Adoption Framework Whitepaper Nov12 Final
Adoption Framework Whitepaper Nov12 Final
Cloud Adoption
Framework
Table of Contents
Part 1: Executive summary
A unified approach to the cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Four themes, three phases
The Cloud Maturity Scale
Fine-tuning your direction with epics
The Google Cloud Adoption Framework
Getting started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
The epics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Google Cloud Adoption Framework
Part 1:
Executive
Summary
2
To truly develop a cloud-first organization, there are four realms (we call them themes1) you will need to
excel in — whatever your business objectives. These four themes define the foundation of cloud
readiness:
Learn: The quality and scale of the learning programs you have in place to upskill your
technical teams, and your ability to augment your IT staff with experienced partners.
Who is engaged? How widespread is that engagement? How concerted is the effort?
How effective are the results?
Lead: The extent to which IT teams are supported by a mandate from leadership to
migrate to cloud, and the degree to which the teams themselves are cross-functional,
collaborative, and self-motivated. How are the teams structured? Have they got
executive sponsorship? How are cloud projects budgeted, governed, assessed?
Scale: The extent to which you use cloud-native services that reduce operational over-
head and automate manual processes and policies. How are cloud-based services
provisioned? How is capacity for workloads allocated? How are application updates
managed?
Secure: The capability to protect your services from unauthorized and inappropriate
access with a multilayered, identity-centric security model. Dependent also on the
advanced maturity of the other three themes. What controls are in place? What technolo-
gies used? What strategies govern the whole?
1
See Stories versus Themes versus Epics to learn more about agile taxonomy.
4
Your readiness for success in the cloud is determined by your current business practices in each of these
four themes. For each theme, those practices will fall into one of the following phases:
Tactical: Individual workloads are in place, but no coherent plan encompassing all of
them with a strategy for building out to the future.
The focus is on reducing the cost of discrete systems and on getting to the cloud with
minimal disruption. The wins are quick, but there is no provision for scale.
Strategic: A broader vision governs individual workloads, which are designed and devel-
oped with an eye to future needs and scale.
You have begun to embrace change, and the people and processes portion of the equa-
tion are now involved. IT teams are both efficient and effective, increasing the value of
harnessing the cloud for your business operations.
Existing data is transparently shared. New data is collected and analyzed. The predictive
and prescriptive analytics of machine learning applied. Your people and processes are
being transformed, which further supports the technological changes. IT is no longer a
cost center, but has become instead a partner to the business.
In the tactical phase, you are reducing costs with a quick return on investment and little disruption to your
IT organization. This is a short-term goal. In the strategic phase, you increase the value delivered by your
IT organization by streamlining operations to be both more efficient and more effective. This is a mid-
term goal. In the transformational phase, your IT organization becomes an engine of innovation, making
it a partner to the business. This is a long-term goal.
5
When you evaluate the four themes in terms of the three phases, you get the Cloud Maturity Scale.
Tactical
Learn Lead Scale Secure
Templates ensure
New
good governance Central identity,
cross-functional
without manual hybrid network
cloud team
review
Transformational
In each of the themes, you can see what happens when you move from adopting new technologies
ad hoc, to working with them more and more strategically across the organization — which naturally
means deeper, more comprehensive, and more consistent training for your people, which in turn
means streamlined and updated processes, which in its turn drives innovation. The whole organization
gradually transforms.
When you are fully invested in the cloud, fully harnessing its capabilities, you are then a cloud-first
organization.
6
Once you’ve determined where you are in your cloud maturity journey, it’s time to move forward. To scope
and structure your program of cloud adoption, you will implement a number of workstreams (which we
call epics2). The epics are defined so that they do not overlap, they are aligned to manageable groups of
stakeholders, and they can be further broken down into individual user stories, making your program
planning easier.
Here’s a look at those epics within the familiar rubric of people, technology, and process. If you can do
only a subset of the epics, focus on the ones in the colored segments. Those are the epics that align with
Learn, Lead, Scale, and Secure; and so those are the epics that will define your journey to
successful cloud adoption.
People
People Operations
Behaviors Communication
External
Experience Sponsorship
2
See Stories versus Themes versus Epics to learn more about agile taxonomy.
