man-His presentations and publications include: Cloud Expo West 2011, presentation, Cloud ing Contract Issues, November 7, 2011; Educause 2011, presentation, Managing Cloud Security Risk
Trang 1Ron Scruggs, Thomas Trappler, & Don Philpott
Contracting for Cloud Services
A 6-Step “How-To” Guide to Contracting for Cloud Services Includes a 137-Element Contracting Checklist
Trang 3About the Publisher – Government Training Inc.™
Government Training Inc provides worldwide training, publishing and consulting to government agencies and contractors that support government in areas of business and fi nancial management, acquisition and contracting, physical and cyber security and intelligence operations Our manage-ment team and instructors are seasoned executives with demonstrated experience in areas of Fed-eral, State, Local and DoD needs and mandates
For more information on the company, its publications and professional training,
go to www.GovernmentTrainingInc.com
Copyright © 2011 Government Training Inc All rights reserved
Printed in the United States of America
Th is publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system or transmission in any form or by any means, electronic, mechanical, photocopying, recording or likewise
For information regarding permissions, write to:
Government Training Inc
Rights and Contracts Department
Th is book has drawn heavily on the authoritative materials published by a wide range of sources
Th ese materials are in the public domain, but accreditation has been given both in the text and in the reference section if you need additional information
Th e author and publisher have taken great care in the preparation of this handbook, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions
No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or recommendations contained herein
Trang 4go to http://www.governmenttraininginc.com
Telework: How to Telecommute Successfully
A 5-Step Guide Designed for the Modern Teleworker
Millions of people go to work every day without ever leaving their homes They are part of a growing army of teleworkers in both the private and public sector
If you think you can do your job from home without being distracted, then teleworking could be right for you—and it is certainly worth considering The book spells out all the positives—and the negatives—and with the use of checklists and questionnaires will help you succeed as a teleworker
Developing the Positive, Healthy & Safe Workplace
A 7-Step Management Process Leading to a Culture of Personnel Safety & Security
Rita Rizzo is a nationally recognized expert on all aspects of workplace quality, employee development, leadership and workplace security Her thought-provoking seminars and books have brought practical solutions to the challenges of leadership In the book, Rita presents a 7-step process for use
by management and staff to create a positive, healthy, and safe workplace
Delivering Your Message with PowerPoint
Highly Effective Communications for Government & Corporate Managers
PowerPoint presentations can be an enormously effective communications tool—provided you follow some basic rules
These rules are spelled out in “Delivering Your Message with PowerPoint,” written by Dave Paradi, a proven expert and sought-after speaker at all levels of government and corporations
The book is crammed with examples—good and bad—best practices, and checklists to ensure your presentation is a success
Trang 5be a strange title, but you should never get into a kick-boxing fight with a kangaroo—you would lose In order to be successful you must understand the other participants —what they want, and the tools they use You can then pick the tools and techniques that will work in your favor.
Executive Briefings & Presentations Best
Practices Handbook
A Step-by-Step Process and Guide to Making Powerful
Presentations to Colleagues and the Press
The book will teaches you how you to develop a plan so that you will know what to do, what to say, and how best to say it in any situation These techniques will support you whenever you need to communicate—whether
it is in the office, or in front of millions of people during a live television interview
GovCloud: Cloud Computing for the Business
Trang 6go to http://www.governmenttraininginc.com
Handbook for Managing Teleworkers
A 5-Step Management Process for Managing Teleworkers
The book is an A-Z guide aimed at managers tasked with introducing teleworking, or overseeing teleworkers and ensuring that everything runs smoothly The rules for managing teleworking are the same whether you are
a federal or state employee, or work for a private company or organization The book is also very useful to people who are considering teleworking, or trying to persuade their employer to introduce it
Handbook for Managing Teleworkers – Toolkit
The handbook discusses all the arguments that have been put forward against teleworking and then debunks them using the latest surveys and case studies There are chapters on problems and how to overcome them, how to motivate through counseling and coaching, and developing trust
It is an invaluable resource for all telework managers and those who might
be tasked with taking on this responsibility An essential companion guide to Government Training Inc.’s Handbook for Managing Teleworkers
Trang 8Th is handbook has drawn heavily on authoritative materials published by many federal agencies and especially the Department of Defense (DoD), General Services Administration (GSA) and the Government Accountability Offi ce (GAO) Th ese materials are in the public domain, but ac-creditation has been given either in the text or in the reference section at the end of the book if you need additional information
Disclaimer
Our aim is to provide a comprehensive framework that will allow you to understand the challenges
of cloud computing, how to defi ne procurement vehicles, processes and how to build and fi nalize a contract, as well as how to manage that contract However, this book is a guide only and contains references should you need more detailed information on particular subjects Th is book is not a legal handbook “Example” clauses are given throughout this book, but before preparing a contract you must seek legal counsel Also, if you have detailed legal questions seek the advice of an appropriate legal expert
Trang 10About the authors
Ron Scruggs
Ron Scruggs, Certifi ed Technology Procurement Executive, has a distinguished career in ing, purchasing and contract management He started his career in Washington, D.C., negotiating and managing federal government contracts in the 1960s He also knows the international market well, having spent more than 20 years as Director of Contracts in Europe Most recently he has co-developed the original Contracting in the Cloud seminar based on his experience since the early 2000s before the name “cloud” was attached to these services
sourc-Ron has assisted companies with IT and Business Process Outsourcing, Cloud Services, software development, software licensing, and Website development and other projects He has negotiated dozens of Cloud Services agreements and developed a number of Cloud SaaS template agreements for clients Additionally, Ron has developed software agreements for vendors, as well as customers, leading to an edge by knowing the vendors’ reasons for their terms and conditions while also under-standing the customer needs
Acting as a consultant for a number of Fortune 500 and other companies, he has saved these companies millions of dollars while achieving better terms On a single software deal, he saved $50 million for one of his clients
As manager of Strategic Alliances for Digital and Bay Networks, he negotiated major purchases, such
as personal computers ($40 million a year) and software alliances with Microsoft, Olivetti and other major fi rms He also spent 20 years working as Director of Contracts for Digital and Bay Networks.Ron has developed and taught courses to include Negotiation Success, Resolving Software Business Issues, Export Control Issues and Solutions, Open Software Dynamics and Procurement Manage-ment including Purchasing, Legal, Technical and Finance and Contract Management subjects.Ron has a BA and MBA and has also completed post-graduate courses with INSEAD in France, the Institute of Business Methods (IMEDE) in Switzerland and the Swedish Institute of Manage-ment His published articles include: “Get Better Deals by Listening,” “Eff ective SOW Writing,”
“Cloudy SLAs,” and “What Vendors Do Not Want You To Know About Escrow.”
