SlideShare a Scribd company logo
1 of 27
Multi-Cloud
Architecture
Approach
M A G A N AT H I N M A R C U S V E E R A R A G A L O O
November 2019
Content
1. Why move to a Multi-Cloud Environment?
2. Transitioning to a Multi-Cloud Environment
3. Multi-Cloud Infrastructure Provisioning
4. Multi-Cloud Security
5. Multi-Cloud Service Networking
6. Multi-Cloud Application Delivery
7. Multi-Cloud and Databases
8. Multi-Cloud Policy and Governance
9. Summary
3
Transitioning to a Multi-Cloud Environment
01
What is a Multi-Cloud Strategy?
Private
Cloud
Why move to a Multi-Cloud Environment?
“Most organizations adopt a multi-
cloud strategy out of a desire to avoid
vendor lock-in or to take advantage of
best-of-breed solutions” -
Gartner analyst
Flexible Customization
Each Cloud Service Provider has
special Features
Risk Mitigation
Deploying critical systems across
multiple Cloud services provides
additional fault tolerance
Minimize the threat of extensive
data loss or downtime due to
component failure in cloud.
6
Transitioning to a Multi-Cloud Environment
02
Objective:
• To simplify access to the multiple environments and to maintain visibility across them without
impacting the agility of lines of business and developers.
• Organizations need to apply consistent policies, minimize cost and monitor activities across all the
services.
The Challenge of Multi-Cloud Operations
The Challenge of Hybrid and Multi-Cloud Operations
Source: Gartner (October 2018)
Transitioning to a Multi-Cloud Datacenter
Source: HashiCorp – Whitepaper Unlocking the Cloud Operating Model
1. Provisioning
• The infrastructure layer transitions from running dedicated servers at limited scale to a dynamic environment where
organizations can easily adjust to increased demand by spinning up thousands of servers and scaling them down when not
in use. As architectures and services become more distributed, the sheer volume of compute nodes increases significantly.
2. Security
• The security layer transitions from a fundamentally “high-trust” world enforced by a strong perimeter and firewall to a
“zero-trust” environment with no clear or static perimeter. As a result, the foundational assumption for security shifts from
being IP-based to using identity-based access to resources. This shift is highly disruptive to traditional security models.
3. Networking
• The networking layer transitions from being heavily dependent on the physical location and IP address of services and
applications to using a dynamic registry of services for discovery, segmentation, and composition.
4. Applications
• The runtime layer shifts from deploying artifacts to a static application server to deploying applications with a scheduler
atop a pool of infrastructure which is provisioned on-demand. In addition, new applications have become collections of
services that are dynamically provisioned, and packaged in multiple ways: from virtual machines to containers.
5. Data
• Multi-cloud architectures offer some potential benefits for databases and data-centric solutions but involve greater
complexity, cost and effort than single-cloud architectures.
6. Governance
• The ability to provide strategic direction, track performance, allocate resources, and make adjustments to ensure that
organizational objectives are met, without breaching the parameters of risk tolerance or compliance obligations.
Transitioning to a Multi-Cloud Environment – Challenges
10
Multi-Cloud Infrastructure Provisioning
03
IT teams should start by implementing reproducible infrastructure as code practices, and then layering compliance and
governance workflows to ensure appropriate controls.
• Reproducible infrastructure as code
• Infrastructure Provisioning is to enable the delivery of reproducible infrastructure as code, providing DevOps
teams a way to plan and provision resources inside CI/CD workflows using familiar tools throughout.
• Compliance and management.
• There is need to enforce policies on the type of infrastructure created, how it is used, and which teams get to use
it.
Multi-Cloud Infrastructure Provisioning
Infrastructure Provisioning
Source: HashiCorp – Whitepaper Unlocking the Cloud Operating Model
12
Multi-Cloud Security
04
Dynamic cloud infrastructure means a shift from zero-trust
networks across multiple clouds without a clear network
perimeter.
The modern “zero trust” approach requires that applications
be explicitly authenticated and authorized to fetch secrets and
perform sensitive operations, and be tightly audited.
Secrets management
Secrets management is the central storage, access control,
and distribution of dynamic secrets. Instead of depending on
static IP addresses, integrating with identity-based access
systems such as AWS IAM and Azure AD to authenticate and
access services and resources is crucial.
Encryption as a service
Additionally, enterprises need to encrypt application data at
rest and in transit. This requires Encryption-as-a-service to
provide a consistent API for key management and
cryptography.
This requires developers to perform a single integration and
then protect data across multiple environments.
Multi-Cloud Security
Security
Source: HashiCorp – Whitepaper Unlocking the Cloud Operating Model
Multi-Cloud Security
SaaS PaaS IaaS
Any User
Any Device
Any Network
Identity and Access Management [Identity as a Service (IDaaS)]
• Single Sign-On
• Universal Directory
• Multi Factor Authentication
• Life Cycle Management
• Mobility Management
• API Access Management
• Developer Platform
15
Multi-Cloud Service Networking
05
Networking services should be able to provide a service registry and
service discovery capabilities.
Having a common registry provides a “map” of what services are
running, where they are, and their current health status. The registry
can be queried programmatically to enable service discovery or drive
network automation of API gateways, load balancers, firewalls, and
other critical middleware components.
Service Registry & Discovery
For networking in the cloud it is beneficial to have a common service
registry. This would integrate health checks and provide DNS and API
interfaces to enable any service to discover and be discovered by other
services.
Service Mesh
The two main goals of a service mesh are to allow insight into previously
invisible service communications layers and to gain full control of all
microservices communication logic, like dynamic service discovery, load
balancing, timeouts, fallbacks, retries, circuit breaking, distributed
tracing, and security policy enforcement between services. The insights
are provided by traffic audit and tracing features.
Multi-Cloud Service Networking
Service Networking
Source: HashiCorp – Whitepaper Unlocking the Cloud Operating Model
17
Multi-Cloud Application Delivery
06
New apps are increasingly distributed while legacy apps also need to
be managed more flexibly. A flexible orchestrator is required to
deploy and manage legacy and modern applications, for all types of
workloads: from long running services, to short lived batch, to
system agents.
Mixed Workload Organization
Many new workloads are developed with container packaging with
the intent to deploy to Kubernetes or other container management
platforms.
High Performance Compute
Schedule applications with low latency across very large clusters.
This is critical for customers with large batch jobs, as is common
with High Performance Computing (HPC) workloads.
Multi-Data Workload Orchestration
As teams roll out global applications in multiple data centers, or
across cloud boundaries, provide for orchestration and scheduling
for these applications, supported by the infrastructure, security, and
networking resources and policies to ensure the applications are
successfully deployed.
Multi-Cloud Application Delivery
Developer Developer Developer
Policy
Application Delivery
19
Multi-Cloud and Databases
07
Multi-Cloud and Databases
Human
Capital E-Commerce
Asset
Management
No Data Sharing from Public Clouds Data across Cloud Platforms
Operational
Data Lake
Analytics
Cloud Data
Governance
Data Quality
Data Security
and Privacy
Data Catalog
Data Life
Cycle
Management
Multi-Cloud and Databases
22
Multi-Cloud Policy and Governance
08
Multi-Cloud Policy and Governance
Source: https://aws.amazon.com/blogs/security/scaling-a-governance-risk-and-compliance-program-for-the-cloud/
24
Summary
09
Summary – Architecture Domains
5. Infrastructure Provisioning
4. Security
3. Networking
2. Databases
1. Applications
6.PolicyandGovernance
AWS, Azure and GCP Global Regions
Source: Gartner ID 366739 (2018)
Summary – Multi-Cloud Architecture
AzureAWS
AWS
Lambda
Azure
Functions
DB DB
Elastic Load
Balancing
Azure Load
Balancer
Auto Scaling Autoscale
Amazon API
Gateway
Instances VMs Autoscale
Source: Gartner 2018

