Technical Proposal ADC Azure SAPV.1
Technical Proposal ADC Azure SAPV.1
For
Version :1.0
STATEMENT OF CONFIDENTIALITY
This document contains proprietary trade secret and confidential information to be used
solely for evaluating Cloud4C. The information contained herein is to be considered
confidential. Client, by receiving this document, agrees that neither this document nor the
information disclosed herein, nor any part thereof, shall be reproduced or transferred to other
documents, or used or disclosed to others for any purpose except as specifically authorized
in writing by Cloud4C.
Table of Contents
Cover Letter ..................................................................................................................................................... 4
1 Executive Summary .............................................................................................................................. 5
2 Bidder Profile & Experience .............................................................................................................. 6
3 Cloud4C Value Addition ..................................................................................................................... 8
3.1 Cloud4C Competency on AZURE ................................................................... 11
3.2 Our Existing partnership with Oil and gas majors in the region ........................ 12
3.3 TEN Paradigms that define Cloud4C .............................................................. 12
3.4 Cloud4C SAP Portfolio ................................................................................... 13
3.4.1 SAP on Azure ................................................................................................ 14
3.4.2 SAP Certified Instances on Azure .................................................................. 17
3.5 Project Execution Team ................................................................................. 18
3.6 Cloud4C SOC Portfolio .................................................................................. 19
Page | 2
6.2.3 Incident Management ..................................................................................... 66
6.2.4 Problem Management .................................................................................... 69
6.2.5 Change Request Management ....................................................................... 71
6.3 Proposed Timeline ......................................................................................... 75
6.4 Project Resources with Resumes ................................................................... 75
Page | 3
Cover Letter
Cloud4C Services Ltd thanks ADC for providing an opportunity to bid for SAP and NON-SAP Migration
to public Cloud.
We are excited about the opportunity to help you make this a productive and exciting partnership as a
potential vendor. We are cognizant of the effort it takes to a select ideal partners for the cloud journey,
so we very much appreciate the opportunity. Cloud4C meets all the requirements detailed in the RFP.
That’s illustrated in greater detail in this proposal. In the meantime, the following capabilities make us
confident that Cloud4C is the most qualified company for ADC Migration on Cloud.
We firmly believe that Microsoft + Cloud4C will be the right partner to support ADC in delivering
Managed Services including the testing (failover/failback), training, documentation and after go-live
support of the planned DR environment in Cloud. We believe the following value proposition uniquely
differentiate Cloud4C:
• An Experienced Team: We have the best experienced project team with proven skills at global scale
by delivering multi-cloud projects across the geographies through Center of Excellence (CoE) teams
that work very closely with Client.
• Differentiated Approach: Leverage our experience from the executed projects to address the
service needs and infuse innovation.
• Expertise & Skills: We have deep knowledge of SAP systems Azure Services and their functional /
technical maturity within the context of Project requirements. This allows us to provide ADC with clear
guidance to drive towards an effective solution.
• Modern Tools and Industry Assets – In addition to bringing a proven methodology to manage the
project, we also bring in our Cloud technology assets, to accelerate and improve the service quality
and reduce the risk.
As a closing note, we are very grateful for the opportunity to put forward our capabilities, we recognize
clarifications may be required, and should you have any, we would be very happy to discuss any aspect
of our proposal.
Thanks
Cloud4C
Page | 4
1 Executive Summary
Cloud4C Services Company (hereinafter referred to as Cloud4C) is thankful to Arabian Drilling
Company (hereinafter referred to as ADC) for having provided an opportunity for submitting the
technical and commercial proposal in response to the ADC’s RFP “Cloud Migration & Disaster
Recovery”.
ADC is looking for a cloud technology partner who has the competent and capabilities to provide an end-
to-end migration and disaster recovery solution on a public cloud platform for its SAP and Non-SAP
workloads that are currently running on-premises datacenters of ADC. The objective of this project is to
enhance operational efficiency, reduce cost by using consumption-based approach, increase scalability
and agility as well as leveraging latest technology provisioned.
We believe that we are the right partner, who has the right expertise and experience with differentiated
tools, to envision and meet ADC business and IT objectives. To address these requirements, Cloud4C
being the trusted cloud technology partner is understanding the complexity and the scope associated
with this effort and believe that our proposed solution reflects that understanding.