Ron lives in Florida with his wife of 45 years and his pet, Benji He still consults and teaches IT procurement issues
Thomas Trappler
Th omas Trappler (www.thomastrappler.com) is Director of Software Licensing at the University of California, Los Angeles (UCLA), and has extensive experience leading enterprise-wide IT pro-curement and vendor-management initiatives and negotiations focused on cost reduction and risk mitigation, with an emphasis on cloud computing contracts and software license agreements
Trang 11Elected the inaugural Chair of the University of California (UC) system-wide Technology tion Support Group, Th omas has led the investigation, implementation and ongoing vendor man-agement for more than 30 enterprise-wide IT acquisition agreements Th ese agreements provide 188,000 licenses to 228 operational units in a decentralized enterprise and have resulted in savings
Acquisi-of $7.5 million/year Additionally, Th omas is the lead author and project manager for initiatives to develop UC-wide standard software license agreement and cloud computing contract templates.Dubbed “Th e Cloud Contract Advisor” by Computerworld magazine, Th omas is a nationally rec-ognized expert and published author in cloud computing risk mitigation via contract negotiation and vendor management He has been a guest lecturer at the Polytechnic Institute of New York University, and developed and teaches “Contracting in the Cloud,” the original seminar focused on the unique issues associated with the acquisition and management of cloud computing services
Th omas is currently working with the Cloud Security Alliance as the lead author and project ager on an initiative to establish a standard cloud computing contract checklist
man-His presentations and publications include: Cloud Expo West 2011, presentation, Cloud ing Contract Issues, November 7, 2011; Educause 2011, presentation, Managing Cloud Security Risks Th rough the Right Partnerships, October 19, 2011; Computerworld, column, Th e Cloud Contract Adviser, ongoing; Th e Business of Cloud Computing Conference, pre-conference work-shop, “Due Diligence and Cloud Service Agreements,” June 13, 2011; Security Professionals 2011, presentation, If It’s in the Cloud, Get It on Paper: Cloud Computing Contract Issues, April 6, 2011; Educause West/Southwest Conference 2011, presentation, If It’s in the Cloud, Get It on Paper: Cloud Computing Contract Issues, February 23, 2011; EDUCAUSE Live!, webinar, Spotlight
Comput-on Cloud Computing, December 10, 2010; Educause 2010, discussiComput-on sessiComput-on, Cloud Computing Contract Issues, October 14, 2010; Educause Quarterly, article, If It’s in the Cloud, Get It on Pa-per: Cloud Computing Contract Issues, Volume 33, Number 2, 2010; Educause Quarterly, article,
Is Th ere Such a Th ing as Free Software? Th e Pros and Cons of Open Source Software, Volume 32, Number 2, 2009
Trang 12Acknowledgements vii
Disclaimer vii
Step 1 Understanding Cloud Computing 1
Why it is Called Cloud Computing? 1
Key Cloud Computing Benefits 4
Challenges of Cloud Computing 10
PaaS Issues 22
Step 2 Understanding The Federal Government’s New Approach To Cloud Computing 23
Cloud First 23
President’s Cyber Policy 25
Federal CIO Statements 28
Cybersecurity Gets a Boost 28
IT Reform Push, Nine Months After ‘Cloud First’ Introduction 41
GSA is in the Cloud 47
Step 3 Identifying/Determining Your Needs 59
Provision of Selected IT Services 61
Successful Move to the Cloud Requires Agency Introspection First 74
Focus/Roadmap 85
Pricing Billing Terms 85
Step 4 Defining Potential Procurement Vehicles and Processes 91
Contracts and RFPs 91
How do you Gather Information on Cloud Services? 91
Customer References 93
A Process For Acquiring Cloud Computing Services 93
Developing a Performance-Based Work Statement 110
Other Agencies’ Cloud Implementations 135
Step 5 Building and Finalizing a Contract 139
Infrastructure/Security 139
Information Security 153
Operations Management 158
Third-Party Certifications 160
Customer Data Center Inspection Rights 163
Performance Reporting 164
Location of Data 172
Data Protection, Access, Location – Questions 176
Fees/Payments 177
Terms and Conditions Online 191
Storage Limits/Fees 191
Technical Support 192
SaaS, Security, the Cloud and the Contract 192
Trang 13Step 6 Managing The Contract and The Vendor Relationship 213
Contract Administration 213
Overcoming Weaknesses 215
Contracting Officer’s Technical Representative (COTR) 216
Voucher/Invoice Review, Approval and Processing 221
Re-certification/Re-inspection 227
SLA/KPI Monitoring 227
Vendor Continued Viability – Proactively Monitor 228
Payment for Performance 229
Compliance 229
Relationship Advice for Contract Managers 229
Conclusion 230
Notice:
Appendices & Blank Forms are available online To access additional materials, visit our website at
Cloud Services In the Reference Library Login area of the page, use the following credentials to login:
Username: GTI246679
Password: 10119781
Th is username and password are assigned to you, the purchaser You will need to enter your email address when logging in so that we can verify each visitor Th is information is for the use of the purchaser only and not to be distributed to anyone except the purchaser
Trang 14Throughout this book you will see a number of icons displayed The icons are there
to help you as you work through the Six Step process Each icon acts as an advisory –
for instance alerting you to things that you must always do or should never do The
icons used are:
This is something that you must always do
This is something you should never do
Really useful tips
Points to bear in mind
Have you checked off or answered everything on this list?
Trang 16STEP 1
Understanding Cloud Computing
Cloud computing describes a broad movement to treat IT services as a commodity with the ability
to dynamically increase or decrease capacity to match usage needs By leveraging shared ture and economies of scale, cloud computing presents organizational leadership with a compelling business model It allows users to control the computing services they access, while sharing the investment in the underlying IT resources among consumers
infrastruc-When the computing resources are provided by another organization over a wide-area network, cloud computing is similar to an electric power utility Th e providers benefi t from economies of scale, which in turn enables them to lower individual usage costs and centralize infrastructure costs Users pay for what they consume, can increase or decrease their usage, and leverage the shared underlying resources With a cloud computing approach, a cloud customer can spend less time managing complex IT resources and more time investing in core mission work
Why it is Called Cloud Computing?
Th e term “cloud” is used as a metaphor for the Internet, based on the cloud drawing used in the past
to represent the telephone network, and later to depict the Internet in computer network diagrams
as an abstraction of the underlying infrastructure it represents
Trang 17“It comes from the early days of the Internet where we drew the network as a cloud… we didn’t care where the messages went… the cloud hid it from us.” – Kevin Marks, Google
NIST Provides a Formal Definition for Cloud Computing
Cloud computing is defi ned by the National Institute of Standards and Technology (NIST) as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of confi gu-rable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management eff ort or service provider interaction
Th is cloud model promotes availability and is composed of fi ve essential characteristics, three vice models and four deployment models.”
