SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Cloud Adoption –
Journey of IT Service Management
CIO San Francisco Summit
Dec 4, 2013
Caroline Hsieh
Cloud Adoption – How to Get There
Governance structure

Architecture strategies to identify cloud
capabilities to enable business
Selection criteria to determine
preferred cloud vendors

Risk-management process

Service management process for cloud
computing following the ITIL model

Executive
Endorsement
Why Cloud Governance?
Opportunity

 Business Growth
Threat
 Cost Savings
 Minimize vendor proliferation
 Security Risks
 Speed
 Reduce Corporate Risk
 Service Management
 Consistently Secure Data

Cloud Governance
Reap the benefits of cloud while….
 Minimize vendor proliferation
 Reduce Corporate Risk
 Consistently Secure Data

Quickly and Safely
Cloud Governance Structure
Forming a Cloud Governance Body

To enable business to rapidly adopt cloud
solutions while minimizing data security risks
with cloud vendors






Define cloud strategies and maintain cloud capabilities
Establish selection criteria to minimize proliferation of vendors
Perform risk assessment on data and cloud vendors
Educate business users on how to handle data in the cloud
Enforce data security and privacy policies






Enterprise Architecture
IT Operations
Vendor Management
Purchasing






Information Security
Corporate Compliance
Legal
Business Representatives

Cloud Governance Committee is a continuous working body to define
and maintain cloud usage policies and standards.
Architecture Strategy and Cloud Capabilities
Step 1 - Identify business demand across company
SaaS
Sales

IaaS

• Opportunity
Management
• Quoting
• Live Chat
• Account Mgmt.

• Sales Compensation
• Content
Management
• Partner Relationship
Management

Marketing

• Social Marketing
• Campaign
Management
• Live Chat

Tech Support

• Content
Management
• Live Chat

Education &
Training

• Virtual Classroom
• Live Chat

• Knowledge Base
• Compliance
Education

Professional
Services

• Project Accounting
• Online Collaboration

• Service Resource
Planning

HR

• Human Resource
Management
• Applicant Tracking

• Talent Management
• Payroll

Legal

• Contract
Management

• Online Collaboration

• Dev./QA Lab
• Storage
• Database

Marketing

• Microsite Hosting

• Content
Management
• Customer Survey
• Lead Management
• Online Collaboration

• Case Management
• Knowledge Base
• Account Mgmt.

Engineering

PaaS
Engineering

• Dev./QA Lab
• Database
• Integrated
Development
Environment

 Moderate usage of
cloud
 Heavy usage of cloud
Architecture Strategy and Cloud Capabilities
Step 2 – Select Preferred Cloud Vendors


Identify selection criteria
 Cost

 Support

 Talent acquisition

 Integration

 Web services, APIs
 Single sign on

 Data replication
 UI customization

 Support mobile devices
 Multi-factor auth.

 3rd party certification
 Data loss prevention

 Data retention policy
 Access management

 Data encryption
 Data segregation

 SLA (uptime & support)
 Monitoring

 Vendor viability
 Billing

 Redundancy/DR
 Incident notification

 Data privacy

 Indemnification

 eDiscovery

 Architecture
 Security

 Operation
 Legal



Create vendor checklists to incorporate the identified criteria



Select vendor based on functionality fit and adherence to the criteria
Architecture Strategy and Cloud Capabilities
Step 3 – Map business demand to vendor capabilities
Examples
Account Management

Pipeline Management
Lead Management
Performance
Management
Talent Management

Virtual Machine

Preferred CRM
SaaS Vendor

Storage
Web Hosting
Database

Preferred HRMS
SaaS Vendor

Development Platform

Preferred PaaS
Vendor

Workforce
Management
Campaign
Management
Event Management
Lead Generation
Content Management

Online Collaboration

Preferred IaaS
Vendor

Preferred
Marketing
Automation
SaaS Vendor
Preferred
Content
Management
SaaS Vendor

Leverage preferred vendors to






Minimize vendor proliferations
Reduce risk exposure
Consolidate buying power to get best pricing
Negotiate the terms to best protect the
corporation
Standardize technology and skillset required
to support the cloud solutions
Cloud Vendor Risks

What Business and IT are facing today
Data
Access,
Loss &
Privacy
Operations

Legal
Financial

Service
Management

Security
Corporate
Reputation

Vendor
Viability
Data Security and Risk Management


Establish policies for handling data in the cloud



Classify the data based on data sensitivity(*)
Define security control policies for different data classification
Less security control
Public Info







Higher security control
Internal data

Highly confidential data

Educate business community on handling data in the cloud
Obtain business and IT executive approval for storing data in the
cloud
Establish standard agreement terms with preferred vendors
Balancing Business Value vs. Risk Level
HIGH