In this project, Cloud4C is aiming to implement a cloud migration model, where we leverage our
experience in managing multiple cloud platforms to build a cloud-native environment that matches the
ADC strategy and objective.
Applying all global and local compliance and security standards that are specific to the governance
standards in KSA and provide CaaS - Compliance as a Service that includes continuous auditing, asset
discovery & monitoring, reporting, and audit support. Cloud4C runs the Cloud Adoption Framework
(CAF) – CLOUD PROVIDER certified and approved cloud adoption guidance and best practices.
We also run our own Project Delivery approach which is based on Centre of Excellence "CoE"
philosophy, providing expertise from all technology backgrounds where we commit to results and
outcome rather than the number of resources. We scale our resources up and down for each migration
phase as required, no matter how big or small the tasks are. We use a similar concept with our managed
service approach to ensure a smooth transition between implementation and operation.
Project Phases
At a high level, the Project will include following phases for ADC Cloud Migration Journey
Project Phases
Phase 0: - Assessment
- PoC as per ADC objectives
Phase 1: - Lift & Shift Migration as per Migration Plan (SAP & Non-SAP)
- SOC Services Setup
- Managed Services for Phase 1.
Phase 2: - ECC to S4 Conversion – (Not a part of current technical response)
- Resizing of environment for conversion if required
Phase 3: - App & DB Modernization – (Approach and Methodology)
Page | 5
2 Microsoft Compliance
Principle Requirement Response
Compliance - Regulatory alignment of vendor Microsoft will comply with all laws
services with data protection or other and regulations applicable to its
appropriate governance. provision of the Online Services,
including security breach
o Service notification law and Data Protection
Requirements. However, Microsoft
Organization is not responsible for compliance
with any laws or regulations
Control SOC
applicable to Customer or
1 o Service Customer’s industry that are not
generally applicable to information
Organization technology service providers.
Microsoft does not determine
Control SOC whether Customer Data includes
information subject to any specific
2 o Service
law or regulation. All Security
Organization Incidents are subject to the Security
Incident Notification terms below.
Control SOC Customer must comply with all laws
3 and regulations applicable to its use
of Online Services, including laws
o PCI DSS related to biometric data,
confidentiality of communications,
o C5 and Data Protection Requirements.
Customer is responsible for
Attestation o
determining whether the Online
CSA Star o Services are appropriate for storage
and processing of information
ISO 27001 subject to any specific law or
regulation and for using the Online
Services in a manner consistent
- Compliance with Saudi Aramco Third
with Customer’s legal and
Party Cybersecurity Standard (SACS-002)
regulatory obligations. Customer is
- Compliance to KSA national standards responsible for responding to any
related to cybersecurity, privacy, and data request from a third party regarding
Customer’s use of an Online
protection mandated by the following Service, such as a request to take
down content under the U.S. Digital
authorities: o NCA
Millennium Copyright Act or other
applicable laws.
- Ensure cloud services and resources
Azure undergoes a SOC audit by
comply with ADC’s geo restriction policies
an AICPA-accredited auditor twice a
(The site for hosting and storing company
year to verify the effectiveness of its
information must be within the Kingdom by
security controls in audit scope. The
31.09.2023) Azure and Azure Government SOC
2Type 2 System and Organization
Controls (SOC) 1 Type 2 - Azure
Compliance | Microsoft Learn
attestation report published by the
auditor explains the circumstances
Page | 6
when access to customer data can
occur and how.
For the majority of customer-
initiated support requests, access to
customer data is not needed.
However, the most common
scenario by far involves a customer
opening a troubleshooting ticket
with Azure Support, and Support
subsequently obtaining an
authorization to access customer
resources that could potentially
include customer data. When
access to customer data is needed,
customers can manage that access.
Page | 7
Experience and Track record in the field
Page | 8
Cloud4C has a comprehensive service portfolio to cater to varied enterprise needs. Our team of certified
cloud Architects and engineers work with customer teams to enable their digital transformation from
beginning their journey through Cloud Adoption Framework
A Global cloud player with 2,000+ employees with 1,500+ dedicated staff in Service Delivery &
customer support. Cloud4C hosts In-house expertise on Network and Security services
All support services are delivered through Global NOC & SOC with all certified resources available
24x7x365 for customers.
