A cloud strategy document is used to identify, capture and define how the business vision, strategy, goals and values are supported and delivered by cloud IT services.
The strategy document is also used to guide the business in the selection and application of cloud IT services.
To select and effectively utilise cloud services Astute recommends businesses start by creating and using a cloud strategy.
In this series Astute presents a seven step template approach that customer centric businesses use to define their cloud IT strategy.
The cloud IT strategy template structure is as follows:
The alignment section of the template strategy defines how the business vision, strategy, goals and values are supported by the use of cloud IT services. The content of the section is developed by providing concise responses to each of the following questions:
Consider:
Consider:
Consider:
Consider:
Consider:
Consider:
In our next article Astute will describe how to develop and create content for the Success criteria section of a business cloud IT strategy.
The success criteria section of the cloud IT services strategy template identifies the processes and data used to determine the success (or failure) of a cloud service; quantifying how the service:
Cloud IT service success is determined using cloud service costs, and customer and employee benefits; measured and reported using the following six criteria.
Collect, measure and report on the following customer data before and after the introduction of the cloud service:
Collect, measure and report on the following customer data before and after the introduction of the cloud service:
Collect, measure and report on the following customer data before and after the introduction of the cloud service:
Collect, measure and report on the following customer data before and after the introduction of the cloud service:
Using the charges and data collected above determine the financial viability of the cloud IT services (for the specified period) as follows:
Consider what has been collected and calculated. I.e:
The results collected from criteria 6 above are "weighted" by the business and used in the decision to retain or cancel the cloud IT service. E.g: Criteria used to retain the service could be:
In our next article Astute will describe how to develop and create content for the Services criteria section of a business cloud IT strategy.
The types of services section of the Astute cloud IT services strategy template is used to identify and select one or more of the three cloud IT service model and deployment types:
There are also three common cloud deployment options for each of the above cloud service models:
Cloud models and deployment types are then combined to deliver different types of services. E.g:
The table below is used to select cloud IT service model and deployment type based on the business capability and environment.
Business situation | Deployment type | Service Model |
---|---|---|
No existing IT infrastructure; do not develop applications | Cloud | SaaS |
Have existing IT infrastructure and application licenses | Private | N/A |
No existing IT infrastructure and application licenses | Cloud | IaaS |
Existing IT services capacity (e.g. Directory services via Active Directory) | Hybrid | SaaS |
Developing applications and no existing IT infrastructure | Cloud | PaaS |
Developing application and existing IT infrastructure | Private or Hybrid | N/A |
The cloud deployment type and service model, once selected, is factored in to the service operating budget for the success and privacy section of a business cloud IT strategy.
In our next article Astute will describe how to develop and create content for the security and privacy section of a business cloud IT strategy.
The security and privacy section of the Astute cloud IT services strategy template describes an approach to ensure that information stored (by the business) in the cloud remains safe, secure and private.
Astute's approach to cloud security and privacy is based the businesses accepting responsibility and accountability for ensuring customer and business information stored in the cloud is safe, secure and private.
"Private" includes ensuring information privacy concerns are considered whenever personally identifiable or other sensitive information is used in a cloud service.
A responsible and accountable approach to cloud security and privacy helps a business to:
The following five step approach is used by business to ensure information stored in the cloud is safe, secure and private:
Astute's Offer is also available to businesses to assist in the determination of what information can be stored in the cloud and to keep the information secure, safe and private.
In our next article Astute will describe checklist of a business cloud IT strategy.