Trang 18ser-Five Characteristics
On-demand self-service A consumer can unilaterally provision computing capabilities, such as
server time and network storage, as needed automatically without requiring human interaction with each service’s provider
Broad network access Capabilities are available over the network and accessed through standard
mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops and PDAs)
Resource pooling Th e provider’s computing resources are pooled to serve multiple consumers ing a multi-tenant model, with diff erent physical and virtual resources dynamically assigned and reassigned according to consumer demand Th ere is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state or datacenter) Ex-amples of resources include storage, processing, memory, network bandwidth and virtual machines
us-Rapid elasticity Capabilities can be rapidly and elastically provisioned, in some cases automatically,
to quickly scale out, and rapidly released to quickly scale in To the consumer, the capabilities able for provisioning often appear to be unlimited and can be purchased in any quantity at any time
avail-Measured Service Cloud systems automatically control and optimize resource use by leveraging
a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth and active user accounts) Resource usage can be monitored, controlled and reported, providing transparency for both the provider and consumer of the utilized service
Three Service Models
Th e NIST defi nition categorizes cloud computing into three service models:
Cloud Software as a Service (SaaS).Th e capability provided to the consumer is to use the vider’s applications running on a cloud infrastructure Th e applications are accessible from various client devices through a thin client interface, such as a Web browser (e.g., Web-based email) Th e consumer does not manage or control the underlying cloud infrastructure including network, serv-ers, operating systems, storage or even individual application capabilities, with the possible excep-tion of limited user-specifi c application confi guration settings
pro- Examples: Google, NetSuite, RightNow, Salesforce, Service-Now, SuccessFactors, Taleo
and Workday
Trang 19Cloud Platform as a Service (PaaS) Th e capability provided to the consumer is the ability to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider Th e consumer does not manage or control the under-lying cloud infrastructure including network, servers, operating systems or storage, but has control over the deployed applications and possibly application hosting environment confi gurations.
Examples: Google App Engine, Salesforce.com’s Success on Demand, Engine Yard and Azure.
Cloud Infrastructure as a Service (IaaS).Th e capability provided to the consumer is to provision processing, storage, networks and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications
Th e consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage and deployed applications, and possibly limited control of select net-working components (e.g., host fi rewalls)
Examples: Amazon Web Services (EC2, S3 etc.), ENKI, GoGrid,Logicworks, OpSource,
Rackspace, SAVVIS (acquired by CenturyLink) and Terremark
Four Deployment Models
Th e NIST defi nition of cloud computing includes four deployment models, each of which provides distinct trade-off s for agencies which are migrating applications to a cloud environment
Public cloud Th e cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services
Private cloud Th e cloud infrastructure is operated solely for an organization It may be managed
by the organization or a third party and may exist on premise or off premise
Community cloud Th e cloud infrastructure is shared by several organizations and supports a cifi c community that has shared concerns (e.g., mission, security requirements, and policy and com-pliance considerations) It may be managed by the organizations or a third party and may exist on premise or off premise
spe-Hybrid cloud Th e cloud infrastructure is a composition of two or more clouds (private, nity or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds)
commu-Key Cloud Computing Benefits
A number of government agencies are adopting cloud technologies and are realizing able benefi ts For instance, NASA Nebula, through a community cloud, gives researchers access
consider-to IT services relatively inexpensively in minutes Prior consider-to adopting this approach, it would take researchers months to procure and confi gure comparable IT resources and signifi cant management oversight to monitor and upgrade systems Applying cloud technologies across the entire federal government can yield benefi ts such as:
Trang 20 Rapid Deployment/Easy Implementation
Access to Higher Level IT Resources
Green IT
Cost Reduction
You only pay for what you use, as you use it
Hardware, software and IT staff expense reductions
Additional reduced costs from energy and real estate
In FY2010, approximately 30 cents of every dollar invested in Federal IT was spent on data center infrastructure Unfortunately, only a fraction of this investment delivers real, measurable impact for American citizens By using the cloud computing model for IT services, the federal government will be able to reduce its data center infrastructure expenditure by approximately 30 percent (which contributes to the estimated $20 billion of IT spending that could be migrated to cloud comput-ing solutions) Similar effi ciency improvements will be seen in software applications and end-user support
Th ese savings can be used to increase capacity or be reinvested in agency missions, including citizen-facing services and inventing and deploying new innovations Cloud computing can allow IT organizations to sim-plify, as they no longer have to maintain complex, het-erogeneous technology environments Focus will shift from the technology itself to the core competencies and mission of the agency
Across the public and private sectors, data center frastructure investments are not utilized to their full-est potential For example, according to a recent sur-vey, many agencies are not fully utilizing their available storage capacity and are utilizing less than 30 percent of their available server capacity Low uti-lization is not necessarily a consequence of poor management, but, instead, a result of the need to ensure that there is reserve capacity to meet periodic or unexpected demand for key functions.With cloud computing, IT infrastructure resources are pooled and shared across large numbers of applications and organizations Cloud computing can complement data center consolidation eff orts
in-As utilization is improved,
more value is derived from the
existing assets, reducing the
need to continuously increase
capacity Fewer machines mean
less spending on hardware,
software and operations
maintenance, and real estate
and power consumption.
Tip
Trang 21by shifting workloads and applications to infrastructures owned and operated by third parties pacity can be provisioned to address the peak demand across a group of applications, rather than for
Ca-a single Ca-applicCa-ation When demCa-and is Ca-aggregCa-ated in this fCa-ashion Ca-and properly mCa-anCa-aged, the peCa-aks and troughs of demand smooth out, providing a more consistent and manageable demand profi le
Th e shift to cloud computing can help to mitigate the fragmented data, application and ture silo issues associated with federated organizational and funding models by focusing on IT services as a utility IT services become candidates for more cost-eff ective procurement and man-agement, similar to the model currently used for buildings and utility services
infrastruc-Cloud computing has the potential to provide a more interoperable and portable environment for data and systems With the appropriate standards, over time, organizations may be able to move to common services and platforms
Cloud computing can accelerate data center consolidation eff orts by reducing the number of plications hosted within government-owned data centers For those that continue to be owned and operated directly by federal agencies (e.g., by implementing private IaaS clouds), environments will
ap-be more interoperable and portable, which will decrease data center consolidation and integration costs because it reduces unnecessary heterogeneity and complexity in the IT environment
Scalability
Easily access resources needed
Start small and increase over time
Facilitate seasonal peak needs
Resources can grow as your needs grow
With traditional infrastructure, IT service reliability is strongly dependent upon an organization’s ability to predict service demand, which is not always possible For example, the IT system used
in the Car Allowance and Rebate System (CARS, more commonly known as ers”) had numerous failures because the load was considerably higher than what its system could handle Th e sponsor for “Cash-for-Clunkers,” the National Highway Traffi c Safety Administration (NHTSA) anticipated a demand of 250,000 transactions over a four-month period, but within just 90 days, the system processed approximately 690,000 CARS transactions Within three days
“Cash-For-Clunk-of the fi rst dealer registrations, the system was overwhelmed, leading to numerous outages and
service disruptions Th e $1 billion appropriated for the program was nearly exhausted within one week, and
an additional $2 billion was appropriated to triple the potential number of transactions just nine days after the program began
NHTSA deployed a customized commercial tion hosted in a traditional data center environment, but the CARS system presented a very good example
applica-of an unpredictable service demand and a short
devel-The impact of cloud computing
will be far more than economic
Cloud computing will also allow
agencies to improve services and
respond to changing needs and
regulations much more quickly.