Page | 9
Cloud C proud to be recogni ed as a
isionary
in Gartner Magic Quadrant for
Pu lic Cloud T Transformation
Services
Cloud C is a cloud native managed services provider that differentiates Cloud C has experience supporting critical enterprise applications
itself by providing transformational yet cost effective services to including SAP and Oracle. Cloud C is a ma or SAP global provider for
enterprises with a focus on complex enterprise applications. It uses a SAP A A nterprise Cloud SAP C and is certified for SAP hosting
cloud factory model that is underpinned by integration of a wide range application management services cloud services and A A operations
of tools to accelerate time to value for clients. services.
-- Magicuadrant for Pu lic Cloud T -- Mar et uide for Pu lic Cloud Managed and
Transformation Services Professional Services Providers Asia Pacific
Page | 10
4.1 Cloud4C Competency on AZURE
Advanced specializations:
Cloud4C has achieved 9 advanced specializations to be a proven partner with validated technical
capabilities to deliver specialized services in a specific solution area. The list of areas is as below
Page | 11
4.2 Our Existing partnership with Oil and gas majors in the region
Page | 12
Advantages of the Centre of Excellence
Certifications & Compliances:
(COE) Model:
• ISO 27001 – Information Security • 24*7 System Monitoring & Management
Management System from Central/Local NOC/SOC.
• ISO 9001:2015 – Quality Management • COE model promotes expertise based on
System cumulative knowledge pool
• ISO 20000-1 – IT Service Management
• Responsive Support Staff
System
• ISO 22301 – Business Continuity
• Highly Skilled Resources
Management System
• ISO 27017 – ISMS Cloud Security • Mature IT Service Management
• ISO 27018 – Management System for
• Single Point of Contact
Protection of PII in Public Cloud
• PCI DSS – PCI Certified cloud
• SME on demand
framework design
• SOC-1, SOC-2 - Organization wide
• Adherence to Quality and Governance
security Audit process
• SAP Certified for Cloud Hosting, SAP
• Service Level Management
Premium Partner (SAP HEC).
• Expert MSP / Global Gold Partner for
Azure
Cloud4C has been successfully delivering SAP workloads on cloud (SAP community cloud), a
framework which includes certified system types to run SAP HANA workloads, adequate cloud
security, required backup and resiliency with SLA driven service framework. This framework can be
designed to deliver higher SLA for mission critical enterprise applications to enterprises. Processes &
certifications are the first step in validating our efforts on SAP delivery, where Cloud4C possesses
SAP certifications in Cloud services, Hosting services, HANA operations & SAP Application
Management.
Today Cloud C is serving 3 500 customers across the globe spanning all industry verticals. World’s
best companies have trusted and accredited Cloud4C for the value delivered to their esteemed
organizations.
Cloud4C follows the concepts of vendor agnostic & no technology lock-in, by allowing customers to
leverage newer technology platforms freely. Existing SAP cloud framework can be delivered on not
only Cloud4C PODs, but also on any of the Hyperscale platforms.
Other than SAP certifications, process certifications include ISO 27001, ISO 27017, ISO 27108, ISO
22301, ISO 9001, and SOC-1 & SOC-2.
Page | 13
4.4.1 SAP on Azure
Bring unparalleled performance to your entire SAP estate with Azure. Reliably run and deploy
popular SAP products and solutions within minutes—on a secure, scalable, and enterprise-proven
cloud platform.
When it comes to running SAP HANA for mission critical SAP deployment, Azure offers the most
scalable platform of any cloud provider. Azure is the only cloud provider that offers single node scale
up configurations up to 24 TB while also offering a cost effective and high performance VM
infrastructure that’s certified for SAP A A.
Page | 14
Page | 15
Enterprises looking to adopt SAP HANA workloads can definitely look forward to Cloud4C who will
provide SAP on Cloud framework on platform of their choice, with assured performance using certified
& purpose-built systems, service assurance by delivering SLA up to application layer & most
importantly, optimized cost propositions.
Page | 16
4.4.2 SAP Certified Instances on Azure
SAP HANA Applications on Azure
Both Azure and SAP have worked together to certify the Azure platform for the following SAP
Business Solutions.