Approve

Assess

Assess

Reject

Business Values
Time to Market
Cost Saving
Operation Efficiency
Customer Experience

LOW

Risk Level
Security
Financial
Legal
Vendor Management

HIGH
Service Management Process
Leveraging ITIL for cloud services

 Follow ITIL framework for
end to end cloud service
management,
 Clarify the role &
responsibilities of
Business, IT, and cloud
providers.
 Ensure governance
process encompass the
entire service
management cycle.
Develop your staff’s skills on cloud service management
Establish Service Management Process

Roles and Responsibilities Example – to be adjusted for SaaS, PaaS, IaaS
Service Strategy

Service Design

Vendor

Service Portfolio
Management

A

Demand
Management
Financial
Management

Service Level
Management

R

A

C

Transition Plan
& Support

CI

A

R

Event
Management

CI

Availability
Management

A

CI

R

Service Asset &
Configuration

I

CI

A

Incident
Management

A

A

RC

Capacity
Management

A

CI

R

Validation and
Testing

R

A

CI

Problem
Management

A

R

A

IT Service
Continuity

A

CI

R

Release and
Deploy

R

A

CI

Request
Fulfillment

A

Information
Security

CI

A

R

Change
Management

CI

CI

A

Access
Management

Supplier
Management

CI

A

Evaluation

R

A

Service
Catalogue

A

CI

Knowledge
Management

I

A

C

Continual Service
Improvement
IT

Business

Vendor

Service
Measurement and
Reporting

CI

CI

A

Continual Service
Improvement

CI

CI

A

Vendor

Business

C

Business

IT

RI

IT

Vendor

Vendor

Business

Business

A

Service Operation

IT

IT
Service Strategy

Service Transition

I

CI

A

CI

A

C

R

Responsible

A

Accountable

C

Consult

I

Inform
Executive Endorsement
Forming a Cloud Executive Council

Chief
Information
Officer

Business
Executive
Sponsors

Cloud Vision
Funding Model
Risk Threshold
Escalation
Chief
Technology
Officer

Chief
Information
Security
Officer

Cloud Executive Council is a steering committee to sponsor cloud
adoption and champion enforcement of policies.
Summary
Balance business benefits vs.
risk level

Establish cloud strategy and
cloud capability

Cloud Adoption
Obtain buy-in from
stakeholders

Incorporate cloud
governance as part of
enterprise architecture and
IT operations processes
Thank you!

Caroline Hsieh
Email: clhsieh@yahoo.com
www.linkedin.com/in/carolinehsieh

CarolineLHsieh

Contenu connexe

Tendances

Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
David Linthicum
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
Mark Swick
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
Amit Gatenyo
 
IT Department - Re-Organizing Plan II
IT Department - Re-Organizing Plan IIIT Department - Re-Organizing Plan II
IT Department - Re-Organizing Plan II
dabai
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
kavinalli
 

Tendances (20)

How Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation PainHow Email as a Service Can Remove Your Operation Pain
How Email as a Service Can Remove Your Operation Pain
 
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital TransformationHybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
Hybrid IT, Laying the "Right Mix" Foundation for Digital Transformation
 
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm SolutionAn Easy Way to Adopt Hybrid Cloud, Datacomm Solution
An Easy Way to Adopt Hybrid Cloud, Datacomm Solution
 
Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013Becomming a cloud governance ninja linthicum interop fall 2013
Becomming a cloud governance ninja linthicum interop fall 2013
 
Cloud migration
Cloud migrationCloud migration
Cloud migration
 
Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!
Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!
Public Cloud vs Private Cloud – Choosing the Right Cloud Computing Environment!
 
Cloud-Based Service Management
Cloud-Based Service ManagementCloud-Based Service Management
Cloud-Based Service Management
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Microsoft Private Cloud Strategy
Microsoft Private Cloud StrategyMicrosoft Private Cloud Strategy
Microsoft Private Cloud Strategy
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
IT Department - Re-Organizing Plan II
IT Department - Re-Organizing Plan IIIT Department - Re-Organizing Plan II
IT Department - Re-Organizing Plan II
 
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
 
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
Public Cloud Service Agreements: What to Expect and What to Negotiate V2.0
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0
 
Cloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soaCloud computing 12 cloud services requirements in soa
Cloud computing 12 cloud services requirements in soa
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 

En vedette

C1.3 Business Models in iCargo
C1.3 Business Models in iCargoC1.3 Business Models in iCargo
C1.3 Business Models in iCargo
iCargo Project
 

En vedette (9)

Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
Vendor Selection Matrix - Capacity Management - Top 15 Vendors in 2016
 