More Related Content

What's hot

An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...Amazon Web Services
 
Defining Your Cloud Strategy
Defining Your Cloud StrategyDefining Your Cloud Strategy
Defining Your Cloud StrategyInternap
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingAmazon Web Services
 
Winning Enterprise Cloud Engagements
Winning Enterprise Cloud EngagementsWinning Enterprise Cloud Engagements
Winning Enterprise Cloud EngagementsAmazon Web Services
 
Considerations for your Cloud Journey
Considerations for your Cloud JourneyConsiderations for your Cloud Journey
Considerations for your Cloud JourneyAmazon Web Services
 
Cloud Adoption in the Enterprise
Cloud Adoption in the EnterpriseCloud Adoption in the Enterprise
Cloud Adoption in the EnterpriseAmazon Web Services
 
A Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence AdoptionA Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence AdoptionAmazon Web Services
 
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesEmerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesChaitanya Atreya
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCAST
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architectureKarl Ots
 
TechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdfTechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdfMIlton788007
 
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive GuidanceAWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive GuidanceTom Laszewski
 
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance WorkshopMicrosoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance WorkshopNicholas Vossburg
 
AWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAmazon Web Services
 

What's hot (20)

An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
An Overview of Best Practices for Large Scale Migrations - AWS Transformation...
 