7
And those are the three components of the framework Google Cloud uses to guide customers seam-
lessly to the cloud: the three maturity phases applied to the four cloud adoption themes, and the epics.
With the Cloud Maturity Scale, you determine where you are in your journey to the cloud. With the epics,
you devise a way to get to where you’d like to be. You can use the maturity scale and the epics with any
cloud provider, of course: the framework is technology agnostic. But if you’d like to ensure success, you
might consider engaging Google Cloud to be your guide.
Working with a Technical Account Manager (TAM), you can perform a high-level assessment of your
organization’s cloud maturity, which will tell you how to prioritize your training and change management
programs, your partner relationships, your cloud operating model, and your secure account
configuration.
The Adoption Framework streamlines your journey to successfully adopting the cloud. Working within
the framework, a TAM can guide you along that journey, from your first cloud project to becoming a fully
cloud-first organization.
Learn
Lead
Scale
Secure
8
Getting started
The details in the technical deep-dive spell out the foundation for
moving forward, but at a high level, the process looks like this.
gap and pay particular attention to the epics that live inside the cloud
adoption themes. Keep in mind that your actions are a means to one Cloud
of four ends: developing a training program, devising your change Operating Model
management program, designing your cloud operating model, or
securely setting up your Google Cloud Platform (GCP) account.
Technology
Secure
Account Setup
9
Part 2:
Technical
deep-dive
11
Introduction
The move to the cloud can be arduous — unless you plan well from the beginning.
The Adoption Framework helps you with that planning. The framework comprises the Cloud Maturity
Scale, which enables you to analyze where you are now in your journey to the cloud, and the epics, which
help you organize how you will get to where you’d like to be.
The Cloud Maturity Scale measures your organization’s readiness for the cloud by considering your
current business practices (which it classifies into one of three phases) across four themes. The epics
chunk the actions you will need to take into discrete, and discretely measurable, workloads that map to
the same four themes.
The Adoption Framework is derived from Google’s experience of helping hundreds of customers make
their way to the cloud. By working within the framework, you can ensure that you are making the right
choices, both now for current workloads and with an eye to the future, so that the investments you make
today continue to serve you well as you move more and more operations to the cloud. By working within
the framework, in other words, you make the most of your resources from that first workload on.
Businesses that make the most of the cloud — businesses that use
the cloud to drive innovation — are businesses that work towards the
transformational phase, which is a long-term goal. But you will
achieve short-term successes at the tactical and mid-term successes
at the strategic phases as well, and in fact each of those two phases
is necessary and useful.
As an organization
Looking more closely at those phases makes clearer the benefits of with tactical cloud
each, and the way that one phase prepares the way for the next.
objectives, you look to
execute projects with
Tactical maturity
minimal change
Tactical cloud adoption can achieve the short-term business objective
of optimizing cost within your existing IT solutions, for example, by
optimizing heavily underutilized compute and storage resources or by
removing the operational overhead and delay of manually procuring
and provisioning resources.
3
As discussed in McKinsey: Cloud adoption to accelerate IT modernization and True Cloud Justification: Moving Beyond TCO Savings.
13
Strategic maturity
A strategic degree of
A strategic degree of cloud maturity is sufficient to achieve the mid- cloud maturity
term business objective of increasing value delivered by your IT achieves the mid-term
organization. This level is achieved by noticeably improving the effi-
cacy and efficiency with which IT teams develop and operate
business objective of
software solutions, as well as by modernizing the architectures of increasing value
those solutions to take advantage of cloud-native services and
delivered by your IT
platforms.
organization
As an organization with strategic cloud objectives, you will likely
implement some degree of change to your IT teams (people), your
applications and software tools (technology), and your operating
model (process). This change can be limited to an isolated part of
your IT organization and still be effective, providing a blueprint and
early success stories that can be expanded when the IT organization
is ready for comprehensive, transformational change.
Learn
Your staff will be more familiar with your organization’s unique idiosyncrasies
and understand its technical and cultural nuances, while supporting third
parties will have the experience of having completed multiple prior cloud
migrations across a broad spectrum of customer solutions.
TRANSFORMATIONAL
STRATEGIC
TACTICAL
16
Tactical maturity
Upskilling is on a best-effort basis, reliant on individual self-
motivation and free educational resources like online documentation
and YouTube.
