public Sector
IT Transformation in the Public Sector
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Dennis Wendland_The i4Trust Collaboration Programme.pptx
Dennis Wendland_The i4Trust Collaboration Programme.pptxDennis Wendland_The i4Trust Collaboration Programme.pptx
Dennis Wendland_The i4Trust Collaboration Programme.pptx
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 

Plus de GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin JacksonGovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 

Plus de GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Government cloud computing_strategy

  • 1. Cloud Computing Initiative Vision and Strategy Document (DRAFT) February 2010 GSA Confidential and Proprietary – Not for Distribution
  • 2.
  • 3.
  • 4. The NIST Definition Offers Multiple Delivery Models for Cloud Computing Public Internet Public Cloud: The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Community Cloud: The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Hybrid Cloud: The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting). Private Cloud Commercially Hosted: Publically available Cloud Computing services offered through commercial sources that are dedicated and separate from the Public both physically and logically and must to remain within the U.S. borders to support heighted data security and privacy requirements. Access to these services are provided through a dedicated Government Intranet and is not accessible from the Public Internet. Government Dedicated Intranet Private Government Cloud : The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Cloud Sourcing Models Outsourced Government Trust (Security and Data Privacy) High Low Private Government Cloud Private Commercially Hosted Cloud Public Cloud Hybrid Government Cloud Community Cloud GSA Confidential and Proprietary – Not for Distribution
  • 5.
  • 6. Enable Support Lead Federal Cloud Computing Goals and Primary Objectives and Initiatives Establish and Manage Governance Provide Procurement Leadership Facilitate Implementation Operate as a Solutions Provider Conduct Outreach Activities Drive Cloud Technology Innovation Enable Sustainable & Cost-Effective Computing (Green IT, TCO) Goal Area Establish a Security Working Group Develop Acquisition Vehicles to Ease Agency Procurement of Cloud Computing Solutions Assist & Guide Agencies to Implement Cloud Solutions (e.g. Service Provisioning) Develop the Cloud Services Business Model Design and Implement a Central Information Portal for Federal Cloud Computing Identify Common Cloud Services & Foster Standards Development & Security Policies Identify Cloud Computing Performance Metrics Primary Objective Establish Security Initiative and Implement and Manage a Federal C&A Process Develop Acquisition Roadmap Identify and Facilitate Cloud Computing Agency Pilots Develop Services Roadmap Establish Communications Initiative and Develop Portal Develop Requirements for Portability Standards Establish Performance Metrics Initiative Primary Initiative Define Data Center Optimization Strategy Develop Data Center Analysis and Agency Goals Create Federal policies on security, standards, and governance Provide cloud computing solutions in support of Federal agency missions Provide strategic roadmaps, best practices, and acquisition guidance This information is draft and has not been published, please do not disseminate
  • 7. Federal Cloud Computing Transition Plan Assist Agencies in Implementing/Providing Cloud Solutions and Services Identify Cloud Computing Performance Metrics Stand Up Federal C&A Process Develop Acquisition Roadmap Identify Technology Center Initiatives and Agency Pilots Develop Services Roadmap Develop Portal Establish Performance Metrics Initiative Program Management/ Governance/ Communications Standards Security Acquisition/ Procurement/ Services Develop Cloud Computing Maturity Model Develop Cloud Computing Implementation Guide for Agencies Develop Cloud Segment Architectures 2011 … Workstream Manage ESC, CCAC and Working Groups (ongoing) Adoption and Implementation (Sustainable and Cost-Effective Computing and Data Center Consolidation and Optimization) Conduct Outreach Activities (Summits, Online Discussions, Training, etc.) 2010 Coordinate with Working Groups and Agencies to Collect Content for Portal (ongoing) Identify Interoperability and Portability Standards Requirements Identify Security Standards Requirements Identify Manageability Standards Requirements Work with Industry Standards Bodies (ongoing) Develop Standards Roadmap Fully Inventory Security Challenges (e.g. identify FISMA gaps) Identify Pilots or Other Projects that can Test Security Issues Develop Analytic Framework Develop Data Center Assessment Guide and Maturity Model Assist Agencies in Data Center Optimization Strategies Award IaaS Release PaaS RFI Develop Guidelines for Leveraging Contract Vehicles Identify Integration and Coordination Points between Working Groups and other Government Fora (ongoing) Coordinate Policy and Strategy Development (eDiscovery, Records Management, Privacy, etc.) Maintenance of Apps.Gov (ongoing) Work with Agencies on Enabling Standards Adoption (ongoing) Validate Standards Use Cases Work with Agencies and Industry to Facilitate Use of the Federal C&A (ongoing) Coordinate Across the Federal Acquisition Community to Implement Procurement Policies Facilitate Adoption of Apps.Gov Establish, Manage and Coordinate Developer Communities and Application Libraries Identify Security Policy Issues, Coordinate Feedback and Determine Recommendations Implement and Manage Pilots Identify Data Center Pilots and Develop Tools Conduct Data Center Analysis Implement, Manage Pilots and Capture Best Practices and Lessons Learned Develop Data Center Recommendations for Agencies Finalize Communications Plan Develop and Manage Templates Develop Draft SOWs This plan is currently under consideration and should be considered Notional/Draft.
  • 8.
  • 9.
  • 10. Government Cloud Services Model Online User Interface GSA Confidential and Proprietary – Not for Distribution
  • 11.
  • 12. Government Cloud Services Model Cloud Relationship View Behind the scenes are the core cloud services that support the daily functions for Government employees Commercially Hosted Private Clouds Public Cloud Vendors Internet Government Hybrid Clouds Provisioning Integration Procurement Financials Reporting Management Security C&A Public Cloud Vendors Government Private Clouds Government Private Clouds DMZ DMZ Single Sign on GSA Confidential and Proprietary – Not for Distribution
  • 13. Federal Cloud Computing Draft Services Framework User Tools Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) / Applications User/ Admin Portal Reporting & Analytics Service Mgmt & Provisioning Analytic Tools Data Mgmt Reporting Knowledge Mgmt Citizen Engagement Application Integration API’s Workflow Engine EAI Mobile Device Integration Data Migration Tools ETL Wikis / Blogs Social Networking Agency Website Hosting Email / IM Virtual Desktop Office Automation Business Svcs Apps Core Mission Apps Legacy Apps (Mainframes) Gov Productivity Gov Enterprise Apps Database Testing Tools Developer Tools DBMS Directory Services Security & Data Privacy Data/Network Security Data Privacy Certification & Compliance Authentication & Authorization Auditing & Accounting Service Provisioning SLA Mgmt Inventory Mgmt CoS/QoS Mgmt Utilization Monitoring App Perf Monitoring DR / Backup Operations Mgmt Storage Virtual Machines Web Servers Server Hosting CDN Data Center Facilities Routers / Firewalls LAN/WAN Internet Access Hosting Centers Core Foundational Capabilities Cloud Services GSA Confidential and Proprietary – Not for Distribution User Profile Mgmt Trouble Mgmt Product Catalog Order Mgmt Billing / Invoice Tracking Customer / Account Mgmt

Notes de l'éditeur

  1. 12/09/10 Confidential - Draft for Review and Comment
  2. Each of the roadmaps for the respective workgroups will roll up to this view. Implementation Plans should roll up as well to provide greater detail in the 12 to 24 month timeframe.