Defining Your Cloud Strategy
Defining Your Cloud StrategyDefining Your Cloud Strategy
Defining Your Cloud Strategy
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud Computing
 
Winning Enterprise Cloud Engagements
Winning Enterprise Cloud EngagementsWinning Enterprise Cloud Engagements
Winning Enterprise Cloud Engagements
 
Considerations for your Cloud Journey
Considerations for your Cloud JourneyConsiderations for your Cloud Journey
Considerations for your Cloud Journey
 
Cloud Adoption in the Enterprise
Cloud Adoption in the EnterpriseCloud Adoption in the Enterprise
Cloud Adoption in the Enterprise
 
Migrating to the Cloud
Migrating to the CloudMigrating to the Cloud
Migrating to the Cloud
 
A Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence AdoptionA Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence Adoption
 
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud StrategiesEmerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case Study
 
Cloud Strategy First
 Cloud Strategy First Cloud Strategy First
Cloud Strategy First
 
Azure governance
Azure governanceAzure governance
Azure governance
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
 
TechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdfTechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdf
 
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive GuidanceAWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
 
Building Your Cloud Strategy
Building Your Cloud StrategyBuilding Your Cloud Strategy
Building Your Cloud Strategy
 
Hybride Cloud Strategy
Hybride Cloud StrategyHybride Cloud Strategy
Hybride Cloud Strategy
 
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance WorkshopMicrosoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
 
AWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAWS Cloud Migration Insights Forum
AWS Cloud Migration Insights Forum
 

Similar to Multi Cloud Architecture Approach

ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelHitesh Mohapatra
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingijsrd.com
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCiaran Roche
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing OverviewLogicalis
 
Logicalis - Cloud computing overview
Logicalis - Cloud computing overviewLogicalis - Cloud computing overview
Logicalis - Cloud computing overviewLogicalis
 
Top 7 value propositions of a Multi Cloud strategy
Top 7 value propositions of a Multi Cloud strategyTop 7 value propositions of a Multi Cloud strategy
Top 7 value propositions of a Multi Cloud strategyVincy Ko
 
Microservices for Application Modernisation
Microservices for Application ModernisationMicroservices for Application Modernisation
Microservices for Application ModernisationAjay Kumar Uppal
 
Surviving in a Multi-Cloud Universe! | Sysfore
Surviving in a Multi-Cloud Universe! | SysforeSurviving in a Multi-Cloud Universe! | Sysfore
Surviving in a Multi-Cloud Universe! | SysforeSysfore Technologies
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Standards Customer Council
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!imogokate
 
Demystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPDemystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPChirantan Ghosh
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationMarianne Harness
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a CloudDivya S
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 

Similar to Multi Cloud Architecture Approach (20)

ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
 
An study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computingAn study of security issues & challenges in cloud computing
An study of security issues & challenges in cloud computing
 
Practical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud ComputingPractical Guide to Hybrid Cloud Computing
Practical Guide to Hybrid Cloud Computing
 
Multi cloud networking
Multi cloud networkingMulti cloud networking
Multi cloud networking
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
Logicalis - Cloud computing overview
Logicalis - Cloud computing overviewLogicalis - Cloud computing overview
Logicalis - Cloud computing overview
 
Top 7 value propositions of a Multi Cloud strategy
Top 7 value propositions of a Multi Cloud strategyTop 7 value propositions of a Multi Cloud strategy
Top 7 value propositions of a Multi Cloud strategy
 
Microservices for Application Modernisation
Microservices for Application ModernisationMicroservices for Application Modernisation
Microservices for Application Modernisation
 
Surviving in a Multi-Cloud Universe! | Sysfore
Surviving in a Multi-Cloud Universe! | SysforeSurviving in a Multi-Cloud Universe! | Sysfore
Surviving in a Multi-Cloud Universe! | Sysfore
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
Demystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERPDemystifying The Cloud-iON Cloud ERP
Demystifying The Cloud-iON Cloud ERP
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud Migration
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 

More from Maganathin Veeraragaloo

Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Maganathin Veeraragaloo
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Enterprise security architecture approach
Enterprise security architecture approachEnterprise security architecture approach
Enterprise security architecture approachMaganathin Veeraragaloo
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Maganathin Veeraragaloo
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingMaganathin Veeraragaloo
 

More from Maganathin Veeraragaloo (20)