Third-party contractors and partners are relied upon to deliver essen- Supporting third
tial work required to achieve the objectives set out by the business. parties will have the
They typically enjoy wide-ranging and ongoing privileged access to
your organization’s cloud estate and serve as a first point of escala-
experience of having
tion in the event of a technical question or an operational incident. completed multiple
prior cloud migrations
You expect to be able to achieve tactical objectives with the IT staff
you have and are not taking action to hire new staff with prior cloud across a broad
experience. spectrum of customer
solutions
Strategic maturity
Upskilling is program managed and offered to any IT role who is
directly or indirectly responsible for contributing to a successful cloud
adoption. A learning plan has been published, training classes (online
or offline) are offered on a regular basis, and achieving formal certifi-
cation is encouraged and budgeted for.
You are actively opening new roles and are hiring for people with prior
cloud experience to complement the IT staff as it upskills itself on
cloud computing best practices.
17
Each IT staff member is given a GCP sandbox project and a limited budget for them to experiment with
and test new ideas.
Transformational maturity
Upskilling is continuous and collaborative. In addition to a regular formal training program, IT teams and
individual contributors host regular hackathons and tech talks to maximize knowledge sharing. Going
one step further, IT staff are encouraged to demonstrate thought leadership to the industry through
public blog articles and public speaking. This outreach serves a double function of challenging staff to
stretch themselves and also to attract new talent to be hired.
You have reviewed and, where needed, redefined all roles and responsibilities to reflect the new require-
ments of a cloud-first IT organization.
Third-party contractors and partners serve primarily as staff augmentation with no privileged access
and very few areas of exclusive knowledge. Most technical questions can be answered internally, and all
incident response playbooks can be executed entirely in-house.
18
Lead
TRANSFORMATIONAL
STRATEGIC
TACTICAL
19
Tactical maturity
Sponsorship is limited to senior management from or for one line of
business. Their primary contribution is delivering the mandate (“sign-
ing off”) and passing it down their reporting line to be executed upon.
Sponsors only get actively involved as a final point of escalation when
progress is otherwise hampered. Sponsors must
ultimately rely on an
Cloud adoption progress is driven by individual contributors with a
personal interest in cloud computing for their solution(s). The ability
agile and cross-
for early adopters to collaborate with other IT roles is subject to the functional group of
friction of the incumbent org structure and reporting lines. cloud early adopters
Because the scope is limited to the project or line of business that this to practically
team of early adopters is aligned with — and must operate within that implement their
budget — their output will not be embedded with central IT.
Depending on the perspective, the outcome is either a “minimum
strategy
viable cloud” or “cloud shadow IT.”
Strategic maturity
Sponsorship extends up to the C-level. Each manager in the reporting
line has clearly defined objectives and KPIs that support the organiza-
tion’s cloud adoption. Sponsors’ key contributions include actively
reaching out horizontally to other IT or business functions to clear the
critical path of roadblocks and visibly and continuously championing
the journey.
Cloud adoption may also be complemented by a dedicated technical project manager who is familiar
with the IT organization, the stakeholders, and the technology landscape.
Transformational maturity
Sponsorship is comprehensive across the entire C-level to include marketing, finance, operations, HR,
and more, and extends down to all levels of management. They comprehensively and consistently set
the tone for a culture of experimentation and innovation within teams. Error budgets for software ser-
vices are accepted and understood at the highest level (CEO), and a culture of blameless postmortems is
fostered throughout the IT organization.
Project teams operate in an environment of transparency and open information sharing and enjoy
enough decision-making autonomy to be able to experiment ad hoc without having to ask for permission
or having to wait for resources to be provisioned. (Data governance and cost control are now a function
of automation, not manual managerial process.) Failures are celebrated for the valuable lessons that the
team has learned and will be shared with the wider business for posterity. An individual’s mistake is
interpreted as a collective or systematic failure that must be addressed as a whole, not by reprimanding
the individual.
21
Scale
TRANSFORMATIONAL
STRATEGIC
TACTICAL
Tactical maturity
Use of managed or serverless cloud services is limited. Instead, a
continued reliance on self-managed, long-lived virtual machines (VMs)
provides a familiar computing platform at the risk of entropy (“config
drift”), making consistent and secure operations increasingly hard over
time. Because there is more to be managed, there is also more to be Because everything
measured, increasing the burden of collecting quality, high-frequency is managed via an
events and metrics.