Top 10 Tips for Smart Software Selection Success Before the Search
Top 10 Tips for Smart Software Selection Success Before the SearchTop 10 Tips for Smart Software Selection Success Before the Search
Top 10 Tips for Smart Software Selection Success Before the Search
 
C1.3 Business Models in iCargo
C1.3 Business Models in iCargoC1.3 Business Models in iCargo
C1.3 Business Models in iCargo
 
Cloud Maturity Model: The Road to Adoption
Cloud Maturity Model: The Road to AdoptionCloud Maturity Model: The Road to Adoption
Cloud Maturity Model: The Road to Adoption
 
Steps to Payroll Software Selection
Steps to Payroll Software SelectionSteps to Payroll Software Selection
Steps to Payroll Software Selection
 
DevOps in the Cloud with Microsoft Azure
DevOps in the Cloud with Microsoft AzureDevOps in the Cloud with Microsoft Azure
DevOps in the Cloud with Microsoft Azure
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Service
 
The SaaS business model
The SaaS business modelThe SaaS business model
The SaaS business model
 
Benchmarking Exceptional Series A SaaS Companies
Benchmarking Exceptional Series A SaaS CompaniesBenchmarking Exceptional Series A SaaS Companies
Benchmarking Exceptional Series A SaaS Companies
 

Similaire à Cloud Adoption - Journey of IT Service Management

BSM for Cloud Computing
BSM for Cloud ComputingBSM for Cloud Computing
BSM for Cloud Computing
BMC Software
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
EuroCloud
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
LA_IBM_Cloud_Event
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
Ajay Rathi
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
 

Similaire à Cloud Adoption - Journey of IT Service Management (20)

Cloud Clinique Enterprise IT Certification Program - Module Matrix
Cloud Clinique   Enterprise IT Certification Program - Module MatrixCloud Clinique   Enterprise IT Certification Program - Module Matrix
Cloud Clinique Enterprise IT Certification Program - Module Matrix
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
BSM for Cloud Computing
BSM for Cloud ComputingBSM for Cloud Computing
BSM for Cloud Computing
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Lecture31.ppt
Lecture31.pptLecture31.ppt
Lecture31.ppt
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
cloudComputingSec_p3.pptx
cloudComputingSec_p3.pptxcloudComputingSec_p3.pptx
cloudComputingSec_p3.pptx
 
Practical Guide to Cloud Management Platforms
Practical Guide to Cloud Management PlatformsPractical Guide to Cloud Management Platforms
Practical Guide to Cloud Management Platforms
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issues
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Mitigating Cloud Risks
Mitigating Cloud RisksMitigating Cloud Risks
Mitigating Cloud Risks
 
Making Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark RivingtonMaking Sense Of Cloud Computing - by Mark Rivington
Making Sense Of Cloud Computing - by Mark Rivington
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Cloud Adoption - Journey of IT Service Management

