The Doppler Quarterly Summer 2016 | Page 63

critical first step in discovery and forms the foundation for the rest of the process .
Profile Tools
At CTP , we ’ ve developed custom IP that enables us to import discovery tool information . The information from the discovery tools provides the physical characteristics of the servers and then maps them to the client ’ s CMDB .
Within the software , we associate important metadata such as application entry points , SLAs , PII status , compliance and other risk related information in a way that enables the team to decide how best to migrate the selected applications . This team can then :
1 . Identity server and application dependencies 2 . Identify risks 3 . Determine the migration strategy 4 . Create a migration plan 5 . Determine trade-offs and opportunities 6 . Right-size resources in the cloud 7 . Estimate the run rate of your resources in the cloud
Once assembled and analyzed , the migration team uses the data as their Bill of Materials for the migration factory . We will cover this topic in detail in Best Practice # 10 .
# 6 - Build a Minimum Viable Cloud
The Minimum Viable Cloud ( MVC ) is one of the most important of the 10 best practices . Based on the concept of the Minimum Viable Product , the MVC is the starting point of your first production cloud and a platform that you will iterate and improve as you migrate to the cloud . Azure , AWS and Google all allow for automation programming as the primary means to build the new platform . Therefore , we now must think about our cloud as a piece of software . Hence , the new mantra infrastructure is code .
There are two key components of the MVC - the hub and the spokes .
The MVC Hub
The MVC Hub is the portion of your production cloud that provides all the common services consumed by your cloud customers . We recommend a federated model of common services that are supported centrally by your IT Operations team . Standard services found in the MVC Hub are :
• Logging and Monitoring ( centralized )
• Identity Access Management ( IAM )
• Encryption Tools and Key Management
• Security Services such as IPS / IDS / WAF
SUMMER 2016 | THE DOPPLER | 61