▪ SAP Business Suite including ERP, CRM, HCM, SRM, PLM, and SCM.
▪ SAP Net weaver ABAP and JAVA Technology Stacks
▪ SAP Hybris
▪ SAP Business Warehouse and BPC on HANA
▪ SAP Business Objects
▪ SAP BW/4 HANA
▪ SAP Business One
SAP Application Mapping with Azure (SAP Notes: 1928533)
The prerequisites mentioned by SAP in SAP Notes 1928533 has been used to ensure full
supportability and optimal performance of SAP systems on Azure
SAP Notes 1928533:
Azure offers Infrastructure services that can be utilized for deployment of the SAP Products. Cloud4C
has shortlisted the following instances which are certified by SAP for running the HANA Production
Environments.
The mapped Azure instance types (server sizes) are supported in 2-tier or 3 –tier configurations and
can be used as application server(s) as well as a pure database server.
The following instances have been mapped to provide SAP Instances to the Azure Certified Instance:
Page | 17
4.5 Project Execution Team
Summary of the proposed project execution team is mentioned below. Cloud4C will not have any
partnerships or will perform subcontracting to other entities for executing the project scope.
Page | 18
Role Tasks Performed
Azure networking
• Part time and timeboxed
consultants
Experience – 5+ years • Assist with the design the overall solution.
• Provide guidance based on Cloud4C -recommended practices.
• Perform the Azure Advanced Networking environment assessment,
planning, and build/remediation activities.
• Assists the Customer with network subnet and routing changes
associated with the rapid server migration strategy.
Monitoring Team
• 24*7*365 Remote Monitoring.
• Performs planning activities and informs the process section of the
migration plan.
• Performs unit-based migration activities according to the migration
plan.
• Responsible for support/ monitoring and managing of ongoing
services issues
We believe that with prevailing complexities and evolving cyber threats, enterprises can no longer
manage their Cyber security postures with islands of security products and myriad of logs generated
from various layers of the enterprise digital ecosystem, dispersed across datacenters and now cloud.
The evolution of the SIEM comes from years of hard experience and adaptation to manifest the role of
the security control, that deals with collection of security information that comes up in the form of logs
and events and managing them from a single interface.
Page | 19
Cloud4C Managed SOC operations
Performs Event, Risk, Anamoly, Historical Multi device based event correlation in order to
discover any security threats.
• Log management To meet compliance and Audit requirements.
• Compliance - Regulatory compliances ensure that the system is meeting the regulations and
legislations set out by the local governments and banks.
• Threat Intelligence Feeds
Threat intelligence feeds are a continuous stream of threat data such as the IOCs. As the name
suggests, these feeds are to be fed to technologies like SIEM.
• Real-Time Notification & Alerting
IAny event matching to Correlation, administrator and monitoring teams get the real-time
notifications, and alerts as to what should be done to mitigate the cyber threats.
• Prioritization - Helps in prioritizing critical, high , medium, low events based on the logs collected.
• Analytics & AI, Reporting & Dashboards- Leverages artificial intelligence to provide holistic view
of the logs and analytics on dashboards and facilitates for reporting.
• Historical correlation- With the help of the historical correlation, we assist enterprises to analyze
the logs and data of the past events.
• Automated Response - It is predesigned program by the SIEM solution to provide an automatic
response for all the incoming messages that minimizes human intervention.
• Advanced Analytics – Sentinel solution Provides big data security with the help of user behavior
and user analytics that will help enterprises to detect the threats both internally and externally.
• Data Examination
Page | 20
• Enterprises can now examine the data more diligently with the help of SIEM security to ensure
military grade security around their workloads.
• Data Obfuscation
• With data obfuscation profile, all the data would be masked by the system so that no one else
can see the data.
• Risk Manager – Cloud4C helps the enterprises to configure the firewalls, switches, routers, and
third-party sources that will be helpful in identifying security and compliance risks.
• Incident Forensics - Cloud4C helps to trace back to the attacks through a systematic step-by-
step process within a short span of time.
• Data Retention for Compliance Requirements – We suggest Enterprise to decide as to how long
the data can be retained in the system, which is crucial in forensics.