API, automation can
Changes to application code and environment configuration are pay greater dividends
reviewed and controlled manually, for example, by a change advisory in the cloud
board. They are often considered high risk and deployed infrequently,
measured in weeks or even months.
Strategic maturity
VMs are designed to be immutable, thereby greatly reducing the scope
for change to a system. Environment configuration is baked into ver-
sioned VM images, and stateful and stateless workloads are cleanly
separated to allow for elastic horizontal scaling. Inside the VM, config-
uration values and keys are stored only in-memory, and outside the VM
only in discrete services like the GCP metadata
service, Cloud Key Management Service, or Hashicorp Vault.
4
https://www.terraform.io
23
Application teams go beyond basic monitoring and logging, making use of application performance
monitoring (APM), either through Stackdriver or through a third-party solution to deliver near real-time
insights into service health under real production loads, 24/7.
The provisioning of GCP projects includes all associated configurations (like VPC networking, billing
account, and Cloud Identity and Access Management policies) and is performed programmatically via
Deployment Manager or Hashicorp Terraform, based on a limited set of inputs like cost center, data
sensitivity, team ownership, and dependency with services hosted in other GCP projects.
Transformational maturity
Production VMs allow shell access in break-glass scenarios for debugging purposes only. Self-managed
services are replaced with managed equivalents (for example, Cloud SQL, Cloud Memorystore) or server-
less/SaaS alternatives, where feasible, to minimize the operations overhead of IaaS-based services.
The risk of change is considered to be low. Deployments to production environments are executed
programmatically and automatically, using phased strategies (canary, blue/green, and so on).
Logging and monitoring are comprehensive and cover every service-level indicator that underpins each
service-level objective.
All cloud resources are provisioned programmatically via Deployment Manager, Hashicorp Terraform, or
directly via GCP’s RESTful APIs. Entire production environments can be (re)created within minutes in
another zone or region.
24
Secure
In the narrow sense, the security of your cloud estate is determined by your ability
to guarantee who may perform which action on which resource (identity and
access management) and your understanding of the data that needs
protecting, ensuring it is appropriately catalogued, encrypted, and guarded from
exfiltration, to name just a few considerations.
In the more holistic sense, your security posture relies on the advanced maturity
of the other three cloud adoption themes: 1) continuous learning of the latest
technical vulnerabilities and security best practices, 2) leading by setting measur-
able security objectives and rewarding a culture of blameless postmortems, 3)
scaling through automation which, in turn, minimizes human error and
maximizes auditability.
TRANSFORMATIONAL
STRATEGIC
TACTICAL
All service-to-service
communication is
authenticated and authorized .
Tactical maturity
User identities manifest themselves as Google Cloud Identity5
accounts under an organization domain name, and all consumer
accounts for Google Analytics, Adwords, Play, YouTube, etc. are now
under the control of the enterprise. These identities are not yet syn-
chronized with the organization’s central identity solution, e.g., Because security is
Microsoft Active Directory, and therefore not governed by a single so essential and
source of truth.
because it cuts
Cloud IAM policies predominantly rely on the convenience of proj- across all dimensions
ect-level Primitive Roles (Owner, Editor, Viewer) rather than following and themes, it lives
the principle of least privilege. Default permissions allow for any user
to create GCP projects and billing accounts. Cloud IAM permissions at the very center of
are not continuously monitored with tools like Forseti Security6, and the cloud adoption
the GCP Admin Activity and Data Access logs are not systematically
audited. Service accounts can be created freely, and private keys for
model
service accounts are not automatically rotated.
Strategic maturity
User identities are synchronized to Google Cloud Identity from a
directory service like Active Directory or OpenLDAP, thereby
maintaining a single source of truth and a simpler governance model.
5
G Suite accounts are Cloud Identity accounts with an associated G Suite user license.
6
https://www.forsetisecurity.org
26
Users are authenticated either with the same synchronized password or via a third-party single sign-on
(SSO) service. 100% of all user accounts use two-step verification (e.g., SMS or code generator app) to
defend against phishing attacks, albeit not with a hardware security key.