Remember
Trang 22opment window that could have been more effi ciently handled using a cloud computing approach Cloud computing will allow agencies to rapidly scale up to meet unpredictable demand, thus mini-mizing similar disruptions Notably, cloud computing also provides an important option for agen-cies in meeting short-term computing needs such as the one above; agencies need not invest in infrastructure in cases where service is needed for a limited period of time.
With a larger pool of resources to draw from, individual cloud services are unlikely to encounter capacity constraints As a result, government services, such as “Cash-for-Clunkers,” would be able
to more rapidly increase capacity and avoid service outages Given appropriate service level ments and governance to ensure overall capacity is met, cloud computing will make the govern-ment’s IT investments less sensitive to the uncertainty in demand forecasts for individual programs, which frequently emerge rapidly in response to national program needs which cannot be foreseen
agree-in the early stages of the federal budget cycle
Th is can present a challenge if you don’t want to update For example, due to lack of integration with in-house systems or lack of training for your end user staff
Remote/Mobile Access
Employees, partners and clients can access and update fi les and information wherever they are (as long as there’s an active Internet connection), rather than having to run back to the offi ce
Th is increased accessibility can lead to increased productivity for employees that are on the road
Th is increased accessibility can lead to increased collaboration Th e ease with which a graphically dispersed team can access the same documents makes it easier to work coopera-tively on the same project Th ere is no need for time to be wasted waiting for emailed revisions because every team member can see what is being done by the others in real time
busi- An additional benefi t is that your in-house resources can be redirected from these areas to focus on diff erentiating projects related to and supporting your core business
Trang 23Rapid Deployment/Easy Implementation
Cloud computing also provides an indirect productivity benefi t to all services in the IT stack For example, less eff ort will be required to stand up and develop software testing environments, en-abling application development teams to integrate and test frequently in production-representative environments at a fraction of the cost of providing this infrastructure separately
Cloud-based projects can be conceived, developed and tested with smaller initial investments than traditional IT investments Rather than laboriously building data center capacity to support a new development environment, capacity can be provisioned in small increments through cloud comput-ing technologies After the small initial investment is made, the project can be evaluated for ad-ditional investment or cancellation Projects that show promise can gain valuable insights through the evaluation process Less promising projects can be cancelled with minimal losses Reducing the minimum required investment size will also provide a more experimental development environ-ment in which innovation can fl ourish
This “start small” approach collectively reduces the risk associated with new
application development.
Th e ability to reduce capital investment and transform it into operational expenses is an vantage of cloud computing Cloud computing can lower the initial cost and reduce the time it takes to deploy new services, and thus can align expense with actual use Many businesses also prefer OPEX over CAPEX because of tax considerations
ad- Instead of having to acquire, install and confi gure a wide range of hardware and software to get
a new IT solution up and running (a process often taking months to complete), you just sign
up for what you need over the Internet, and access to the service is typically provisioned in a matter of hours
Business process owner units, in particular, may value the ability to get a solution up and ning quickly Th e time reduction in their case may also be increased by the ability to by-pass traditional central/corporate IT and/or procurement processes that they may have had to go through in the past From an overall organization perspective, this may not always be a good thing
run-Access to Higher Level IT Resources
Some organizations, especially smaller agencies, may not always be able to aff ord to acquire the latest technology and/or hire IT staff with the highest level of skills By moving to a cloud solution, those organizations can have more equal access to such technology and IT staff re-sources, thus allowing them to compete more eff ectively with larger organizations Due to the economies of scale achieved by a cloud vendor, those resources can be provided at a lower cost that doing so in-house
Trang 24 Additionally a cloud vendor may have expertise in business processes that are needed to keep your business running, but that are not your core business or a key diff erentiator For example, Salesforce and CRM, or Workday and payroll/personnel Moving to a cloud solution could provide you with access to expert systems and resources in those areas, again allowing you to redirect in-house resources to initiatives supporting your core business
Cloud computing will not only make the federal government’s IT services more effi cient and agile,
it will also serve as an enabler for innovation Cloud computing allows the federal government to use its IT investments in a more innovative way and to more easily adopt innovations from the private sector Cloud computing will also help the federal government’s IT services take advantage
of leading-edge technologies including devices such as tablet computers and smart phones
Green IT
Since a cloud provider’s core business is running data centers, they’re more likely to be able to build and run them in the most energy effi cient manner possible (virtualized servers, effi cient cooling, building close to renewal energy sources, etc.) than an organization with a diff erent core business Th is results in reduced needs to acquire in-house hardware, and reduced energy consumption and carbon footprints, per server
Organizations with green initiatives may be able to further those initiatives by adopting cloud services
Cloud Benefits: Efficiency, Agility, Innovation
EFFICIENCY
Improved asset utilization (server
utilization>60-70%)
Aggregated demand and accelerated system
consolidation (e.g., Federal Data Center
Consolidation Initiative)
Improved productivity in application
development, application management,
network and end-user
Low asset utilization (server utilization<30% typical) Fragmented demand and duplicative systems Difficult-to-manage systems
More responsive to urgent agency needs
Years required to build data centers for new services Months required to increase capacity of
existing services
Trang 25Cloud Benefits Current Environment INNOVATION
Shift focus from asset ownership to
service management
Tap into private sector innovation
Encourages entrepreneurial culture
Better linked to emerging technologies
(e.g devices)
Burdened by asset management De-coupled from private sector innovation engines Risk-adverse culture
Challenges of Cloud Computing
Cloud Services are Dynamic and Changing
Cloud Services Growth is Exploding
Procurement Contracting has not Caught up with the Growth
Vendor Contracts (Caveat Emptor, Buyer Beware)
Legal “Cloudy and Foggy”
Private Cloud Challenges
PaaS Issues
Other Key Challenges
Cloud Services are Dynamic and Changing
Th e cloud is a paradigm shift allowing people to network, compute and store data diff erently lier, the solutions provided by the predecessors to the cloud were called time-sharing, then load-balancing and the Web; today we call the evolution the cloud Th e enablers to cloud include virtu-alization, Web 2.0, service-oriented architecture (SOA) and pay-as-you-go models among others
Ear-When using cloud services, the gain has to be weighed against the cost and risk According to an Information Week study, 62 percent of fi rms don’t monitor their cloud application performance Th at lack of monitor-ing creates issues in getting what you pay for Perfor-
You cannot outsource your
responsibility to the cloud.
Caution
Trang 26mance management including Service Level Agreements are part of the solution, when SLAs are drafted and managed properly.
