SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
©2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
Cloud Migration, Application Modernization,
and Security for Partners
Tom Laszewski, Sr. Manager, GSI Solutions Architecture
Matt Yanchyshyn, Sr. Manager, ISV Solutions Architecture
AWS Migration Methodology
People,
process,
technology
Migration
experience
Knowledge &
training
Not primary
business activity
Fear
Attempting too
much at once
Migration challenges
Discover Design Transform Transition Operate Optimize
Plan RunBuild
• Detailed
migration plan
• Estimate effort
• Security & risk
assessment
• Network
topology
• Migrate
• Deploy
• Validate
• Assessment &
profiling
• Prioritization
• Data
requirements &
classification
• Business logic
& infrastructure
dependencies
• Pilot testing
• Transition to
support
• Release
management
• Cutover &
decommission
• Staff training
• Monitoring
• Incident
management
• Provisioning
• Monitoring-
driven
optimization
• Continuous
integration and
continuous
deployment
App migration
assessment
Re-hosting
(lift and shift)
App portfolio optimization
Re-platforming
(lift and reshape)
Migration methodology
Planning your migration
Migrating to the cloud can take one of many paths
Discover,
Assess (Enterprise
Architecture and
Applications)
Lift and Shift
(Minimal
Change)
Migration and
UAT Testing Operate
Refactor
for AWS
Application
Lift and shift
Move the App
Infrastructure
Plan Migration
and Sequencing
Determine
Migration Path
Decommission
Do Not Move
Create Cloud
Strategy
Design, Build AWS
Environment
Move the
Application
Determine
Migration
Process
Manually Move
App and Data
Third-Party Tools
AWS VM Import
Refactor
for AWS
Rebuild Application
Architecture
Vendor
S/PaaS
(if available)
Third-Party Migration Tool
Manually Move App and Data
Determine
Migration Process
Replatform
(typically legacy
applications)
Recode App
Components
Rearchitect
Application
Recode
Application
Architect AWS Environment
and Deploy App, Migrate Data
Signoff
Tuning Cutover
Org/Ops
Impact
Analysis
Identify
Ops Changes
Change
Management
Plan
End-state Architecture
Architecting your AWS environment
The design and architecture of the cloud environment is important, in order
to realize cloud benefits such as agility and cost savings
Networking
• Convergence of
on-premises and
cloud
• Cloud-oriented
protocols
• IP scheme and
addressing
• VPC and account
configuration
Security
• SSO
• Access policies
• Least privilege
• Audits
• Compliance
• Intrusion detection
& prevention
• Logging
Governance
• Billing & cost
management
• Service
catalogs
• Configuration
management
• Architecture
Standards
• SLA/SLO
• Procurement
Data management
• RPO/RTO
• Retention policies
• Replication
• Storage
optimization
• ILM
• Data quality
Monitoring
• Notifications &
alerting
• Application level
awareness
• Thresholds
• Service desk
integration
On-premises infrastructure mapped to AWS
Technology On-premises AWS
Network VPN, MPLS Amazon VPC, AWS Direct Connect
Storage DAS, SAN, NAS, SSD
Amazon EBS, Amazon S3, Amazon EC2 instance storage,
distributed & clustered FS on Amazon EC2
Compute Hardware, virtualization Amazon EC2, Amazon ECS, AWS Lambda
Content delivery Third-party CDN Amazon CloudFront
Databases
MS SQL Server, MySQL, Oracle, DB2,
PostgreSQL, MongoDB,. …
Amazon RDS, Amazon DynamoDB, Amazon ElastiCache,
DB software on Amazon EC2
Load balancing Hardware and software load balancers Elastic Load Balancing, software load balancers
Scaling & cluster
management
Hardware and software clustering
tools
Auto Scaling, software clustering solutions
DNS BIND, Windows Server, third party Amazon Route 53, third-party DNS software on Amazon EC2
On-premises infrastructure mapped to AWS
Technology On-premises AWS
Analytics & data warehouse
Hadoop, Vertica, Cassandra, specialized
hardware and software
Amazon EMR, Amazon Redshift, software on Amazon EC2
Messaging and workflow RabbitMQ, ActiveMQ, Kafka, …
Amazon SQS, Amazon SNS, Amazon SWF,
software on Amazon EC2
Caching Redis, Memcached, … Amazon ElastiCache, Memcached, SAP Hana
Archiving Tape library, off-site data storage Amazon S3, Amazon Glacier
Email Email software Amazon SES
Identity, authoritzation, &
authentication
AD/ADFS, LDAP, SAML, third party…
AWS Identity and Access Management/AWS STS,
Amazon Cognito, AWS Directory Service, AD & LDAP on
Amazon EC2
Deployment & configuration
management
Chef, Puppet, Salt, Ansible, PowerShell
DSC
AWS CloudFormation, AWS OpsWorks, AWS Elastic Beanstalk,
AWS CodeDeploy, Amazon ECS
Management and
monitoring
CA, BMC, Rightscale
Amazon CloudWatch, AWS Config, AWS CloudTrail,
AWS Trusted Advisor
Security Comes First!
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge
locations
AWS is responsible for the security of the cloud
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge
Locations
Client-side data
encryption
Server-side data
encryption
Network traffic
protection
Platform, applications, identity & access management
Operating system, network, & firewall configuration
Customer applications & contentCustomers
Customers configure their security in the cloud
AWS security offerings
Auditability
• Compliance
reports
Visibility
• Amazon CloudWatch
• AWS CloudTrail
• AWS Config
• “Describe” APIs
Control
• IAM
• AWS CloudHSM
• AWS CloudFormation
• AWS KMS
Defense-in-depth