• Opensource & inhouse application log integration
• Log data can be collected and integrated from various opensource application that will help
enterprises to have single -pane of dashboard for monitoring and alerting.
• Advanced threat intelligence
• Vulnerability scanning
• Vulnerability Assessment and Penetration testing – One time activity
• Security Governance
• Cyber Threat Intelligence
Business Benefits:
• Increased Visibility
Enhance your incident reports and improve your investigations using security and non-security data
collected from across your organizational infrastructure.
• Greater Context
Cloud C’s team collects and prioriti es threat intelligence from multiple data points to help with
security investigations.
• Higher Efficiency
Cloud C’s team collects and prioriti es threat intelligence from multiple data points to help with
Improve security operations and streamline investigations by using ad-hoc searches in addition to
static, dynamic and visual correlations.
Support Capabilities
Page | 21
5 Understanding of Solution Requirement
Cloud4C will manage the entire Migration Project for SAP and NON-SAP. The landscape will include
the Production, Pre-production Testing and Development instances along with the DR. Cloud4C team
will also manage the hosting platform also. And will also fulfill the below set of expectations from a
managed service provider
• Assessment & Migration blueprint for SAP and Non- SAP environment
• Sizing and defining architecture on target Azure cloud.
• Create Blueprint consisting of Migration approach, methodology and plan
• Deploy Landing Zone in target cloud environment
• Migration of SAP landscape to compatible SAP versions, Operating System and
database to Cloud ( Azure) by leveraging SAP Activate Methodology for SAP
• Setup and configuration of High Availability and Disaster recovery for identified
Production Landscapes.
• Phase wise Migration of the identified workloads to Target Cloud Environment with
minimal disruption
• Testing and Cut over from source
• Ongoing Managed Services support
• Cloud Training Program for ADC Team
Page | 22
6 Proposed Solution
Security Monitor
Centre
Azure
Bastion
vne t vne t
peering peering
ECC SUI TE BW HANA DB Syb as e DB ECC Suite BW HANA DB Syb as e DB ECC SUI TE ECC SUI TE HANA D B HANA DB
BO Buil der Serv er M ax DB Syb as e DB BO Buil der Serv er M ax Db Syb as e DB BW BW Syb as e DB Syb as e DB
Traffic Manager
NON SAP
APP 1 APP 2 SQL DB SQL D B SQL DB
APP 1
DR Region
UA E Centeral
Security Monitor
Centre
Azure
Bastion
Azure Azure Key
Fortinet FW Sentinel Vault
BW BW Syb as e DB Syb as e DB
APP 2 SQL DB
Availability set Availability set Availability set Availability set
APP Subne t DB Subne t APP Subne t DB Subne t
Page | 23
Architecture Overview
Backup solution
Here for this project considering the multiple workload we have proposed Commvault as a backup
solution
Page | 24
6.2 Solution Technical Specification
The solution proposed is to be executed in multiple phases. Primarily the project will be divided into 2
sections:
Project Phases
Phase 0: - Assessment
- PoC as per ADC objectives
Phase 1: - Lift & Shift Migration as per Migration Plan (SAP & Non-SAP)
- SOC Services Setup
- Managed Services for Phase 1.
Phase 2: - ECC to S4 Conversion – (Not a part of current technical response)
- Resizing of environment for conversion if required
Phase 3: - App & DB Modernization – (Approach and Methodology)
Page | 25
Coud4C – Assessment & Migration Approach
Below is a high-level workflow of workload engagement & workload assessment. Cloud4C will work with
customer key stakeholders & define the outcomes based on business motivation and objective.
Page | 26
Discovery
Assessment
Page | 27
*
Page | 28
Secure Landing Zone Setup
Page | 29
6.4 Scope of work, required technology, and tools used for migration
Cloud4C has prepared the scope of work document based on the information provided in the RFP and
the subsequent responses to the clarification questions. Cloud4C with its global expertise of migrating
and providing managed SAP and Azure Platform and NON-SAP system services solutions shall provide
reliable, accountable, and trusted to manage the ADC diverse infrastructure that will be hosted Azure
cloud environment. The environment will be proactively monitored and managed - 24/7/365.