Cloud IAM policies reference a much more granular set of predefined roles, rather than the coarse primi-
tive roles. The Project Creator and Billing Account Creator roles have been removed from the
organization level to ensure a basic degree of cloud resource governance.
The network-based security perimeter (VPC) is augmented by additional security layers that protect
individual services, for example, via Google’s global Cloud Load Balancing with TLS configured, Cloud
Identity-Aware Proxy, and Cloud Armor. This, in turn, lowers the risk profile of exposing a private service
to the public internet.
Transformational maturity
All service-to-service communication is authenticated and authorized. Little trust is placed in the circum-
stance that they might share the same virtual private cloud (VPC) and/or VPN. For that same reason,
internal firewall rules don’t allow for specific IP addresses or ranges but rather for specific service
accounts.
A comprehensive understanding of the contents of all your data stores provides the threat profiles for
which you can design your security and data governance models, considering scenarios of both
unauthorized and inappropriate access.
100% of all user accounts use a hardware security key7 as their second factor to effectively defend
against phishing attacks. SMS and code generator apps are understood to be insufficiently safe.
GCP Admin Activity and Data Access logs are regularly audited through Stackdriver and automatic alerts
have been configured to watch for patterns that match your threat profile. Cloud IAM permissions and
firewall rules are continuously monitored and corrected with tools like Forseti Security.
7
https://cloud.google.com/security-key/
27
The epics
Once you’ve assessed your cloud maturity, you’re ready to translate those insights into actionable pro-
grams of work. That’s where the epics come in: clearly defined, nonoverlapping workstreams tied back to
the four themes and aligned to your stakeholders. The epics situate the work you will be doing within the
familiar rubric of people/process/technology. With the epics, you will design programs to help you solid-
ify your maturity in any given phase, or take it to the next level.
For a lean approach, focus on the epics inside the four cloud adoption themes. For an enterprise-grade
approach, you will likely want to explore all epics together.
People
People Operations
Behaviors Communication
External
Experience Sponsorship
Access management
Objective: ensuring that only the right people and services are authorized to perform the right actions on the right
resources.
Good access management applies the principle of least privilege without stifling those users and
resources from legitimately accessing the resources they require to perform their jobs. Cloud IAM, as it’s
called in Google Cloud Platform, relies on strong identity management on the one hand (Cloud Identity)
and clean and consistent resource management on the other hand (Resource Manager).
As such, access management deals with both natural users and service accounts, the bundling of both
into user groups, and the assignment of the many IAM roles that group individual permissions together.
Architecture
Objective: providing best practice recommendations and a forward-looking view of the appropriate cloud compute and
storage choices.
Cloud architecture ensures that applications take full advantage of the cloud platform capabilities and
future-proofs the investment in a cloud migration by selecting appropriate compute and storage choices.
For example, to achieve elastic scalability, cloud application architecture favors stateless (micro)services
that are separated from persistent storage. Cloud infrastructure architecture employs software-defined,
immutable components to assure repeatability and security by eliminating manual patching and
maintenance.
It is an essential consideration for any business that wishes to achieve a step change in the scalability,
availability, and affordability of their self-developed applications, data warehouses, and pipelines, and
that seeks to increase development velocity as well.
Behaviors
Objective: developing a systematic way to understand and evolve the behaviors that teams and individuals need to
demonstrate to improve willingness to work as a team, communicate with greater empathy for the audience, and retain
more knowledge from upskilling programs.
Over 90% of our behavior is driven by our unconscious motivations, values, beliefs, and habits. For suc-
cessful cloud adoption, it is critical to address not only the visible or conscious actions and rituals, but to
also focus on the change required in mind-set and values. Your ability to learn and lead is predicated on
the fact that people are going to adopt/demonstrate the new behaviours: e.g., collaboration, blameless-
ness, psychological safety, prototyping, data-driven decision-making.
The end goal is to enable organizations to understand current and desired behaviors and to develop a
change journey that allows them to navigate this shift.
29
In a large, distributed system, there are a lot of unknowns, dependencies, and ownerships, which create
uncertainty about whether code changes will work as intended. For businesses, uncertainty leads to risk
and slows down software delivery. A continuous software release process that validates every change
— continuous integration (CI) and continuous deployment/delivery (CD) — builds confidence that any
code change will work as intended.