Your clients and users look to you when cloud service problems arise Th erefore, you need to do some thorough due diligence before contracting for cloud services
Cloud Services Growth is Exploding
We will see a growth to thousands of cloud vendors – Gartner
By 2012, it will be 30% percent of IT budgets
By 2012, over 80 percent of fi rms will be using the cloud
Th e industry is poised for strong growth through 2014, when worldwide cloud services revenue
is projected to reach $148.8 billion.” Gartner
A 2011 IBM poll of CIOs shows 70% will pursue the cloud in the next 5 years as a means of growing business and revenue
Total revenues SaaS in 2012 are expected to reach $21.2 billion
SaaS revenues will reach $92.8 billion by 2016
By 2016, SaaS will have 26 percent of the total packaged software market (Forrester)
According to IDC’s landmark 2010 Digital Universe Study, the amount of data created and stored
in 2009 via IaaS when used primarily as a storage vehicle was greater than ever before and was a remarkable 62 percent higher than the previous year Over the next decade, the amount of data will
be 44 times greater than it was in 2009
Cloud services and growth will clearly change the way we do things
Procurement Contracting has not Caught up with the Growth (dealing with outdated contract models)
Th ere are few customer cloud agreement templates
Outsourcing agreements are a good base Some consider cloud services as outsourcing
ASP, “Hosting” are also good base documents
Develop cloud agreements (or work statements) with emphasis on SLAs and KPIs, security and other key provisions, and address your business or mission needs
Th e authors have included checklist references and other data in this book to help you determine the provisions you should address in your “cloud” agreements As part of the procurement process developing an agreement and preparing a procurement document requires a knowledgeable team including a technology specialist, a lawyer, a procurement professional, a security professional and
a user of the services
Trang 27Vendor Contracts
“Th e ease and convenience with which cloud computing arrangements can be set up may lull tomers into overlooking the signifi cant issues that can arise when key data and processes are en-trusted to cloud service providers,” said Professor Christopher Millard, principal researcher on the Cloud Legal Project Th is premise has also been the authors’ experience Some key reasons for pre-contract due diligence include ensuring the vendor provides adequate infrastructure and security, the vendor is viable, and the cloud solution meets your mission or business requirements
cus-Businesses often jump to cloud solutions, since there are immediate economic benefi ts However this is often done without the realization of long-term risks and consequences that can easily eradi-cate the short-term savings
Lack of security is one such consequence Sometimes to get cloud services started, you just click on
“accept” on the Web Some cloud contract issues include:
Major issue: information security policies and compliance often are not addressed
Vendor contracts are written to protect the vendor
Generally missing key concerns (your reasons for using cloud services)
Performance (results are not meeting requirements)
Data loss without backup guarantee
SLAs and KPIs are missing – as well as the right SLAs/KPIs
Performance results
Remedies (no remedy for vendor cloud failure)
Disaster Recovery (including how much data is lost, and when you can use the services again).Vendor contracts are drafted by them in order to protect themselves, the vendor Often the dis-claimer language is much clearer than the language describing the services you are contracting for Following is a summary of the forms and format of standard vendor terms and some recommenda-tions More details are provided later in this book Note that in Federal Government contracting the vendor contracts are not part of the Government award GSA for example has the terms of their Schedule 70 apply to awards
Vendor agreements usually have a number of modules and a provision that the cloud vendor can change the terms at any time (often by just posting the changes on the Web)
Terms of Service (ToS) – the agreement boilerplate Th is has disclaimers of warranty, liability and other risk reduction provisions Th e authors recommend you develop your own template agreements in a way that balances your requirements and risk, as well as vendor risk
Acceptable Use Policy (AUP) – usually adequate except for remedy without notice Th ese require review, should be aligned with your use policy and have a notice for violations and a cure period
Trang 28 Privacy Policy – often allowing the vendor to share data without notice to you Th ese should require notice to you prior to the sharing of data or, in the event of legally required immediate release, that you are notifi ed as to its release.
Service Level Agreement (SLA) – generally not addressing customer needs May refl ect only
downtime of system with exclusions to downtime Does not refl ect loss of data when system returns to operation or how long system is down
SLA may allow vendors to market 100 percent uptime – BUT there may be exceptions to what
is considered downtime (or uptime) or the credits may not apply until a lesser uptime (they guarantee 100 percent, but credits do not apply until the 99 percent uptime threshold is hit)
Exceptions to uptime (maintenance, force majeure, etc.)
Little remedy for failure – does not address loss of revenue, customers, and does not address loss of data and recovery points for data loss or time to restore service
Th reshold for remedies – often remedies do not kick in until after a period of “free” time as the example in the prior bullet point shows
down-An Acceptable Use Clause (a Cloud Vendor Example)
“You agree to be solely responsible for the contents of your transmissions through the Services You agree not to use the Services for illegal purposes or for the transmission of material that is unlawful, defamatory, harassing, libelous, invasive of another’s privacy, abusive, threatening, harmful, vulgar, pornographic, obscene, or is otherwise objectionable, off ends religious sentiments, promotes racism, contains viruses, or that which infringes or may infringe intellectual property or other rights of another You agree not to use the Services for the transmission of ‘junk mail,’ ‘spam,’ ‘chain letters,’
‘phishing’ or unsolicited mass distribution of email We reserve the right to terminate your access to the Services if there are reasonable grounds to believe that you have used the Services for any illegal
an agreement that is one-sided does provide the vendor an economic benefi t, but does not provide customers with reasonable protections and does not guarantee performance
Trang 29For instance, the following actual summary of terms and conditions from a cloud vendor were a major cause of concern:
Minimum 5 yr term, renewal 3 yrs
Customer to comply with online terms of use, terms may change (including price)
Ninety-nine percent uptime, fi ve percent for each percentage point below to a maximum credit
of 15 percent
Exception for upgrades and maintenance and events beyond control of vendor
No acceptance testing of customization
Service “as is” and disclaims it will provide satisfactory quality, data accuracy, uptime
No guarantee that the service will meet your requirements or needs
No guarantee of access to the service or the accuracy of the service
No guarantee availability of its Website
Customer’s Sole remedy – Customer stops use of service
Oh, by the way - $500K upfront payment for the fi rst year of service
Other security and backup: You are responsible for properly confi guring and using the service
and taking your own steps to maintain appropriate security, protection and backup of Your Content, which may include the use of encryption technology to protect Your Content from unauthorized access and routine archiving of Your Content
Disclosure of Data: We may also share information when we have a good faith belief it is
nec-essary to prevent fraud or other illegal activity, to prevent imminent bodily harm, or to protect ourselves and you from people violating our Statement of Rights and Responsibilities Th is may include sharing information with other companies, lawyers, courts or other government entities.Remember that, almost without exception, providers go to considerable lengths to deny that any performance warranty (or security warranty in many cases) existed
[Note that this procurement was sent out to bid after a review of the many issues (the term was too long, there was no guarantee of performance, plus the others issues noted above) Th e particular vendor with these provisions was not invited to bid.]
