
Optimizing IT Services using Cloud, Data Center, and Adherence to Compliance Standards EMC Proven Professional Knowledge Sharing 2011 Amrith Raj Radhakrishnan IT Analyst Tata Consultancy Services Limited [email protected] [email protected] Table of Contents Preface ...................................................................................................................................... 6 Executive Summary ................................................................................................................... 7 1. Introduction ......................................................................................................................... 9 1.1 Evolving Information Technology ...................................................................................... 9 1.2 Data center growth ..........................................................................................................11 1.3 Need for Green ................................................................................................................13 1.4 IT Costs ...........................................................................................................................15 1.5 Compliance and Governance ..........................................................................................16 2. Cloud Computing Considerations .......................................................................................17 2.1 In-house/On-premises model ...........................................................................................17 2.2 Businesses need services, not technologies ....................................................................18 2.3 Definition .........................................................................................................................19 2.4 Importance of Cloud Computing ......................................................................................22 2.5 Impact of Cloud Computing .............................................................................................23 2.5.1 Individual Consumers ..........................................................................................23 2.5.2 Individual Businesses ..........................................................................................24 2.5.3 Start-ups ..............................................................................................................24 2.5.4 Small and Medium-Size Businesses ....................................................................25 2.5.5 Enterprise Businesses .........................................................................................25 2.6 Governing the Cloud ........................................................................................................26 2.7 Risks in the Cloud ............................................................................................................27 2.7.1 Confidentiality ......................................................................................................27 2.7.2 Data Integrity .......................................................................................................28 2.7.3 Data Availability ...................................................................................................29 2.7.4 Identity and Access Management ........................................................................29 2011 EMC Proven Professional Knowledge Sharing 2 2.8 Threats to Cloud Computing ............................................................................................30 2.8.1 Abuse and Nefarious Use of Cloud Computing ....................................................30 2.8.2 Insecure Interfaces and APIs Description ............................................................31 2.8.3 Malicious Insiders ................................................................................................32 2.8.4 Shared Technology Issues...................................................................................33 2.8.5 Data Loss or Leakage ..........................................................................................34 2.8.6 Account or Service Hijacking ...............................................................................35 2.8.7 Unknown Risk Profile ...........................................................................................35 2.9 Migration to the Cloud......................................................................................................37 2.10 Cloud Migration - Assessment Phase ............................................................................38 2.10.1 Identify the asset for cloud deployment ................................................................38 2.10.2 Check Return on Investment and Total Cost of Ownership ..................................42 2.10.3 Risk Assessment .................................................................................................43 2.10.4 Selecting the Deployment Model..........................................................................43 2.10.5 Due diligence, feasibility, and audits ....................................................................43 2.10.6 Identify and Calculate Costs ................................................................................44 2.11 Proof of concept and migration phase ...........................................................................44 2.11.1 Proof of Concept ..................................................................................................45 2.11.2 Pre-plan and Migration .........................................................................................45 2.12 Leveraging the Cloud .....................................................................................................46 2.13 Optimizing the Cloud .....................................................................................................46 3. Efficient Data Centers ........................................................................................................47 3.1 Time to transform the data center ....................................................................................47 3.2 Considerations for Efficient Data Centers ........................................................................48 3.3 Data Center Tiers ............................................................................................................49 3.4 Data Center Consolidation ...............................................................................................51 3.5 Equipment Placement and Cooling ..................................................................................52 3.5.1 Airflow: Front to Back and Side to Side ................................................................56 2011 EMC Proven Professional Knowledge Sharing 3 3.6 Optimizing the Core infrastructure ...................................................................................57 3.7 Server virtualization and consolidation .............................................................................57 3.7.1 Virtualization Considerations ................................................................................60 3.8 I/O Virtualization ..............................................................................................................61 3.8.1 Fabric Sprawl .......................................................................................................61 3.8.2 An Introduction to I/O Virtualization ......................................................................61 3.8.3 InfiniBand (IBA) ....................................................................................................62 3.8.4 Data Center Bridging ...........................................................................................63 3.8.5 Multi-Root Input/Output Virtualization ...................................................................65 3.8.6 I/O Virtualization Comparison ..............................................................................67 3.9 Optimizing Storage ..........................................................................................................67 3.9.1 Requirement Gathering: Storage Checklist ..........................................................68 3.9.2 Storage Virtualization ...........................................................................................69 3.9.3 Replication Selection recommendations ..............................................................74 3.9.4 Best practices in Storage Capacity Management .................................................75 3.10 Converged Infrastructure ...............................................................................................75 3.11 Open Source Solutions ..................................................................................................77 3.11.1 Operating System – Servers and Workstations ....................................................77 3.11.2 Storage ................................................................................................................78 3.12 Section Conclusion ........................................................................................................81 4. IT Compliance and Controls ...............................................................................................81 4.1 Why be compliant? ..........................................................................................................82
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages102 Page
-
File Size-