AWS compliance
program
Third-party
attestations
Physical
Security groups
VPC configuration
Network
Web application
firewalls
Bastion hosts
Encryption
in-transit
Hardened AMIs
OS and app
patch mgmt.
IAM roles for EC2
IAM credentials
Systemsecurity
Logical access
controls
User authentication
Encryption
at-rest
Datasecurity
Encryption: data at rest
EBS
Volume encryption
EBS encryption OS tools
AWS
marketplace/partner
Object encryption
S3 server side
encryption (SSE)
S3 SSE w/ customer
provided keys Client-side encryption
Database encryption
Amazon Redshift
encryption
RDS
PostgreSQL
KMS
RDS
MYSQL
KMS
RDS
ORACLE
TDE/HSM
RDS MSSQL
TDE
Built-in firewall: security groups and NACLs
• VPC security groups (mandatory)
– Instance level, stateful
– Supports ALLOW rules only
– Default deny inbound, allow outbound
– Use as “whitelist” – least privilege
• VPC NACLs (optional)
– Subnet level, stateless
– Supports ALLOW and DENY
– Default allow all
– Use as “blacklist”/“guardrails”(port 135,21,23…)
• Separation of duties
• Changes audited via AWS CloudTrail
• Additional cost for SGs/NACLs: $0
Physical Interfaces
Customer 1
Hypervisor
Customer 2 Customer n…
…
Virtual Interfaces
Firewall
Customer 1
Security
Groups
Customer 2
Security
Groups
Customer n
Security
Groups
Security Groups
AWS partner solutions extend & enhance security
• Some examples:
– Cisco CSR (VPN)
– Sophos UTM (firewall, …)
– Alert Logic Web Security Manager (WAF)
– Alert Logic Threat Manager (NIDS)
– Trend Micro Deep Security (IDPS)
– Trend Micro SecureCloud (encryption)
– Dome9 SecOps (security group audit & management)
– …
Migration Approach & Best Practices
Identifying applications to move
Standalone applications are easy to move
Application with loosely coupled SOA-based
integrations are good candidates
Tightly integrated application needs more planning
‘Low hanging fruit’
• Dev/test applications, self-contained web applications (LAMP stack), social media product
marketing campaigns, training environments, pre-sales demo portal, software downloads, trial
applications
Watch out for
• 32-bit, non-Linux/Windows, multi-cast (Oracle RAC), client/server applications, engineered
systems (Exadata, Netezza), massive file servers, vertically challenged software/applications
Getting a bread box estimate: minimum information
Compute : Number of servers/VMs including RAM,
CPU, OS, and boot drive size (Amazon EC2)
Storage mapping to transactional, backup, archival,
and log/file system/applications (Amazon EBS, Amazon Glacier, and Amazon S3)
Data transfer out for networking
Internet or dedicated networking including security
requirements (AWS Direct Connect and VPN)
Region where processing is happening
Getting a bread box estimate: nice to have
HA requirements for each workload (ELB, Route 53)
Scalability requirements for each workload (ELB,
Route 53, Auto Scaling, CloudFront)
DR requirements for each workload
Storage IOPS requirements for each workload
Compute requirements for management/monitoring
Backup requirements for each workload that can
not be supported by EBS snapshots
Getting a bread box estimate: really nice
Workload stratification file servers, security, RDBMS,
ERP, big data, security, management/monitoring, etc.
HIPPA and PCI requirements for each workload
HPC requirements for each workload
Extremely high CPU, memory requirements
Top third-party vendors for packaged apps
IDS/IPS, WAF, management, monitoring, logging, etc.
Invest in proof of concept early
Proof of concept will answer tons of questions and get your
feet wet with AWS quickly
Will help identify gaps and touch points
Give you a good estimation of the migration costs
Give you a good estimation of the AWS runtime costs
Migrating data into AWS cloud
• File transfer to Amazon S3 or Amazon EC2 using S/FTP, SCP,
UDP, Attunity
• NFS mount accessible from on-premises and AWS
• Configure on-premises backup application (like NetBackup, CA,
CommVault, Riverbed) to use Amazon S3
• AWS Storage Gateway for asynchronous backup to Amazon S3
• AWS Import/Export service: Ship your disk to AWS
• Database backup tools like Oracle Secure Backup
• Database replication tools like GoldenGate, Dbvisit
• AWS Direct Connect 100 Mbps to 10 Gbps
Migrating data into AWS
Data size*
* relative to Internet bandwidth and latency
Datavelocityrequired
UDP transfer software
(e.g., Aspera, Tsunami, …)
Attunity CloudBeam
AWS Storage Gateway,
Riverbed, NFS
AWS Import / ExportTransfer to S3
over Internet
One-time upload with
constant delta updates
Days
Hours
TBsGBs
Security Best Practices
Enforce consistent security on your hosts
Launch
instance
EC2
AMI catalog Running instance
Your instance
Hardening
Audit and logging
Vulnerability management
Malware and HIPS
Whitelisting and integrity
User administration
Operating system
Configure
instance
Configure and harden EC2 instances based on security and compliance needs
Host-based protection software
Restrict access where possible
Connect to existing services
Separate static assets
and move servers away from the edge
Inbound HTTP
Amazon CloudFront
Amazon S3
WAFDynamic
App
App
AppPeering
AWS Identity and Access Management
Create appropriate principles, authorization, and privileges for AWS resources
Multi-factor authenticationIAM
Policies
User
Groups
Roles
Principle of least privilege
User User Hardware Virtual
IAM AWS administrative users