  • 1. Cloud Adoption – Journey of IT Service Management CIO San Francisco Summit Dec 4, 2013 Caroline Hsieh
  • 2. Cloud Adoption – How to Get There Governance structure Architecture strategies to identify cloud capabilities to enable business Selection criteria to determine preferred cloud vendors Risk-management process Service management process for cloud computing following the ITIL model Executive Endorsement
  • 3. Why Cloud Governance? Opportunity  Business Growth Threat  Cost Savings  Minimize vendor proliferation  Security Risks  Speed  Reduce Corporate Risk  Service Management  Consistently Secure Data Cloud Governance Reap the benefits of cloud while….  Minimize vendor proliferation  Reduce Corporate Risk  Consistently Secure Data Quickly and Safely
  • 4. Cloud Governance Structure Forming a Cloud Governance Body To enable business to rapidly adopt cloud solutions while minimizing data security risks with cloud vendors      Define cloud strategies and maintain cloud capabilities Establish selection criteria to minimize proliferation of vendors Perform risk assessment on data and cloud vendors Educate business users on how to handle data in the cloud Enforce data security and privacy policies     Enterprise Architecture IT Operations Vendor Management Purchasing     Information Security Corporate Compliance Legal Business Representatives Cloud Governance Committee is a continuous working body to define and maintain cloud usage policies and standards.
  • 5. Architecture Strategy and Cloud Capabilities Step 1 - Identify business demand across company SaaS Sales IaaS • Opportunity Management • Quoting • Live Chat • Account Mgmt. • Sales Compensation • Content Management • Partner Relationship Management Marketing • Social Marketing • Campaign Management • Live Chat Tech Support • Content Management • Live Chat Education & Training • Virtual Classroom • Live Chat • Knowledge Base • Compliance Education Professional Services • Project Accounting • Online Collaboration • Service Resource Planning HR • Human Resource Management • Applicant Tracking • Talent Management • Payroll Legal • Contract Management • Online Collaboration • Dev./QA Lab • Storage • Database Marketing • Microsite Hosting • Content Management • Customer Survey • Lead Management • Online Collaboration • Case Management • Knowledge Base • Account Mgmt. Engineering PaaS Engineering • Dev./QA Lab • Database • Integrated Development Environment  Moderate usage of cloud  Heavy usage of cloud
  • 6. Architecture Strategy and Cloud Capabilities Step 2 – Select Preferred Cloud Vendors  Identify selection criteria  Cost  Support  Talent acquisition  Integration  Web services, APIs  Single sign on  Data replication  UI customization  Support mobile devices  Multi-factor auth.  3rd party certification  Data loss prevention  Data retention policy  Access management  Data encryption  Data segregation  SLA (uptime & support)  Monitoring  Vendor viability  Billing  Redundancy/DR  Incident notification  Data privacy  Indemnification  eDiscovery  Architecture  Security  Operation  Legal  Create vendor checklists to incorporate the identified criteria  Select vendor based on functionality fit and adherence to the criteria
  • 7. Architecture Strategy and Cloud Capabilities Step 3 – Map business demand to vendor capabilities Examples Account Management Pipeline Management Lead Management Performance Management Talent Management Virtual Machine Preferred CRM SaaS Vendor Storage Web Hosting Database Preferred HRMS SaaS Vendor Development Platform Preferred PaaS Vendor Workforce Management Campaign Management Event Management Lead Generation Content Management Online Collaboration Preferred IaaS Vendor Preferred Marketing Automation SaaS Vendor Preferred Content Management SaaS Vendor Leverage preferred vendors to      Minimize vendor proliferations Reduce risk exposure Consolidate buying power to get best pricing Negotiate the terms to best protect the corporation Standardize technology and skillset required to support the cloud solutions
  • 8. Cloud Vendor Risks What Business and IT are facing today Data Access, Loss & Privacy Operations Legal Financial Service Management Security Corporate Reputation Vendor Viability
  • 9. Data Security and Risk Management  Establish policies for handling data in the cloud   Classify the data based on data sensitivity(*) Define security control policies for different data classification Less security control Public Info    Higher security control Internal data Highly confidential data Educate business community on handling data in the cloud Obtain business and IT executive approval for storing data in the cloud Establish standard agreement terms with preferred vendors
  • 10. Balancing Business Value vs. Risk Level HIGH Approve Assess Assess Reject Business Values Time to Market Cost Saving Operation Efficiency Customer Experience LOW Risk Level Security Financial Legal Vendor Management HIGH
  • 11. Service Management Process Leveraging ITIL for cloud services  Follow ITIL framework for end to end cloud service management,  Clarify the role & responsibilities of Business, IT, and cloud providers.  Ensure governance process encompass the entire service management cycle. Develop your staff’s skills on cloud service management
  • 12. Establish Service Management Process Roles and Responsibilities Example – to be adjusted for SaaS, PaaS, IaaS Service Strategy Service Design Vendor Service Portfolio Management A Demand Management Financial Management Service Level Management R A C Transition Plan & Support CI A R Event Management CI Availability Management A CI R Service Asset & Configuration I CI A Incident Management A A RC Capacity Management A CI R Validation and Testing R A CI Problem Management A R A IT Service Continuity A CI R Release and Deploy R A CI Request Fulfillment A Information Security CI A R Change Management CI CI A Access Management Supplier Management CI A Evaluation R A Service Catalogue A CI Knowledge Management I A C Continual Service Improvement IT Business Vendor Service Measurement and Reporting CI CI A Continual Service Improvement CI CI A Vendor Business C Business IT RI IT Vendor Vendor Business Business A Service Operation IT IT Service Strategy Service Transition I CI A CI A C R Responsible A Accountable C Consult I Inform
  • 13. Executive Endorsement Forming a Cloud Executive Council Chief Information Officer Business Executive Sponsors Cloud Vision Funding Model Risk Threshold Escalation Chief Technology Officer Chief Information Security Officer Cloud Executive Council is a steering committee to sponsor cloud adoption and champion enforcement of policies.
  • 14. Summary Balance business benefits vs. risk level Establish cloud strategy and cloud capability Cloud Adoption Obtain buy-in from stakeholders Incorporate cloud governance as part of enterprise architecture and IT operations processes
  • 15. Thank you! Caroline Hsieh Email: clhsieh@yahoo.com www.linkedin.com/in/carolinehsieh CarolineLHsieh