Loss of Governance
In using cloud infrastructures, the client necessarily cedes control to the cloud vendor on a number
of issues which may aff ect security At the same time, Service Level Agreements (SLAs) may not
off er a commitment to provide such services on the part of the cloud vendor, thus leaving a gap in security defenses
Governance implies control and oversight over policies, procedures and standards for application development, as well as the design, implementation, testing and monitoring of deployed services With the wide availability of cloud computing services, lack of organizational controls over employ-ees engaging such services arbitrarily can be a source of problems While cloud computing simpli-
Trang 30fi es platform acquisition, it doesn’t alleviate the need for governance; instead, it has the opposite
eff ect, amplifying that need as vendors and third parties are now involved
A recent study of the private sector showed that some company executives went directly to cloud vendors and ordered their services without involving their IT department Th e executives had the budget and wanted fast deployment and cheaper costs without the normal internal processes im-peding their eff orts In the government markets, this is not as easy to accomplish with the formal processes in place to put controls on spending public funds
One way vendors avoid having to address due diligence issues with IT is to go around IT
Technology companies know the value in selling directly to the line-of-business
Often this “end-around” is a normal sales tactic
Today, many commercial managers themselves want to avoid the IT process
Th e majority of cloud vendors admit they do not have dedicated security personnel to oversee the security of cloud applications, infrastructure or platforms
Th e majority of cloud vendors believe it is their customer’s responsibility to secure the cloud and not their responsibility Th ey also say their systems and applications are not always evalu-ated for security threats prior to deployment to customers
Buyer beware – on average, providers allocate 10 percent or less of their operational resources to security and most do not have confi dence that customers’ security requirements are being met.Only 36 percent of U.S and 57 percent of European cloud computing users strongly agree or agree that their organization is vigilant in conducting audits or assessments of cloud computing providers before deployment
A cloud vendor should be able to off er world-class security and data privacy better than its tomers can do on their own, and at no additional cost Processes and policies should encompass physical, network, application and data level security, as well as full back-up and disaster recovery
cus-Th e provider should be compliant with security-oriented laws, certifi cations and auditing programs, including Safe Harbor, ISO 27001/2, and SSAE 16 (replaced SAS 70 eff ective 6/15/11) and the NIST standards
Trang 31Data Issues
Data ownership
Confi dentiality
Will you get your data?
How and when?
What format?
Will it be transitioned?
Will it be blocked from future access?
Th ese issues are addressed later in this book when we examine the key contract issues in detail.Multi-tenancy/Shared Services
Multi-tenancy refers to a principle in software architecture where a single instance of the software runs on a server, serving multiple client organizations (tenants)
Multi-tenancy is the key common attribute of both public and private clouds, and it applies to all three layers of a cloud: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS)
Cloud computing services go beyond tactical features such as virtualization, and head towards plementing billing—or chargeback in the case of private clouds—based on metered usage Cloud computing service also features improved accountability using service-level-agreements (SLAs), identity management for secured access, fault tolerance, disaster recovery, dynamic procurement and other key properties
im-By incorporating these shared services at the infrastructure layer, all clouds automatically become multitenant Th en tenants can enjoy the full spectrum of common services from a cloud, starting at the hardware layer and going all the way up to the user-interface layer
Th e challenge is how to eff ectively share infrastructure resources among multiple users, while at the same time ensuring data isolation between users, as if they are running on completely physi-cally separate servers If not done well this could lead to unauthorized data access, or unintentional intermingling of data
Vendor Lock-In
Lack of data portability makes it diffi cult to migrate to another provider or migrate to an in-house
IT environment A Gartner survey in 2010 found that many customers considered the fear of
lock-in a greater deterrent to cloud computlock-ing than security Lock-lock-in makes the customer contractually dependent on the vendor for products and services, and there are usually substantial costs in switch-ing to another vendor One concern is that information might not be easily transferable if vendor
A uses one technology, i.e., a proprietary platform, and vendor B uses another However, as more
Trang 32customers choose multiple vendors to provide the diff erent services required, cloud vendors may be forced to provide better transportability of information.
Note Th e Storage Networking Industry Association’s Technical Work Group is developing an API called the Cloud Data Management Interface that would allow providers to migrate customer data from one vendor’s cloud to the next – a move aimed at alleviating vendor lock-in When that occurs, you will have the issue of cloud vendor acceptance and use among others Th e CDMI is a step in the right direction that customers should be requiring once it is fi nalized
Contract Term Lock-In
Another form of vendor lock-in is a term of agreement provision In the example previously noted, the vendor required a fi ve-year term Th at fi ve-year term posed many risks including:
1 Th e solution required tailoring without an acceptance process for the solution
2 Th e customer had to pay before the solution was developed, tested and accepted
3 If better technology came along, you were stuck with this solution during contract term
4 Th e cloud vendor could change the price and terms of the agreement at any time
5 Th e vendor may not be around for fi ve years
Generally, start with a short term of around one year from acceptance of the services with renewals at customer’s option Have an agreed renewal/extension price ceiling included in the original agreement.Vendor Viability
With the explosion in cloud computing, many vendors are jumping on the bandwagon to provide products and services Some are well prepared to do this and have a proven traffi c record Others do not Selecting the right vendor is critical Th e vendor must not only be the owner of the services it
is providing, it should prove that it has adequate arrangements and expertise in place to guarantee long-term viability You should always ask the following questions:
Is the company fi nancially stable?
Does it have a proven backup strategy?
What do other users say about the company and its performance?
Also, in many customer agreements, there is a ment for annual fi nancial statements and interim re-ports required when signifi cant events occur, such as a vendor offi cer resigns, there is a lawsuit instigated that may impact your rights to use the service, there is a de-cision to fi le for chapter 11 bankruptcy or other events that impact the company’s ability to stay in business
require-Do your due diligence when
choosing a vendor
Must Do
Trang 33Th is provision would be one that both public and private organizations should incorporate in their contracts.
Ask for fi nancial information from the company itself, and use whatever other resources are able to you to check this Some cloud vendors may be private companies so a lot of their fi nancial in-formation is not made public If they want your business they should be willing to provide fi nancial documents If they refuse to do so, suspect the worse and refuse to contract in such circumstances
avail-Th ere are several ways you can still check out private companies Check out their online investor relations information, and fi nd out which venture capitalists (VCs) are supporting them You can check out the track record of the VCs, and see how well they have done in this arena and what expe-rience they have supporting other cloud vendors Check out the vendor’s management team – who are they, what experience do they have, are there any skeletons in their closet—(i.e., did the CEO’s previous two companies declare bankruptcy!)
Recent Vendor Problems
EMC shut down its Atmos EMC and offered no guarantee that its customers
could retrieve their data once the service closed Vaultscape also closed.
In April 2011, Iron Mountain announced it had stopped accepting new customers
for its Virtual File Store service and was planning to shut it down over the next
two years Also in April 2011, Cirtas Systems announced it was leaving the market
to regroup.