Cloud security (domain11 14)
Cloud security (domain11 14)Cloud security (domain11 14)
Cloud security (domain11 14)
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
BTABOK / ITABOK
BTABOK / ITABOKBTABOK / ITABOK
BTABOK / ITABOK
 
Observability
ObservabilityObservability
Observability
 
Foresight 4 Cybersecurity
Foresight 4 CybersecurityForesight 4 Cybersecurity
Foresight 4 Cybersecurity
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
ISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust FrameworkISO 27005 - Digital Trust Framework
ISO 27005 - Digital Trust Framework
 
ITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORKITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORK
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
COBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORKCOBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
 
Open Digital Framework from TMFORUM
Open Digital Framework from TMFORUMOpen Digital Framework from TMFORUM
Open Digital Framework from TMFORUM
 
Enterprise security architecture approach
Enterprise security architecture approachEnterprise security architecture approach
Enterprise security architecture approach
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
XaaS Overview
XaaS OverviewXaaS Overview
XaaS Overview
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Multi Cloud Architecture Approach

  • 1. Multi-Cloud Architecture Approach M A G A N AT H I N M A R C U S V E E R A R A G A L O O November 2019
  • 2. Content 1. Why move to a Multi-Cloud Environment? 2. Transitioning to a Multi-Cloud Environment 3. Multi-Cloud Infrastructure Provisioning 4. Multi-Cloud Security 5. Multi-Cloud Service Networking 6. Multi-Cloud Application Delivery 7. Multi-Cloud and Databases 8. Multi-Cloud Policy and Governance 9. Summary
  • 3. 3 Transitioning to a Multi-Cloud Environment 01
  • 4. What is a Multi-Cloud Strategy? Private Cloud
  • 5. Why move to a Multi-Cloud Environment? “Most organizations adopt a multi- cloud strategy out of a desire to avoid vendor lock-in or to take advantage of best-of-breed solutions” - Gartner analyst Flexible Customization Each Cloud Service Provider has special Features Risk Mitigation Deploying critical systems across multiple Cloud services provides additional fault tolerance Minimize the threat of extensive data loss or downtime due to component failure in cloud.
  • 6. 6 Transitioning to a Multi-Cloud Environment 02
  • 7. Objective: • To simplify access to the multiple environments and to maintain visibility across them without impacting the agility of lines of business and developers. • Organizations need to apply consistent policies, minimize cost and monitor activities across all the services. The Challenge of Multi-Cloud Operations The Challenge of Hybrid and Multi-Cloud Operations Source: Gartner (October 2018)
  • 8. Transitioning to a Multi-Cloud Datacenter Source: HashiCorp – Whitepaper Unlocking the Cloud Operating Model
  • 9. 1. Provisioning • The infrastructure layer transitions from running dedicated servers at limited scale to a dynamic environment where organizations can easily adjust to increased demand by spinning up thousands of servers and scaling them down when not in use. As architectures and services become more distributed, the sheer volume of compute nodes increases significantly. 2. Security • The security layer transitions from a fundamentally “high-trust” world enforced by a strong perimeter and firewall to a “zero-trust” environment with no clear or static perimeter. As a result, the foundational assumption for security shifts from being IP-based to using identity-based access to resources. This shift is highly disruptive to traditional security models. 3. Networking • The networking layer transitions from being heavily dependent on the physical location and IP address of services and applications to using a dynamic registry of services for discovery, segmentation, and composition. 4. Applications • The runtime layer shifts from deploying artifacts to a static application server to deploying applications with a scheduler atop a pool of infrastructure which is provisioned on-demand. In addition, new applications have become collections of services that are dynamically provisioned, and packaged in multiple ways: from virtual machines to containers. 5. Data • Multi-cloud architectures offer some potential benefits for databases and data-centric solutions but involve greater complexity, cost and effort than single-cloud architectures. 6. Governance • The ability to provide strategic direction, track performance, allocate resources, and make adjustments to ensure that organizational objectives are met, without breaching the parameters of risk tolerance or compliance obligations. Transitioning to a Multi-Cloud Environment – Challenges
  • 11. IT teams should start by implementing reproducible infrastructure as code practices, and then layering compliance and governance workflows to ensure appropriate controls. • Reproducible infrastructure as code • Infrastructure Provisioning is to enable the delivery of reproducible infrastructure as code, providing DevOps teams a way to plan and provision resources inside CI/CD workflows using familiar tools throughout. • Compliance and management. • There is need to enforce policies on the type of infrastructure created, how it is used, and which teams get to use it. Multi-Cloud Infrastructure Provisioning Infrastructure Provisioning Source: HashiCorp – Whitepaper Unlocking the Cloud Operating Model