Root account
Note: Always associate the account owner ID with
an MFA device and store it in a secured place!
IAM hierarchy of privileges
AWS account owner
(root)
IAM user
Temporary
security
creds
Permissions Example
Unrestricted access to all
enabled services and
resources
Action: *
Effect: Allow
Resource: *
(implicit)
Access restricted by
group and user policies
Action:
[‘s3:*’,’sts:Get*’]
Effect: Allow
Resource: *
Access restricted by
generating identity and
further by policies used
to generate token
Action: [ ‘s3:Get*’ ]
Effect: Allow
Resource:
‘arn:aws:s3:::mybucket/*’
Enforce principle of least privilege with IAM users, groups, policies, and
temporary credentials
Principle of least privilege with IAM
• Log in to an account with a less privileged user
– Read-only
– EC2 launch-only
• Change role for privileged action
– Administer IAM
– Terminate instance
– Delete snapshots
Protection against accidents or mistakes
(e.g., similar to DisableApiTermination=true)
Consolidate your IAM users
• Put all IAM users and groups in
one account
• All other accounts use IAM roles
Best practices:
• Tie into consolidated billing hierarchy
• Users in IAM account are only
authorized to assume roles in other
accounts
• No AWS-billable resources in this
account
Governance through IAM policies
...
"Effect": "Deny",
"Action": "ec2:RunInstances",
"Resource": [
"arn:aws:ec2:region:account:network-interface/*"
],
"Condition": {
"ArnNotEquals": {
"ec2:Subnet": "arn:aws:ec2:region:account:subnet/subnet-12345678"
}
}
},
{
"Effect": "Allow",
"Action": "ec2:RunInstances",
"Resource": [
"arn:aws:ec2:region::image/ami-12345678",
"arn:aws:ec2:region:account:subnet/subnet-12345678",
"arn:aws:ec2:region:account:security-group/sg-12345678"
]
"Condition": {
"StringEquals": {
"ec2:ResourceTag/BillingCode": “4000"
},
"StringEquals": {
"ec2:ResourceTag/Environnent": “Prod”
...
Deny RunInstances without
appropriate subnet
Require RunInstances to
have specific AMI, subnet,
security group, …
Require RunInstances to
have specific tags
Implementing “smart” AWS policies
• The 5 Ws of auditability:
– Who?
– What?
– Where?
– When?
– Why?
• What we really want is an “if and only if” statement:
– You can deploy this change in production “if and only if” it
actually worked in test
Controlled by IAM
Not controlled by IAM
Federate with AWS Directory Service & IAM
Directory Users
Directory Groups
IAM_Admins
Read_Only
EC2_Admin
Group ‘n’
…
AWS Directory Services
Mgmt Acct
IAM_Admin
IAM Role Mapping
Read_Only
EC2_Admin
Role ‘n’
Case Study:
Condé Nast Data Center Migration
Condé Nast data center migration drivers
• Existing data center needed >$1 million in upgrades
• Financial pressure to close facility by July 2014
• Increase resource efficiency, both people and technology
Condé Nast data center migration scope
• 47 application groups
• 350+ servers
• 400+ TB storage
Application migration methodology
• Condé Nast provided a detailed inventory of their Delaware DC assets
• Utilization metrics were critical for Reserved Instance analysis and to
explore elasticity
• Application assessment determined migration order
• Migration scheduled in waves
• Change window: Migrations occurred over weekends
• Coordinating the change window with various teams was key
• Applications run in hybrid mode during the migration
• After a server was migrated successfully, it was decommissioned
Application migration: virtual machines
• Condé Nast was highly virtualized (VMware)
• Veeam: stage VMs to Amazon S3
– Supports change block tracking which minimizes downtime during migration
• AWS VM Import/Export: migrate staged VMs to Amazon EC2
– Eliminates VM data migration as a part of the change window
• Large databases: created directly on AWS and then data
synchronized
Amazon VPC and networking
Key criteria to support waves of migration:
• AWS Direct Connect: 10 GB DX to AWS
• IP addressing: Avoid overlapping IPs
• Service names
AWS Identity and Access Management (IAM)
Key criteria:
• IAM policies
• Identify groups and permissions
• Application tagging
Phased migration
• Live migration from premises was too slow
– Large change windows meant that production systems were
frozen for a long time
• Solutions:
– Use a tool (Veeam) to backup and ongoing synchronization of
VMs to Amazon S3
– Use a staging farm to run VM Import/Export
VM Import/Export considerations
• Root partitions cannot span multiple disks
– Solution: Eliminate this on premises before migration
• Volumes > 1 TB not supported
– Solution: Spread data across volumes
• VM Import/Export requires stream-optimized VMDK
– Solution: conversion process was scripted
• Nonvirtualized servers were virtualized on premises
before migration
• Unsupported operating systems were upgraded to
supported OS before migrating
Lessons learned at Condé Nast
• Know your limitations
• Evaluate and understand your infrastructure environment
• Sign-up for enterprise support early and involve a TAM early on
• Get your operations staff trained on AWS
• Challenge yourself and make sound architecture decisions;
changing in future can be difficult
• Document every decision made, especially the anti-patterns
• Work directly with application owners; nothing beats hands-on
experience
Your Feedback is Important to AWS
Please complete the session evaluation. Tell us what you think!
NEW YORK