The Sony PlayStation Network reported a data breach that compromised the
personal data of more than 100 million customers because of IT failure to
safeguard (including encryption) personal data Reuters reported that the
data breach “may claim another victim – the cloud computing industry.” These
failures are more prevalent than people want to accept, and they existed well
before the cloud did.
Microsoft’s Business Online Professional Services (BPOS) experienced a series of
major outages BPOS was down for six to nine hours for most customers in early
May 2011, followed by sporadic outages over the next couple days During that
time, productivity was significantly impacted, since much of getting business
done relies on being able to send and receive emails.
Online backup company Carbonite alerted the public that it had lost data
belonging to more than 7,500 customers over a number of separate incidents
by filing a lawsuit against a hardware vendor and systems integrator Carbonite
claims that the cloud storage disaster was the result of $3M in faulty equipment
provided by a vendor In fact, according to Carbonite, it turned out that only
54 customers were unable to retrieve their data Regardless of the number,
companies lost data that they were not able to retrieve.
Trang 34Cloudy SLAs
When moving to cloud services, Service Level Agreements (SLAs) are a cornerstone to success Having a part of the agreement with SLAs to align with business goals is a key Th ose vendor agreements that do have SLAs (generally only for system availability during a defi ned period) are inadequate in that availability is only one of the key elements relating to one’s business goals and measures of success
Additionally, the vendor SLA generally has minimal downtime credits (if any), some downtime not applicable and other escapes that do not give you much protection For example, the vendor may limit the amount of credits and start downtime at a point lower than the promised threshold One vendor limited credits to 15 percent of the monthly revenue even if the system was down for 100 percent of the time Regardless the downtime, credits do not address your lost revenue, lost custom-ers, lost data and other things
Availability/downtime SLAs should address a Recovery Point Objective (RPO) and a Recovery Time Objective (RTO) in order to be eff ective and to allow you to understand the full risk If a system goes down at 2:00 pm local time, and you have a four-hour RTO and an eight-hour RPO, you may be looking at the next business day for restart of services and the prior business day where your data is recoverable RTO and RPO are also key elements of a disaster recovery/business con-tinuity plan
Business SLAs fall into these major categories: Availability, Performance/Workload (including tency), Accuracy/Quality, Recoverability, and Security and Cost Th e cost consequences of failures
la-to meet a requirement is a key SLA negotiation issue A due diligence process can help one focus
on areas that need attention and/or improvement Another point is to have a few key SLAs that are reasonable and measurable For example, If you are focusing on availability you don’t need to include
in the SLAs all the elements that go into availability, such as response time, trained technicians, responsive call handlers and so forth You may want to include a vendor’s report on these elements
as key performance indicators (KPIs) to help understand what went wrong in the process that led
to a failed SLA Th e SLA KPI diff erence is that the vendor monetary credits are based on missing SLA targets, not missing KPI matrices
Some additional tips:
When a vendor owes credits, have a process to take the credits quickly
Have an “at risk pool” to set up SLA process
All SLAs should include root-cause analysis fi ndings for failures to meet the SLA
Consider using a third party to monitor SLAs
Monitor SLAs on a frequent basis, ideally on a continual basis
Have a clause to review the SLAs at least monthly and apply credits for mal-performance
Trang 35An “at risk” pool is a sum of money available for allocation to the SLA Th e “at risk” amount can be
a percentage of total monthly charges held back and placed at risk by the service provider, and it is tied to attainment of critical service levels Th e risk pool may be a percentage of the total contract amount set aside as a payment-for-performance amount Th e result is a fi xed price of 80 percent, with 20 percent set aside as payment for performance of SLAs A proportion of the “at risk” pool is usually allocated to each performance category For the service provider, it establishes the maximum
“at risk” amount without excessive risk, fi xes the size of the “at risk” pool and allows for earn-back if
it meets the performance requirements or targets specifi ed in the SLA For the customer, it provides
a meaningful “at risk” amount which can be applied to critical service levels, and it can be tied to annual performance reviews to ensure performance, as well as continuous improvement discussions and implementation
Legal “Cloudy and Foggy”
In the past many legal issues involved in commercial cloud computing were resolved during tract evaluation (i.e., when making comparisons between diff erent providers) similar to the days of the mainframe computer vendors when their contract was required by them for the project
con-Opportunities exist for prospective customers of cloud services to choose providers whose contracts are negotiable Employing an RFP process (such as used in the GSA cloud eff orts for email and IaaS) helps your negotiation eff orts
Standard contract clauses require additional review because of the nature of cloud computing Th e parties to a contract should pay particular attention to their rights and obligations related to no-tifi cations of breaches in security, data transfers, data ownership, change of control and access to data by law enforcement entities Because the cloud can be used to outsource critical internal in-frastructure, and the interruption of that infrastructure may have wide-ranging eff ects, the parties should carefully consider whether standard limitations on liability adequately represent allocations
of liability, given the parties’ use of the cloud or responsibilities for infrastructure
Until legal precedent and regulations address security concerns specifi c to cloud computing, tomers and cloud providers alike should look to the terms of their contract to eff ectively address security risks
cus-In commercial agreements most companies will “carve out” exceptions to limitations of liability
Th ese carve outs would be for gross negligence, willful misconduct, violations of confi dentiality
or intellectual property matters Use a lawyer to help you with specifi c language, in the event your template agreements do not address the limitation of liability and carve-outs from the limitation
of liability
Th e following is a list of areas the customer should pay particular attention to when assessing SLAs and other agreement documents for cloud services (from European Network and Information Se-curity Agency (ENISA):
Trang 361 Data Protection: attention should be paid to choosing a processor that provides suffi cient technical security measures and organizational measures governing the processing to be carried out, and ensuring compliance with those measures
2 Data Security: attention should be paid to mandatory data security measures that potentially
cause either the cloud provider or the customer to be subject to regulatory and judicial measures
if the contract does not address these obligations
3 Data Transfer: attention should be paid to what information is provided to the customer for
information security regarding how data is transferred within the cloud provider’s proprietary cloud, outside that cloud, and within and outside the United States
4 Law Enforcement Access: each country has unique restrictions on, and requirements
provid-ing for, law enforcement access to data Th e customer should pay attention to information able from the provider about the jurisdictions in which data may be stored and processed, and evaluate any risks resulting from the jurisdictions which may apply
avail-5 Confi dentiality and Non-disclosure: the duties and obligations related to this issue should be
reviewed Defi ne personal identifi able information as confi dential information
6 Intellectual Property: in the case of IaaS and PaaS, intellectual property, including original
works created using the cloud infrastructure, may be stored Th e cloud customer should ensure that the contract respects their rights to any intellectual property or original works as far as possible, without compromising the quality of service off ered (e.g., backups may be a necessary part of off ering a good service level)
7 Risk Allocation and Limitation of Liability: when reviewing their respective contract
obli-gations, the parties should underscore those obligations that present signifi cant risk to them
by including monetary remediation clauses, or obligations to indemnify, for the other party’s breach of that contract obligation Furthermore, any standard clauses covering limitations of liability should be evaluated carefully
8 Change of Control: transparency concerning the cloud provider’s continuing ability to honor
their contract obligations in the case of a change of control, as well as any possibility to rescind the contract
Private Cloud Challenges
Cloud services with slower implementation – you keep data on your machines and software, but lose some of the economic and fast implementation benefi ts
May not provide the scalability and agility of public cloud services – the expense of nance, upgrades, new servers and new technology are foregone
mainte- Have to procure and manage hardware and software
Generally more expensive than public cloud
Trang 37PaaS Issues
First Generation PaaS solutions may necessitate from you redundancy and higher costs, and result
in proprietary lock-in Developing on a particular PaaS platform may require that a customer write using the vendor’s potentially unique code Th is may not be easily transferable to another PaaS platform, so could lead to lock-in Ideally PaaS should support your current programming models and applications, enable cloud portability, and provide the abstraction and management capabilities necessary to simplify application development and deployment PaaS systems should have fl exibil-ity and portability designed into the architecture to prevent technology lock-in
Other Key Challenges to Consider
Where do the applications and/or servers reside?