  • 13. Dynamic cloud infrastructure means a shift from zero-trust networks across multiple clouds without a clear network perimeter. The modern “zero trust” approach requires that applications be explicitly authenticated and authorized to fetch secrets and perform sensitive operations, and be tightly audited. Secrets management Secrets management is the central storage, access control, and distribution of dynamic secrets. Instead of depending on static IP addresses, integrating with identity-based access systems such as AWS IAM and Azure AD to authenticate and access services and resources is crucial. Encryption as a service Additionally, enterprises need to encrypt application data at rest and in transit. This requires Encryption-as-a-service to provide a consistent API for key management and cryptography. This requires developers to perform a single integration and then protect data across multiple environments. Multi-Cloud Security Security Source: HashiCorp – Whitepaper Unlocking the Cloud Operating Model
  • 14. Multi-Cloud Security SaaS PaaS IaaS Any User Any Device Any Network Identity and Access Management [Identity as a Service (IDaaS)] • Single Sign-On • Universal Directory • Multi Factor Authentication • Life Cycle Management • Mobility Management • API Access Management • Developer Platform
  • 16. Networking services should be able to provide a service registry and service discovery capabilities. Having a common registry provides a “map” of what services are running, where they are, and their current health status. The registry can be queried programmatically to enable service discovery or drive network automation of API gateways, load balancers, firewalls, and other critical middleware components. Service Registry & Discovery For networking in the cloud it is beneficial to have a common service registry. This would integrate health checks and provide DNS and API interfaces to enable any service to discover and be discovered by other services. Service Mesh The two main goals of a service mesh are to allow insight into previously invisible service communications layers and to gain full control of all microservices communication logic, like dynamic service discovery, load balancing, timeouts, fallbacks, retries, circuit breaking, distributed tracing, and security policy enforcement between services. The insights are provided by traffic audit and tracing features. Multi-Cloud Service Networking Service Networking Source: HashiCorp – Whitepaper Unlocking the Cloud Operating Model
  • 18. New apps are increasingly distributed while legacy apps also need to be managed more flexibly. A flexible orchestrator is required to deploy and manage legacy and modern applications, for all types of workloads: from long running services, to short lived batch, to system agents. Mixed Workload Organization Many new workloads are developed with container packaging with the intent to deploy to Kubernetes or other container management platforms. High Performance Compute Schedule applications with low latency across very large clusters. This is critical for customers with large batch jobs, as is common with High Performance Computing (HPC) workloads. Multi-Data Workload Orchestration As teams roll out global applications in multiple data centers, or across cloud boundaries, provide for orchestration and scheduling for these applications, supported by the infrastructure, security, and networking resources and policies to ensure the applications are successfully deployed. Multi-Cloud Application Delivery Developer Developer Developer Policy Application Delivery
  • 20. Multi-Cloud and Databases Human Capital E-Commerce Asset Management No Data Sharing from Public Clouds Data across Cloud Platforms Operational Data Lake Analytics
  • 21. Cloud Data Governance Data Quality Data Security and Privacy Data Catalog Data Life Cycle Management Multi-Cloud and Databases
  • 22. 22 Multi-Cloud Policy and Governance 08
  • 23. Multi-Cloud Policy and Governance Source: https://aws.amazon.com/blogs/security/scaling-a-governance-risk-and-compliance-program-for-the-cloud/
  • 25. Summary – Architecture Domains 5. Infrastructure Provisioning 4. Security 3. Networking 2. Databases 1. Applications 6.PolicyandGovernance
  • 26. AWS, Azure and GCP Global Regions Source: Gartner ID 366739 (2018)
  • 27. Summary – Multi-Cloud Architecture AzureAWS AWS Lambda Azure Functions DB DB Elastic Load Balancing Azure Load Balancer Auto Scaling Autoscale Amazon API Gateway Instances VMs Autoscale Source: Gartner 2018

Editor's Notes

  1. Multi-cloud is the use of two or more cloud computing services from any number of different cloud vendors.  A multi-cloud environment could be all-private, all-public or a combination of both. Companies use multi-cloud environments to distribute computing resources and minimize the risk of downtime and data loss.
  2. The essential implications of the transition to the cloud is the shift from “static” infrastructure to “dynamic” infrastructure: from a focus on configuration, and management of a static fleet of IT resources, to provisioning, securing, connecting, and running dynamic resources on demand.
  3. Forrester defines governance as “the ability to provide strategic direction, track performance, allocate resources, and make adjustments to ensure that organizational objectives are met, without breaching the parameters of risk tolerance or compliance obligations.”