Contenu connexe

Tendances

Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
Amazon Web Services
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
SogetiLabs
 

Tendances (20)

Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
 
AWS Large Scale Migrations - Jan 2016
AWS Large Scale Migrations - Jan 2016AWS Large Scale Migrations - Jan 2016
AWS Large Scale Migrations - Jan 2016
 
Cloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesCloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best Practices
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
 
Cloud Migration Strategy Framework
Cloud Migration Strategy FrameworkCloud Migration Strategy Framework
Cloud Migration Strategy Framework
 
Migration Planning
Migration PlanningMigration Planning
Migration Planning
 
Cloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
Cloud Migration Cookbook: A Guide To Moving Your Apps To The CloudCloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
Cloud Migration Cookbook: A Guide To Moving Your Apps To The Cloud
 
App Modernization
App ModernizationApp Modernization
App Modernization
 
Azure Application Modernization
Azure Application ModernizationAzure Application Modernization
Azure Application Modernization
 
Getting started on your AWS migration journey
Getting started on your AWS migration journeyGetting started on your AWS migration journey
Getting started on your AWS migration journey
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
 
Azure cloud migration simplified
Azure cloud migration simplifiedAzure cloud migration simplified
Azure cloud migration simplified
 
Capgemini Cloud Assessment - A Pathway to Enterprise Cloud Migration
Capgemini Cloud Assessment - A Pathway to Enterprise Cloud MigrationCapgemini Cloud Assessment - A Pathway to Enterprise Cloud Migration
Capgemini Cloud Assessment - A Pathway to Enterprise Cloud Migration
 
Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...
Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...
Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...
 
The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?The Ideal Approach to Application Modernization; Which Way to the Cloud?
The Ideal Approach to Application Modernization; Which Way to the Cloud?
 
Microsoft Azure Technical Overview
Microsoft Azure Technical OverviewMicrosoft Azure Technical Overview
Microsoft Azure Technical Overview
 
Defining Your Cloud Strategy
Defining Your Cloud StrategyDefining Your Cloud Strategy
Defining Your Cloud Strategy
 
Cloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudCloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the Cloud
 
A cloud readiness assessment framework
A cloud readiness assessment frameworkA cloud readiness assessment framework
A cloud readiness assessment framework
 
Microservices for Application Modernisation
Microservices for Application ModernisationMicroservices for Application Modernisation
Microservices for Application Modernisation
 

En vedette

Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
Tom Laszewski
 
Big Data and Cloud Computing
Big Data and Cloud ComputingBig Data and Cloud Computing
Big Data and Cloud Computing
Farzad Nozarian
 
Data SLA in the public cloud
Data SLA in the public cloudData SLA in the public cloud
Data SLA in the public cloud
Liran Zelkha
 
Aims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-versionAims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-version
ictseserv
 
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Open Data Center Alliance
 

En vedette (20)

AWS Migration Planning Roadmap
AWS Migration Planning RoadmapAWS Migration Planning Roadmap
AWS Migration Planning Roadmap
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
 
Applying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migrationApplying systems thinking to AWS enterprise application migration
Applying systems thinking to AWS enterprise application migration
 
Data Virtualization Primer - Introduction
Data Virtualization Primer - IntroductionData Virtualization Primer - Introduction
Data Virtualization Primer - Introduction
 
Cloud Computing And Virtualization
Cloud Computing And VirtualizationCloud Computing And Virtualization
Cloud Computing And Virtualization
 
Crash Course in Cloud Computing
Crash Course in Cloud ComputingCrash Course in Cloud Computing
Crash Course in Cloud Computing
 
Cloud Computing & Big Data
Cloud Computing & Big DataCloud Computing & Big Data
Cloud Computing & Big Data
 
Big Data and Cloud Computing
Big Data and Cloud ComputingBig Data and Cloud Computing
Big Data and Cloud Computing
 
Cloud Computing and Big Data
Cloud Computing and Big DataCloud Computing and Big Data
Cloud Computing and Big Data
 
Big data on virtualized infrastucture
Big data on virtualized infrastuctureBig data on virtualized infrastucture
Big data on virtualized infrastucture
 
Data SLA in the public cloud
Data SLA in the public cloudData SLA in the public cloud
Data SLA in the public cloud
 
Aims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-versionAims2011 slacc-presentation final-version
Aims2011 slacc-presentation final-version
 