Cost control
Objective: instilling cost consciousness and soft boundaries with the consumers of cloud resources (architects,
developers) by maximizing visibility into the costs incurred in near real time.
With no up-front procurement of IT resources to set a physical limit on the amount of resources that
an application can consume and no capex-based, multiyear capacity planning, controlling costs begins
with the individual software engineer. Physical limits of procured hardware are replaced by logical
resource quotas and auto-scaling configurations. Without appropriate dashboards, alerts, and processes
in place, managing the cloud expenditure for organizations with multiple projects, teams, or business
units can be a cumbersome and time-consuming process.
In lieu of hard physical resource limits, application owners must choose from one of three strategies and
take responsibility for enforcing it: unlimited scaling (e.g., customer-facing e-commerce), gradual service
degradation (e.g., internal data analytics), or capped spending (e.g., developer sandbox).
Communication
Objective: understanding and managing a culture of blamelessness and open communication channels, where sharing
failures openly is encouraged and mistakes are treated as opportunities for improvement.
In today’s fast-paced and complex software delivery process, organizations need to understand that
failure is inevitable and treat mistakes as opportunities for improvement. Creating a psychologically safe
and blameless workplace, where taking interpersonal risks is encouraged and where the responsibility
for mistakes does not fall on individuals, but instead on systems and processes, is essential.
Also key to this approach is the postmortem as a tool that helps promote a culture of blamelessness,
continuous learning, and system improvement.
30
Data management
Objective: understanding and managing what data is being stored, where it originates from, how sensitive it is, and who
is accessing it — for the purpose of keeping data safe, discoverable, and useful.
As an organization, being a good custodian of the data you hold is not just good practice. It makes good
business sense as well. Poor data management can lead to breaches or other issues that can result in
reputational damage for your business or regulatory sanctions. Encryption, classification, loss preven-
tion, and adhering to regulatory compliance are just a few of the many considerations that fall under the
umbrella of data management.
External experience
Objective: accelerating cloud adoption by applying best practices and other organizational lessons learned from day one,
through experienced subject matter experts.
While knowledge can be gained through training and other means, the experience itself of building or
implementing a solution provides insights and strategies to effectively overcome problems quickly,
mitigate unforeseen risks, and develop best-fit solutions that address a specific business need.
In the early stages of a cloud adoption journey, seeking outside help is often a good strategy, whether
from a Google partner, Google Professional Services, our Office of the CTO, or our solution architects.
Identity management
Objective: reliably authenticating users’ or services’ identity and guarding against loss of credentials and attempts at
impersonation.
Establishing a person’s or device’s identity with absolute confidence is core to the modern security
model in which no single factor is trusted -- not the password, not the certificate, and most certainly not
the IP address — and yet, by combining many factors, can be trusted from anywhere on any network.
Incident management
Objective: alerting to, triaging, and rectifying unplanned service degradations in an orderly and timely manner, both
self-sufficiently and with Google’s support.
When operating a service, there is a strong requirement for efficient and effective delivery of support to
business users and customers, and a requirement for quick restoration of service when things go wrong.
In the case of adopting cloud technologies, there are both skill gaps and process gaps that need to be
addressed to ensure optimized solutions, continued uptime, and business value.
31
The benefits of creating a rigorous support model include minimizing the risk of service outages, mini-
mizing the impact of such outages when they do occur, and developing well-architected solutions that
make the most of the tools and platforms on which they are built.
Infrastructure as code
Objective: automating through code the configuration and provisioning of resources, so that human error is eliminated,
time is saved, and every step is fully documented.
Configuration and resource automation through code (also programmable infrastructure) enables hori-
zontal and automatic scaling, locking down admin/root access to servers, provisioning developer
environments within minutes, and switching over from one stable production version to another
without downtime.
Instrumentation
Objective: measuring resource health and logging events, as well as tracing, profiling, and debugging applications, so
that the behaviour of a system can be examined under any circumstance and service-level objectives can be quantified.