What is their capacity?
What support is provided?
What are your options to minimize the impact if the cloud vendor has service interruption?
In the event of a security breach, what are the privacy and legal liabilities – as databases housing sensitive information will not be housed off site?
Trang 38STEP 2
Understanding The Federal
Government’s New Approach
To Cloud Computing
Why is Cloud Computing Important?
Th e global cloud-computing market is expected to reach $241 billion in 2020, up from $41 billion
in 2010, according to Forrester Research In a nutshell, cloud computing can save time and money,
as well as provide for quick solution deployments How you implement it is important since you must address security (including personal data privacy), consider vendor viability and how to mea-sure performance and success among other factors Th e federal government’s “Cloud First” policy is energizing agencies’ movement to the cloud
Cloud First
To harness the benefi ts of cloud computing, the White House has instituted a Cloud First policy
Th is policy is intended to accelerate the pace at which the government will realize the value of cloud computing by requiring agencies to evaluate safe, secure cloud computing options before making any new investments
By leveraging shared infrastructure and economies of scale, cloud computing presents a ling business model for federal leadership Organizations will be able to measure and pay for only the IT resources they consume, increase or decrease their usage to match requirements and budget constraints, and leverage the shared underlying capacity of IT resources via a network Resources needed to support mission critical capabilities can be provisioned more rapidly, and with minimal overhead and routine provider interaction
Trang 39compel-Cloud computing can be implemented using a variety of deployment models—private, community, public or a hybrid combination.
Cloud computing off ers the government an opportunity to be more effi cient, agile and innovative through more eff ective use of IT investments, and by applying innovations developed in the private sector If an agency wants to launch a new innovative program, it can quickly do so by leveraging cloud infrastructure without having to acquire signifi cant hardware, lowering both time and cost barriers to deployment
Th is Federal Cloud Computing Strategy is designed to:
Articulate the benefi ts, considerations and trade-off s of cloud computing
Provide a decision framework and case examples to support agencies in migrating towards cloud computing
Highlight cloud computing implementation resources
Identify federal government activities, and roles and responsibilities, for catalyzing cloud adoption
Consistent with the Cloud First policy, agencies must modify their IT portfolios to take full advantage of the benefi ts of cloud computing in order to maximize capacity utilization, improve IT fl exibility and respon-siveness, and minimize cost
“Th e cloud will do for the government what the net did in the ’90s We’re interested in consumer tech-nology for the enterprise It’s a fundamental change
Inter-to the way our government operates by moving Inter-to the cloud Rather than owning the infrastructure, we can save millions.” Vivek Kundra, former federal CIO
In testimony before the Senate Subcommittee on Federal Financial Management, Government Information Services, Federal Services and International Security Committee on Homeland Secu-rity and Homeland Aff airs, on April 28, 2009, the Government Accountability Offi ce (GAO) said management and oversight of projects totaling billions of dollars needed more attention
David A Powner, Director of Information Technology Management Issues at GAO, said billions of taxpayer dollars are spent on federal information technology (IT) projects each year Given the size of these investments and their signifi cance to the health, economy, and security of the nation, it is impor-tant that the Offi ce of Management and Budget (OMB) and federal agencies are providing adequate oversight and ensuring transparency of these programs Appropriate oversight and transparency will help ensure that programs are delivered on time, within budget and with the promised capabilities
Each agency is required to
re-evaluate its technology sourcing
strategy to include consideration
and application of cloud
computing solutions as part of
the budget process
Must Do
Trang 40President’s Cyber Policy
In the Memorandum on Transparency and Open Government, issued on January 21, 2009, President Obama instructed the Director of the Offi ce of Management and Budget (OMB) to issue an Open Government Directive Responding to that instruction, OMB issued its Directive on December 8,
2009 It directs executive departments and agencies to take specifi c actions to implement the ciples of transparency, participation and collaboration set forth in the President’s Memorandum
prin-Th e three principles of transparency, participation and collaboration form the cornerstone of an open government Transparency promotes accountability by providing the public with information about what the government is doing Participation allows members of the public to contribute ideas and expertise, so that their government can make policies with the benefi t of information that is widely dispersed in society Collaboration improves the eff ectiveness of government by encourag-ing partnerships and cooperation within the federal government, across levels of government, and between the government and private institutions
Th is Open Government Directive establishes deadlines for action But because of the presumption
of openness that President Obama has endorsed, agencies are encouraged to advance their open ernment initiatives well ahead of those deadlines As part of the open government initiative, federal departments have also been urged to exchange information and best practices and to contribute to the federal dashboard which is designed to help them assess the eff ectiveness of government IT spending – and make this information available to the public Departments are also being encouraged to review their data center policies and consider the economics of switching to cloud computing
gov-25-Point Implementation Plan to Reform Federal Information Technology Management
Information technology should enable government to better serve the American people But spite spending more than $600 billion on information technology over the past decade, the federal government has achieved little of the productivity improvements that private industry has realized from IT Too often, federal IT projects run over budget, behind schedule or fail to deliver promised functionality Many projects use “grand design” approaches that aim to deliver functionality every few years, rather than breaking projects into more manageable chunks and demanding new func-tionality every few quarters In addition, the federal government too often relies on large, custom, proprietary systems when “light technologies” or shared services exist
de-Government offi cials have been trying to adopt best practices for years – from the Raines Rules
of the 1990s through the Clinger-Cohen Act and the acquisition regulations that followed But obstacles have always gotten in the way
A 25-point action plan has been designed to clear these obstacles and deliver more value to the American taxpayer It should allow agencies to leverage information technology to create a more
effi cient and eff ective government Th ese actions have been planned to take place over the next 18 months and place ownership with OMB and agency operational centers, as appropriate While the 25 points may not solve all federal IT challenges, they will address many of the most pressing,