The Path To Cloud - an Infograph on Cloud Migration
The Path To Cloud - an Infograph on Cloud MigrationThe Path To Cloud - an Infograph on Cloud Migration
The Path To Cloud - an Infograph on Cloud Migration
 
reliability based design optimization for cloud migration
reliability based design optimization for cloud migrationreliability based design optimization for cloud migration
reliability based design optimization for cloud migration
 
Innovation with Open Source: The New South Wales Judicial Commission experience
Innovation with Open Source: The New South Wales Judicial Commission experienceInnovation with Open Source: The New South Wales Judicial Commission experience
Innovation with Open Source: The New South Wales Judicial Commission experience
 
Metrics
MetricsMetrics
Metrics
 
5 Cloud Migration Experiences Not to Be Repeated
5 Cloud Migration Experiences Not to Be Repeated5 Cloud Migration Experiences Not to Be Repeated
5 Cloud Migration Experiences Not to Be Repeated
 
Cloud migration pattern using microservices
Cloud migration pattern using microservicesCloud migration pattern using microservices
Cloud migration pattern using microservices
 
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
Massimiliano Raks, Naples University on SPECS: Secure provisioning of cloud s...
 
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
 

Similaire à Cloud Migration, Application Modernization and Security for Partners

Migrating Enterprise Applications to AWS
Migrating Enterprise Applications to AWSMigrating Enterprise Applications to AWS
Migrating Enterprise Applications to AWS
Tom Laszewski
 

Similaire à Cloud Migration, Application Modernization and Security for Partners (20)

Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 
AWS Summit Stockholm 2014 – B2 – Migrating enterprise applications to AWS
AWS Summit Stockholm 2014 – B2 – Migrating enterprise applications to AWSAWS Summit Stockholm 2014 – B2 – Migrating enterprise applications to AWS
AWS Summit Stockholm 2014 – B2 – Migrating enterprise applications to AWS
 
Building compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWSBuilding compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWS
 
Migrating Enterprise Applications to AWS
Migrating Enterprise Applications to AWSMigrating Enterprise Applications to AWS
Migrating Enterprise Applications to AWS
 
Migrating Enterprise Applications to AWS: Best Practices & Techniques (ENT303...
Migrating Enterprise Applications to AWS: Best Practices & Techniques (ENT303...Migrating Enterprise Applications to AWS: Best Practices & Techniques (ENT303...
Migrating Enterprise Applications to AWS: Best Practices & Techniques (ENT303...
 
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
 
From your First Migration to Mass migrations.
From your First Migration to Mass migrations. From your First Migration to Mass migrations.
From your First Migration to Mass migrations.
 
AWS Webcast - Migrating your Data Center to the Cloud
AWS Webcast - Migrating your Data Center to the CloudAWS Webcast - Migrating your Data Center to the Cloud
AWS Webcast - Migrating your Data Center to the Cloud
 
How to Migrate your Startup to AWS
How to Migrate your Startup to AWSHow to Migrate your Startup to AWS
How to Migrate your Startup to AWS
 
Solution architecture Amazon web services
Solution architecture Amazon web servicesSolution architecture Amazon web services
Solution architecture Amazon web services
 
Migrating Existing Applications to AWS Cloud
Migrating Existing Applications to AWS CloudMigrating Existing Applications to AWS Cloud
Migrating Existing Applications to AWS Cloud
 
AWS Cloud Kata 2014 | Jakarta - 2-1 AWS Intro and Scale 2014
AWS Cloud Kata 2014 | Jakarta - 2-1 AWS Intro and Scale 2014AWS Cloud Kata 2014 | Jakarta - 2-1 AWS Intro and Scale 2014
AWS Cloud Kata 2014 | Jakarta - 2-1 AWS Intro and Scale 2014
 
Increase Speed and Agility with Amazon Web Services
Increase Speed and Agility with Amazon Web ServicesIncrease Speed and Agility with Amazon Web Services
Increase Speed and Agility with Amazon Web Services
 
Increase Speed and Agility with Amazon Web Services
Increase Speed and Agility with Amazon Web ServicesIncrease Speed and Agility with Amazon Web Services
Increase Speed and Agility with Amazon Web Services
 
Solved: Your Most Dreaded Test Environment Management Challenges
Solved: Your Most Dreaded Test Environment Management ChallengesSolved: Your Most Dreaded Test Environment Management Challenges
Solved: Your Most Dreaded Test Environment Management Challenges
 
Deep Dive on Amazon Relational Database Service
Deep Dive on Amazon Relational Database ServiceDeep Dive on Amazon Relational Database Service
Deep Dive on Amazon Relational Database Service
 
AWS Startup Day Bangalore: Being Well-Architected in the Cloud
AWS Startup Day Bangalore: Being Well-Architected in the CloudAWS Startup Day Bangalore: Being Well-Architected in the Cloud
AWS Startup Day Bangalore: Being Well-Architected in the Cloud
 
The AWS Shared Responsibility Model: Presented by Amazon Web Services
The AWS Shared Responsibility Model: Presented by Amazon Web ServicesThe AWS Shared Responsibility Model: Presented by Amazon Web Services
The AWS Shared Responsibility Model: Presented by Amazon Web Services
 
ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...
ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...
ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...
 
