15 Questions
Which migration strategy involves moving infrastructure without any changes?
Rehost
What is a potential downside of using the 'lift and shift' migration approach?
It does not allow organizations to access cloud-native services.
Why might some workloads be unsuitable for the cloud?
They may need compliance requirements that some cloud providers cannot meet.
What are the organizations responsible for in the shared security model of cloud environments?
Securing data, applications, and code
What is a result of storing data in an unsuitable cloud model?
Impact on performance and security
What is a risk associated with migrating to the cloud without a thorough migration strategy?
Increased likelihood of repatriation and cost overruns
What is a common issue that arises from unidentified dependencies?
Hidden dependencies on legacy systems or third-party services
What is a common pitfall of the lift-and-shift approach to cloud migration?
Failing to consider the complexity of the application and required changes
What type of application is unsuitable for cloud deployment?
Applications with high latency or real-time requirements
What is a key security responsibility that organizations often overlook?
Assuming cloud providers are responsible for all security aspects
What is a consequence of inadequate backup and disaster recovery strategies?
Increased exposure to downtime and data loss
What is a common mistake made by organizations during cloud migration?
Failing to optimize applications for cloud-native features and services
What is a risk associated with inadequate migration planning?
Increased exposure to downtime and data loss
What is a characteristic of workloads that are incompatible with cloud deployment?
Tightly coupled components or complex integrations
What is a key factor contributing to unrecognized security responsibilities?
Assuming cloud providers are responsible for all security aspects
Study Notes
Cloud Migration Risks
- Wrong migration approach: Selecting a migration strategy that fails to meet business and security demands can have serious consequences.
- Gartner's 5 migration strategies: Rehost, Refactor, Revise, Rebuild, and Replace, each with its pros and cons.
- Rehost (Lift and Shift): Lifts infrastructure from original environment to new cloud environment without changes, simplifying and speeding up migration, but prevents leveraging cloud-native services and modernizing IT environment.
Incompatible Workloads
- Not all workloads suited for cloud: Organizations that unilaterally move workloads to the cloud may face costly repatriation down the road.
Cloud Migration Challenges
Inadequate Migration Strategies
- Migrating applications to the cloud without optimizing for cloud-native features and services can lead to inefficient use of resources
- Failing to consider the complexity of the application and required changes for cloud deployment can result in poor performance and security issues
Unsuitable Workloads
- Applications with high latency or real-time requirements may not be suitable for cloud migration due to limited control over infrastructure
- Workloads requiring specialized hardware or software may not be compatible with cloud providers' offerings
- Incompatible licensing models or unsupported operating systems can hinder cloud migration
- Applications with tightly coupled components or complex integrations can be difficult to migrate
Hidden Dependencies
- Failure to identify hidden dependencies on legacy systems or third-party services can lead to unexpected migration complexities
- Dependencies on outdated technologies or unsupported platforms can cause migration failure
- Overlooking dependencies on specific hardware or software configurations can result in application downtime
Cloud Security Misconceptions
- Cloud providers are not responsible for all security aspects, and organizations must implement adequate security measures
- Failing to implement identity and access management (IAM) controls can lead to unauthorized access to cloud resources
- Overlooking data encryption and key management responsibilities can result in data breaches
- Insufficient monitoring and logging for security incidents can leave systems vulnerable to attacks
Data Loss and Downtime Risks
- Inadequate backup and disaster recovery strategies can result in data loss and extended downtime
- Failure to implement high availability and redundancy measures can lead to service disruptions
- Insufficient monitoring and alerting for potential issues can cause unexpected downtime
- Lack of regular security patches and updates can leave systems vulnerable to attacks
Learn about the risks and challenges associated with cloud migration, including the wrong migration approach and the 5 migration strategies outlined by Gartner. Understand the pros and cons of each strategy, including Rehost, Refactor, Revise, Rebuild, and Replace.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free