For Cloud4C, the scope is to migrate and manage the SAP and SAP environment on Azure landscape–
for the ADC environment using A ure’s native solution and third-party technology as applicable.
Provision of ITSM solution for service management
Page | 30
o Level 1 Monitoring Support, Level 2 & level 3 management & admin
support
o SAP Basis Support
o Azure platform Support
o Operating System Administration
o Database Administration
o Backup Administration
o Disaster Recovery Management
o Co-ordination with Microsoft, for Level 3 / 4 Support for issue resolution.
o Program Governance and Management
Dependencies • Current client environment firewall rules, S2S, P2P VPN tunnels details
• Network layout design of current deployments (If connectivity required)
• Access to existing SAP HEC Environment for the import of data to Azure.
Page | 31
As Per section 5.3
During the three-phases, Cloud4C will use a change management approach that focuses on
encouraging application owners to adopt new behaviors to engage with the Application Migration
program, helping the Customer achieve return on investment at the velocity define in this work order.
Cloud4C will produce evidence that the new ways of working by application owners positively
influence the desired business outcomes of the overall program. In addition, Cloud4C will help the
customer develop the ability to drive behavioral changes and measure potential benefits on their own
after the program concludes.
An iterative approach will be followed in the Migration phase covering the Assessment, Planning and
Migration
Prepare Phase
Page | 32
During the Prepare phase, the focus will be on the discovery & Assessment activities and the
preparation of the Azure Migration Playbook following activities will be performed
Category Description
Program planning:
Cloud4C
❖ Establish the core team and lead kickoff meeting.
activities
❖ Lead program initiation workshops.
❖ Work with the Customer to understand and document a key stakeholder relationship
map and stakeholder matrix.
❖ Develop Pilot and Migrate plans including business unit or application team onboarding
processes and communications.
❖ Establish a program management plan, including a schedule and financial, quality,
deliverable, and communication plans.
❖ Establish the baseline velocity plan.
Azure Migration Playbook planning:
❖ Lead technical envisioning workshops.
❖ Support tooling reviews and align on migration process.
❖ Update the migration playbook template to include Customer-specific processes.
Azure Advanced Networking (Environment):
❖ Host network assessment workshop to review in-scope source datacenters, destination
A ure regions xpressRoute’s tied to ones etwor Virtual Appliance architectures
and Carrier Hotel architectures/locations, inclusive of hardware recommendation.
❖ Develop Azure Advanced Networking plan.
Build Azure Landing Zone Blueprint for ready phase
Initial discovery:
❖ Collect data, including server, database, and application inventory data using available
tools and Customer Configuration Management Database (CMDB) data.
❖ Prepare the Azure Migration Catalog and upload initial inventory data.
Program planning:
Customer
❖ Attend the kickoff meeting and planning workshops.
activities
❖ Define the onboarding process for the team including remote access.
❖ Assist with Pilot and Migrate plans including business unit or application team
onboarding processes and communications.
❖ Provide input into the baseline velocity plan.
Azure Migration Playbook planning:
❖ Attend the technical envisioning workshops.
❖ Facilitate any necessary communication or information in preparation for requests that
might result from information-gathering exercises.
❖ Prepare Customer-provided environments.
❖ Provide a point of contact for each location or time zone that is in scope for delivery.
Azure Advanced Networking (environment):
❖ Attend network assessment workshop and respond to requests for initial network data
collection.
❖ Review deliverables at the end of the assessment and planning phase.
❖ Provide technical information required for Cloud4Cteam to be able to complete the build
and remediation activities.
❖ Verify Cloud4C team has adequate permissions to allow for deployment and
configuration within the customer environment.
❖ Make decisions where options are presented.
❖ Complete necessary submissions and approvals for change management.
❖ End-user and stake holder communication as deemed necessary as part of the change
management process.
❖ Make sure that the Cloud4C team has access to source/target environments.
❖ Define maintenance window for the cutover.
❖ Perform production cutover and rollback, if necessary.
Initial discovery:
❖ Resolve problems when servers cannot be reached for inventory.
❖ Ensure all the tools pre-requisites are provided accordingly.
Page | 33
Category Description
Ready Phase
During the ready phase, the focus will be on the Landing zone deployment activities and the
preparation of the Azure Migration readiness the following activities will be performed.