Using Data Lakes
Using Data LakesUsing Data Lakes
Using Data Lakes
 

Plus de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Cloud Migration, Application Modernization and Security for Partners

  • 1. ©2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Cloud Migration, Application Modernization, and Security for Partners Tom Laszewski, Sr. Manager, GSI Solutions Architecture Matt Yanchyshyn, Sr. Manager, ISV Solutions Architecture
  • 3. People, process, technology Migration experience Knowledge & training Not primary business activity Fear Attempting too much at once Migration challenges
  • 4. Discover Design Transform Transition Operate Optimize Plan RunBuild • Detailed migration plan • Estimate effort • Security & risk assessment • Network topology • Migrate • Deploy • Validate • Assessment & profiling • Prioritization • Data requirements & classification • Business logic & infrastructure dependencies • Pilot testing • Transition to support • Release management • Cutover & decommission • Staff training • Monitoring • Incident management • Provisioning • Monitoring- driven optimization • Continuous integration and continuous deployment App migration assessment Re-hosting (lift and shift) App portfolio optimization Re-platforming (lift and reshape) Migration methodology
  • 5. Planning your migration Migrating to the cloud can take one of many paths Discover, Assess (Enterprise Architecture and Applications) Lift and Shift (Minimal Change) Migration and UAT Testing Operate Refactor for AWS Application Lift and shift Move the App Infrastructure Plan Migration and Sequencing Determine Migration Path Decommission Do Not Move Create Cloud Strategy Design, Build AWS Environment Move the Application Determine Migration Process Manually Move App and Data Third-Party Tools AWS VM Import Refactor for AWS Rebuild Application Architecture Vendor S/PaaS (if available) Third-Party Migration Tool Manually Move App and Data Determine Migration Process Replatform (typically legacy applications) Recode App Components Rearchitect Application Recode Application Architect AWS Environment and Deploy App, Migrate Data Signoff Tuning Cutover Org/Ops Impact Analysis Identify Ops Changes Change Management Plan
  • 7. Architecting your AWS environment The design and architecture of the cloud environment is important, in order to realize cloud benefits such as agility and cost savings Networking • Convergence of on-premises and cloud • Cloud-oriented protocols • IP scheme and addressing • VPC and account configuration Security • SSO • Access policies • Least privilege • Audits • Compliance • Intrusion detection & prevention • Logging Governance • Billing & cost management • Service catalogs • Configuration management • Architecture Standards • SLA/SLO • Procurement Data management • RPO/RTO • Retention policies • Replication • Storage optimization • ILM • Data quality Monitoring • Notifications & alerting • Application level awareness • Thresholds • Service desk integration
  • 8. On-premises infrastructure mapped to AWS Technology On-premises AWS Network VPN, MPLS Amazon VPC, AWS Direct Connect Storage DAS, SAN, NAS, SSD Amazon EBS, Amazon S3, Amazon EC2 instance storage, distributed & clustered FS on Amazon EC2 Compute Hardware, virtualization Amazon EC2, Amazon ECS, AWS Lambda Content delivery Third-party CDN Amazon CloudFront Databases MS SQL Server, MySQL, Oracle, DB2, PostgreSQL, MongoDB,. … Amazon RDS, Amazon DynamoDB, Amazon ElastiCache, DB software on Amazon EC2 Load balancing Hardware and software load balancers Elastic Load Balancing, software load balancers Scaling & cluster management Hardware and software clustering tools Auto Scaling, software clustering solutions DNS BIND, Windows Server, third party Amazon Route 53, third-party DNS software on Amazon EC2
  • 9. On-premises infrastructure mapped to AWS Technology On-premises AWS Analytics & data warehouse Hadoop, Vertica, Cassandra, specialized hardware and software Amazon EMR, Amazon Redshift, software on Amazon EC2 Messaging and workflow RabbitMQ, ActiveMQ, Kafka, … Amazon SQS, Amazon SNS, Amazon SWF, software on Amazon EC2 Caching Redis, Memcached, … Amazon ElastiCache, Memcached, SAP Hana Archiving Tape library, off-site data storage Amazon S3, Amazon Glacier Email Email software Amazon SES Identity, authoritzation, & authentication AD/ADFS, LDAP, SAML, third party… AWS Identity and Access Management/AWS STS, Amazon Cognito, AWS Directory Service, AD & LDAP on Amazon EC2 Deployment & configuration management Chef, Puppet, Salt, Ansible, PowerShell DSC AWS CloudFormation, AWS OpsWorks, AWS Elastic Beanstalk, AWS CodeDeploy, Amazon ECS Management and monitoring CA, BMC, Rightscale Amazon CloudWatch, AWS Config, AWS CloudTrail, AWS Trusted Advisor
  • 11. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge locations AWS is responsible for the security of the cloud
  • 12. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side data encryption Server-side data encryption Network traffic protection Platform, applications, identity & access management Operating system, network, & firewall configuration Customer applications & contentCustomers Customers configure their security in the cloud
  • 13. AWS security offerings Auditability • Compliance reports Visibility • Amazon CloudWatch • AWS CloudTrail • AWS Config • “Describe” APIs Control • IAM • AWS CloudHSM • AWS CloudFormation • AWS KMS