Comprehensive instrumentation, while essential in any IT operating model, plays an even more important
role in the cloud. It provides the metrics by which an application will determine when and how to elasti-
cally scale its resources and provides crucial insights to help triage whether Google’s services or your
own application is the root cause for an observed poor performance or degraded service. Last
but not least, and because every action in the cloud is an API call, comprehensive logging provides a
gapless and immutable audit trail of who performed which action to which resource or configuration,
which in turn helps make your cloud operations inherently more secure.
Networking
Objective: connecting and protecting services and the flow of data between them via logical boundaries, regardless of a
service’s identity or permissions.
Networking is a critical infrastructure component for any business. The network connects clients to
servers or services, it connects a business to its customers, and it enables employees to complete
their work. No business today can function without connectivity — not only within the organization’s
boundaries, but also to customers, partners, and the wider internet. This applies to businesses of all
shapes and sizes, whether infrastructure is fully on-premises, all in the cloud, or a hybrid of both.
32
People operations
Objective: defining the required organization structures and aligning cloud adopters to the right role, skills, and
performance measures to help them fulfill their new tasks and duties.
Alignment of the organizational structure, people, and performance measures ensures that teams are
set up to receive the change and embrace their new duties. For example, a company could make a sub-
stantial investment in migrating to the cloud, but if the IT, operations, and related business resources
don’t know how to work with one another or know what is expected of them, then chaos can develop,
negatively impacting the return on investment.
It is also important to ensure that cloud adopters are incented for executing their new responsibilities
and behaviors (e.g., collaboration, transparency, acceptance of failure, trust) through the performance
management process and incentive structures.
Finally, it is critical to set organizational goals that are both measurable and able to be influenced by the
journey that the organization is on. Misaligned goals and initiatives will have a negative impact on the
success of cloud adoption.
Resource management
Objective: organizing, naming, and setting quotas of cloud resources in order to ensure a structured, consistent, and
controlled environment.
The ease with which resources can be virtually created in the cloud by almost anybody also poses chal-
lenges in maintaining a clear view and minimizing sprawl across the cloud account. Useful and simple
naming conventions and a thoughtful folder and project hierarchy that mirrors the organization’s hierar-
chy help to federate governance while avoiding anarchy.
Sponsorship
Objective: passionately and continuously demonstrating executive support for the cloud adoption strategy, so that early
adopters have a widely recognized mandate for change.
Sponsorship refers to the active and visible support that executives and team leaders give to a cloud
initiative or project within the organization. Enterprise cloud adoption is complex. Strong sponsorship is
vital when organizations make the decision to go forward with organization-wide deployments of cloud
platforms or applications whose intent is to add value and drive organizational collaboration
and velocity.
33
As the most influential individuals within an organization, executives must passionately and continuously
demonstrate executive support for the cloud adoption strategy, so that early adopters have a widely
recognized mandate for change.
Teamwork
Objective: building a team that lives and breathes behaviors and culture, which includes high collaboration and trust, so
that cloud technology is utilized in the most optimal manner.
Teamwork is driven by thought leadership from the bottom up, beginning with the individual contributor.
This thought leadership can take many forms, such as a Center of Excellence, dedicated evangelist roles,
or informal champions, and may involve many different avenues of knowledge sharing. Advocacy encom-
passes all IT disciplines, from security to architecture, from networking to operations and database
administration. What they all share is a forward-thinking and self-motivated interest in cloud adoption
best practices.
Without a critical mass of advocacy, all responsibility for generating cloud adoption momentum rests
with the executive sponsors (see the Sponsorship epic). Such a one-sided, top-down push is not only
slow to scale but also fails to capitalize on the inherent democratization of IT resources that cloud com-
puting offers.
Upskilling
Objective: investing in learning, so that the incumbent staff may combine their existing in-depth knowledge about the
business and the current IT estate with learnings about new best practices.
Cloud computing marks a paradigm shift in IT the likes of which the industry has not seen since the
introduction of virtualization. These new principles and best practices can be studied in many different
ways to suit your teams’ individual learning styles, ranging from instructor-led training courses to self-
serve interactive courses and quests with coursera.com and qwiklabs.com.
Upskilling is about more than just understanding the technical theory. It’s about applying the learning on
the job, self-sufficiently researching solutions to issues online, or reaching out to Google Support and
sharing lessons learned with peers, so as to nurture a culture of continuous learning and to grow institu-
tional knowledge.