Page | 34
o Disaster Recovery
• Deploy Azure Migrate/ASR replication appliance
Customer • Current environment landscape details
activities • Changes required on Customer DC for the setup
• Current client environment security posture (Firewall Rules, VPN, Security tools,
Compliance control mapping)
• Network layout design of current deployments
• In case if VM’s with dependencies readiness state there might be need to discuss
with application vendor / application developers / client IT team to make a plan for OS
update, DB update or application update
Exit criteria
• Landing zone is ready with the required controls
• The migration Project has been created.
• The baseline velocity plan has been accepted.
The Pilot and Migrate phases include the same general approach with a key difference around velocity
and scale potential.
• During the Pilot phase, Azure Migration Factory will be initiated, and the onboarding of remaining
primary velocity migration team members and the migration factory will be activated. Scale velocity
migration teams will not be activated; the key outcome of the Pilot phase is to prepare the
migration-ready release of the migration playbook to support at-scale migrations.
• During the Migrate phase, the same approach as the Pilot phase will be repeated, with the ability
to scale to multiple applications in parallel with the migration-ready release of the migration
playbook. During the Migrate phase, Cloud4C will recommend when to increase or decrease scale
velocity migration team count (up to the limits defined in the Work Order) based upon migration
backlog and forecasting for the following months.
• The candidates that will be considered for the Pilot and Migration will follow the below criteria:
o Legacy systems (Windows 2003 and Windows 2008) with a 10-20% failure acceptance
o Candidates for Rapid Subnet Migration
o Applications with least dependencies
o Loosely coupled applications
o Applications with lower business criticality and progress as the playbook is mastered.
• In case of migration failure due technical issues, the workload is moved to a later wave and the
root cause analysis will be handled by the CoE team, another workload is taken instead.
Category Description
Page | 35
Category Description
Page | 36
Category Description
• Identify target subnets and server groups for rapid server migration.
• Approve migration strategy assignments.
Application Migration assessment:
• Provide a list of applications and associated servers/databases, if known. If not known,
this will affect the Migration phase velocity and overall timeline.
• Identify application owners/support teams and provide initial application information.
• Provide technical artifacts such as an architectural diagram and any documentation.
• Provide access to application stakeholders such as architects, developers, and
administrators for assessment interviews.
• Respond to requests for initial data collection.
• Provide access to an existing configuration management database solution if one
exists.
• Deploy agents, if required by assessment tools.
• Approve migration strategy assignments.
Rapid Server Migration planning and migration
• Provide access to all servers in subnet or server group.
• Make decisions within 3 business days when migration options are presented.
• Approve tooling selection based upon server OS versions and desired outcomes.
• Present any environmental post-migration script-based automation to be injected into
the migration.
• Prepare and share UAT test plan with Cloud4C.
• For subnet migration, evacuate out of scope workloads on a subnet prior to subnet
cutover.
• Coordinate cutover plan with Cloud4C.
• Complete necessary change management submissions and approvals.
• Make sure network connectivity exists between existing systems and servers that are
to be migrated.
• Perform user and stakeholder communication as deemed necessary as part of the
change management process.
• Verify that the Cloud4C team has access to source and target environments.
• Manage, monitor, and back up the target environment following receipt of the UAT
acceptance form.
• Perform application-level troubleshooting, if necessary.
• Perform UAT and report UAT results to Cloud4C. UAT must occur during the post-
migration support timeline.
• Perform client, storage, supporting server, DNS, load-balancer, and network side
configurations and changes.
• Perform source server decommissioning.
Application Migration planning and migration
• Provide access to all servers and databases in application.
• Provide access to application support teams for planning and respond to interview
requests through email and phone within 3 business days.
• Make decisions within 3 business days when migration options are presented.
• Approve tooling selection based upon server OS versions and desired outcomes.
• Present any post-migration script-based automation to be injected into the migration.
• Prepare and share pre-UAT/UAT test plan with Cloud4C.
• Perform final architecture and migration plan review with Cloud4C.
• Complete necessary change management submissions and approvals.
• Make sure network connectivity exists between existing systems and servers that are
to be migrated.
• Perform user and stakeholder communication as deemed necessary as part of the
change management process.
• Verify that the Cloud4C team has access to source and target environments.