  • 14. Defense-in-depth AWS compliance program Third-party attestations Physical Security groups VPC configuration Network Web application firewalls Bastion hosts Encryption in-transit Hardened AMIs OS and app patch mgmt. IAM roles for EC2 IAM credentials Systemsecurity Logical access controls User authentication Encryption at-rest Datasecurity
  • 15. Encryption: data at rest EBS Volume encryption EBS encryption OS tools AWS marketplace/partner Object encryption S3 server side encryption (SSE) S3 SSE w/ customer provided keys Client-side encryption Database encryption Amazon Redshift encryption RDS PostgreSQL KMS RDS MYSQL KMS RDS ORACLE TDE/HSM RDS MSSQL TDE
  • 16. Built-in firewall: security groups and NACLs • VPC security groups (mandatory) – Instance level, stateful – Supports ALLOW rules only – Default deny inbound, allow outbound – Use as “whitelist” – least privilege • VPC NACLs (optional) – Subnet level, stateless – Supports ALLOW and DENY – Default allow all – Use as “blacklist”/“guardrails”(port 135,21,23…) • Separation of duties • Changes audited via AWS CloudTrail • Additional cost for SGs/NACLs: $0 Physical Interfaces Customer 1 Hypervisor Customer 2 Customer n… … Virtual Interfaces Firewall Customer 1 Security Groups Customer 2 Security Groups Customer n Security Groups Security Groups
  • 17. AWS partner solutions extend & enhance security • Some examples: – Cisco CSR (VPN) – Sophos UTM (firewall, …) – Alert Logic Web Security Manager (WAF) – Alert Logic Threat Manager (NIDS) – Trend Micro Deep Security (IDPS) – Trend Micro SecureCloud (encryption) – Dome9 SecOps (security group audit & management) – …
  • 18. Migration Approach & Best Practices
  • 19. Identifying applications to move Standalone applications are easy to move Application with loosely coupled SOA-based integrations are good candidates Tightly integrated application needs more planning ‘Low hanging fruit’ • Dev/test applications, self-contained web applications (LAMP stack), social media product marketing campaigns, training environments, pre-sales demo portal, software downloads, trial applications Watch out for • 32-bit, non-Linux/Windows, multi-cast (Oracle RAC), client/server applications, engineered systems (Exadata, Netezza), massive file servers, vertically challenged software/applications
  • 20. Getting a bread box estimate: minimum information Compute : Number of servers/VMs including RAM, CPU, OS, and boot drive size (Amazon EC2) Storage mapping to transactional, backup, archival, and log/file system/applications (Amazon EBS, Amazon Glacier, and Amazon S3) Data transfer out for networking Internet or dedicated networking including security requirements (AWS Direct Connect and VPN) Region where processing is happening
  • 21. Getting a bread box estimate: nice to have HA requirements for each workload (ELB, Route 53) Scalability requirements for each workload (ELB, Route 53, Auto Scaling, CloudFront) DR requirements for each workload Storage IOPS requirements for each workload Compute requirements for management/monitoring Backup requirements for each workload that can not be supported by EBS snapshots
  • 22. Getting a bread box estimate: really nice Workload stratification file servers, security, RDBMS, ERP, big data, security, management/monitoring, etc. HIPPA and PCI requirements for each workload HPC requirements for each workload Extremely high CPU, memory requirements Top third-party vendors for packaged apps IDS/IPS, WAF, management, monitoring, logging, etc.
  • 23. Invest in proof of concept early Proof of concept will answer tons of questions and get your feet wet with AWS quickly Will help identify gaps and touch points Give you a good estimation of the migration costs Give you a good estimation of the AWS runtime costs
  • 24. Migrating data into AWS cloud • File transfer to Amazon S3 or Amazon EC2 using S/FTP, SCP, UDP, Attunity • NFS mount accessible from on-premises and AWS • Configure on-premises backup application (like NetBackup, CA, CommVault, Riverbed) to use Amazon S3 • AWS Storage Gateway for asynchronous backup to Amazon S3 • AWS Import/Export service: Ship your disk to AWS • Database backup tools like Oracle Secure Backup • Database replication tools like GoldenGate, Dbvisit • AWS Direct Connect 100 Mbps to 10 Gbps
  • 25. Migrating data into AWS Data size* * relative to Internet bandwidth and latency Datavelocityrequired UDP transfer software (e.g., Aspera, Tsunami, …) Attunity CloudBeam AWS Storage Gateway, Riverbed, NFS AWS Import / ExportTransfer to S3 over Internet One-time upload with constant delta updates Days Hours TBsGBs
  • 27. Enforce consistent security on your hosts Launch instance EC2 AMI catalog Running instance Your instance Hardening Audit and logging Vulnerability management Malware and HIPS Whitelisting and integrity User administration Operating system Configure instance Configure and harden EC2 instances based on security and compliance needs Host-based protection software Restrict access where possible Connect to existing services
  • 28. Separate static assets and move servers away from the edge Inbound HTTP Amazon CloudFront Amazon S3 WAFDynamic App App AppPeering
  • 29. AWS Identity and Access Management Create appropriate principles, authorization, and privileges for AWS resources Multi-factor authenticationIAM Policies User Groups Roles Principle of least privilege User User Hardware Virtual IAM AWS administrative users Root account Note: Always associate the account owner ID with an MFA device and store it in a secured place!