A service checklist, created from the Astute cloud IT services strategy template, is used by businesses to compare and select cloud IT service provider(s). The service checklist:
The comparison is then used to support the selection of an IT cloud service provider. Astute recommends collating and preparing the data for review in the cloud services assessment and comparison checklist presented below. Checklist column descriptions (#1 to #4):
#1 | #2 | #3 | #4 |
---|---|---|---|
Per cloud services provider | |||
Source | Feature description | Meets (Y/N) | How (evidence) |
Alignment | Feature X (identified by the business to improve customer service) | ||
Feature Y (identified by the business to improve customer service) | |||
Cloud service supports employee access from a range of devices (i.e. computer, tablet, smart phone etc) | |||
Cloud service supports storage and retrieval of customer information (e.g. name, address, contact email, phone) | |||
Success criteria | Cloud service provides data to measure customer acquisition, experience and satisfaction. | ||
Cloud service supports or provides access to data used to measure business operational improvements and efficiencies. | |||
Cloud service usage fees and charges are within the allocated service budget. | |||
Cloud service termination fees and charges are well explained and documented. | |||
Services types | Cloud service supports the specified business cloud IT service model and cloud deployment option. | ||
Service model - IaaS / PaaS / SaaS | |||
Cloud deployment - Private / hybrid / public cloud | |||
Security and privacy | Cloud service provides the "controls" required to ensure that specified business information is safe, secure and private. | ||
Cloud service provides the "controls" required to support any legal and regulatory conditions that apply to the collection and use of information used by the cloud service, especially personal information. | |||
Cloud service provider demonstrates compliance to cloud information security and privacy standards (e.g ISO 27001 or Cloud Security Alliance - Cloud Controls Matrix etc) | |||
Provides evidence of compliance ISO 27001 information security standards by supplying copies (to the business) of recent audits performed on the cloud service in accordance with ISAE 3402 and SOC 2 standards. |
Once completed the service checklist provides the business with a "side by side" comparison of cloud service provider offerings, as well as identifying a preferred cloud service provider.
Adopting and operating a cloud IT service will require changes (or create impacts) to business products, services and operations. In our next article Astute will describe approach business use to identify (and resolve) business impacts introduced as adopting and operating a cloud IT service.
An impact assessment is used in the Astute cloud IT services strategy template to identify and address impacts to business operations, products and services by using the selected cloud service.
Astute recommends a four step approach to identify and address any business impacts introduced by the Checklist template component:
Impact | Remedial actions | Comment |
---|---|---|
Who in the business (employee, manager, unit or group) is responsible for the operation and internal support of the cloud service | Change the business structure (roles, responsibilities, reporting lines, processes etc) to ensure responsibility and accountability for internal support of the cloud service | Typical approach is for the business to adopt (or replicate) the same operations or processes used by the cloud service provider |
Includes cloud service support, access and permissions management (e.g. administrators, user access, approvers etc) | ||
How to ensure that sufficiently trained business teams (employees) are available to support introduction and operation (including service level agreements)of the new service or product? | Employee training, including dry-runs of new processes introduced to the operate the service | Typical approach is for the business to rollout a new (cloud) service to a "pilot" group of users. This allows business to identify, refine and resolve any "glitches" with the delivery and operations of the service |
Customer experience and support service level agreements meet or exceed current service level agreements | Service rollout strategy that outlines the approach (sales, marketing etc) to ensure the successful launch and adoption of the new cloud service | Again using the rollout a new (cloud) service to a "pilot" group of users approach |
Identify and use updated or new customer engagement channels and technologies | Customer support provided by toll-free phone, online chat, support portals and social media | |
How to ensure that customers (and employees) are aware of changes to the service; including outages required to transition the service | Communications strategy or plan that outlines activities, significant dates, approaches to advise customers and customers, content and media used to communicate the changes | Approaches outlined in the communications plan include phone, targeted email, web site and social media, in-application reminders, conference and online meet-ups |
How to deal with "feature gaps or omissions"? Where the feature required is not provided or supported by the selected cloud service | Review and adapt the the business structure (roles, responsibilities, reporting lines etc) to address the gap | Business either adopts the same operations or processes used by the cloud service or implements a business specific workaround |
Review and apply cloud service configuration options to address the feature gap | ||
How to apply one or more specified security and privacy controls that are not provided by the cloud service | Source (locate) another technology or cloud solution to provide the control. Integrate this with the selected cloud service | E.g. "as a service technology controls" such as intrusion detection prevention as a service, firewall as a service, identity as a service etc |
In our next article Astute will describe operations of a business cloud IT strategy.
The final step in the Astute cloud IT services strategy template is for businesses to operate the selected cloud service; ensuring the service delivers products and services to the business and customers of the business.
When operating cloud services Astute recommends that business periodically (e.g. monthly, bi-monthly or quarterly) re-use and re-apply approaches and concepts from their developed cloud strategy template to ensure:
This article concludes Astute's series on developing a business cloud IT strategy. We hope you have found the series helpful.
In our next article Astute will describe Astute Offer of a business cloud IT strategy.
Astute's free and with no obligation consultation offer allows businesses to take advantage of our services and mobile and cloud applications capabilities to:
To take advantage of our offer simply register for the Astute free and no obligation mobile and cloud consultation .