  • 30. IAM hierarchy of privileges AWS account owner (root) IAM user Temporary security creds Permissions Example Unrestricted access to all enabled services and resources Action: * Effect: Allow Resource: * (implicit) Access restricted by group and user policies Action: [‘s3:*’,’sts:Get*’] Effect: Allow Resource: * Access restricted by generating identity and further by policies used to generate token Action: [ ‘s3:Get*’ ] Effect: Allow Resource: ‘arn:aws:s3:::mybucket/*’ Enforce principle of least privilege with IAM users, groups, policies, and temporary credentials
  • 31. Principle of least privilege with IAM • Log in to an account with a less privileged user – Read-only – EC2 launch-only • Change role for privileged action – Administer IAM – Terminate instance – Delete snapshots Protection against accidents or mistakes (e.g., similar to DisableApiTermination=true)
  • 32. Consolidate your IAM users • Put all IAM users and groups in one account • All other accounts use IAM roles Best practices: • Tie into consolidated billing hierarchy • Users in IAM account are only authorized to assume roles in other accounts • No AWS-billable resources in this account
  • 33. Governance through IAM policies ... "Effect": "Deny", "Action": "ec2:RunInstances", "Resource": [ "arn:aws:ec2:region:account:network-interface/*" ], "Condition": { "ArnNotEquals": { "ec2:Subnet": "arn:aws:ec2:region:account:subnet/subnet-12345678" } } }, { "Effect": "Allow", "Action": "ec2:RunInstances", "Resource": [ "arn:aws:ec2:region::image/ami-12345678", "arn:aws:ec2:region:account:subnet/subnet-12345678", "arn:aws:ec2:region:account:security-group/sg-12345678" ] "Condition": { "StringEquals": { "ec2:ResourceTag/BillingCode": “4000" }, "StringEquals": { "ec2:ResourceTag/Environnent": “Prod” ... Deny RunInstances without appropriate subnet Require RunInstances to have specific AMI, subnet, security group, … Require RunInstances to have specific tags
  • 34. Implementing “smart” AWS policies • The 5 Ws of auditability: – Who? – What? – Where? – When? – Why? • What we really want is an “if and only if” statement: – You can deploy this change in production “if and only if” it actually worked in test Controlled by IAM Not controlled by IAM
  • 35. Federate with AWS Directory Service & IAM Directory Users Directory Groups IAM_Admins Read_Only EC2_Admin Group ‘n’ … AWS Directory Services Mgmt Acct IAM_Admin IAM Role Mapping Read_Only EC2_Admin Role ‘n’
  • 36. Case Study: Condé Nast Data Center Migration
  • 37. Condé Nast data center migration drivers • Existing data center needed >$1 million in upgrades • Financial pressure to close facility by July 2014 • Increase resource efficiency, both people and technology
  • 38. Condé Nast data center migration scope • 47 application groups • 350+ servers • 400+ TB storage
  • 39. Application migration methodology • Condé Nast provided a detailed inventory of their Delaware DC assets • Utilization metrics were critical for Reserved Instance analysis and to explore elasticity • Application assessment determined migration order • Migration scheduled in waves • Change window: Migrations occurred over weekends • Coordinating the change window with various teams was key • Applications run in hybrid mode during the migration • After a server was migrated successfully, it was decommissioned
  • 40. Application migration: virtual machines • Condé Nast was highly virtualized (VMware) • Veeam: stage VMs to Amazon S3 – Supports change block tracking which minimizes downtime during migration • AWS VM Import/Export: migrate staged VMs to Amazon EC2 – Eliminates VM data migration as a part of the change window • Large databases: created directly on AWS and then data synchronized
  • 41. Amazon VPC and networking Key criteria to support waves of migration: • AWS Direct Connect: 10 GB DX to AWS • IP addressing: Avoid overlapping IPs • Service names
  • 42. AWS Identity and Access Management (IAM) Key criteria: • IAM policies • Identify groups and permissions • Application tagging
  • 43. Phased migration • Live migration from premises was too slow – Large change windows meant that production systems were frozen for a long time • Solutions: – Use a tool (Veeam) to backup and ongoing synchronization of VMs to Amazon S3 – Use a staging farm to run VM Import/Export
  • 44. VM Import/Export considerations • Root partitions cannot span multiple disks – Solution: Eliminate this on premises before migration • Volumes > 1 TB not supported – Solution: Spread data across volumes • VM Import/Export requires stream-optimized VMDK – Solution: conversion process was scripted • Nonvirtualized servers were virtualized on premises before migration • Unsupported operating systems were upgraded to supported OS before migrating
  • 45. Lessons learned at Condé Nast • Know your limitations • Evaluate and understand your infrastructure environment • Sign-up for enterprise support early and involve a TAM early on • Get your operations staff trained on AWS • Challenge yourself and make sound architecture decisions; changing in future can be difficult • Document every decision made, especially the anti-patterns • Work directly with application owners; nothing beats hands-on experience
  • 46. Your Feedback is Important to AWS Please complete the session evaluation. Tell us what you think!