Page | 37
Category Description
• Manage, monitor, and back up the target environment following receipt of the UAT
acceptance form.
• Upon request, support application-level troubleshooting.
• Perform UAT and report UAT results to Cloud4C. UAT must occur during the post-
migration support timeline.
• Perform client, storage, supporting server, DNS, load-balancer, and network side
configurations and changes.
• Perform source server decommissioning.
Supporting Services
• If desired, document supporting services requests in support of a Customer-led
migration.
• Provide access to all servers and databases requested as part of supporting service.
• Provide access to application support teams for planning and respond to interview
requests through email and phone within 3 business days.
• Make decisions within 3 business days when migration options are presented.
• Review and approve deliverables.
• Complete necessary change management submissions and approvals.
• Make sure network connectivity exists between existing systems and servers that are
to be migrated.
• Perform user and stakeholder communication as deemed necessary as part of the
change management process.
• Verify that the Cloud4C team has access to source and target environments.
• Manage, monitor, and back up the target environment following receipt of the UAT
acceptance form.
• Upon request, support application-level troubleshooting.
• Perform UAT and report UAT results to Cloud4C. UAT must occur during the post-
migration support timeline.
• Perform client, storage, supporting server, DNS, load-balancer, and network side
configurations and changes.
• Define the maintenance window for the cutover.
• Perform production cutover and rollback, if necessary.
Azure Migration Playbook Update
• Review and approve recommended updates to the migration playbook.
Exit criteria Rapid server migration assessment:
(per iteration)
• Initial Azure server sizing has been completed.
• The Rapid Server Migration assessment has been completed and migration strategy
approved by the Customer or referred for Application Migration assessment.
• Customer has accepted the Rapid Server Migration assessment report.
Application migration assessment:
• The application has been defined in Azure appropriate migration strategy template
from the migration playbook.
• Initial Azure application sizing has been completed.
• Customer has accepted the application assessment report.
Rapid Server Migration
• Customer has accepted the UAT.
• The post-migration support window has expired.
Application Migration
• The pre-UAT/UAT test plan has been shared with Cloud4C.
• Customer has accepted the Application Migration plan.
Page | 38
Category Description
• Cloud4C must obtain UAT Acceptance from the owning application team that they
have successfully run their documented UAT test and they are ready to transition to
operations.
• The post-migration support window has expired.
Supporting Services
• Customer has accepted the Application Migration plan.
• UAT has been completed and the post-migration support window has expired.
Azure Migration Playbook Update
• Customer has accepted the updated migration playbook.
Key
assumptions • The Customer will coordinate the use of tools with internal security teams; this includes
providing required permissions.
• Source and target environments—virtual or physical—are healthy.
• Migration factory resources assigned to perform migration activities have required
permissions.
• Sufficient network bandwidth is available between source and target environments.
Generally, this is at least 5Gbps for Rapid Server Migration and 1Gbps for all other
migration strategies. Insufficient network bandwidth might result in reduced migration
velocity.
• Maintenance windows exist for cutover activities.
• Any administration, management, or configuration changes after the production
cutover must be performed by the Customer.
• Cloud4C will execute the agreed to Application Migration Plan, following standard
Customer planning and change management procedures. Should the migration fail,
the rollback plan will be implemented as defined in the Application Migration Plan.
Following the post migration support period, Cloud4C will provide Customer with a list
of vacated assets that can be decommissioned.
• For application reinstallation, application installation media should be provided to the
Cloud4C migration factory for migration planning and is compatible with target
workloads.
Page | 39
The Environment Migration will be conducted into batches based on dependencies and availability of
the application owners the plan prepared.
All the stages from assessment to post migration activities will be covered under the Cloud4C Migration
Plan.
Page | 40
b. Replication Prep: - In this phase, preparations for replication process will be carried out
like ensuring VM availability, connectivity etc.
c. Replication: - In this phase, actual replication will be carried out. On-prem machines to
be migrated will be duplicated to Azure
d. Validation: - In this phase, various checks will be carried out on the duplicated Azure VM
to ensure that it functions as expected. If any anomaly happens, Cloud4C will take
necessary steps
e. Cutover: - In this phase, control will be transferred to validated Azure VMs while on-prem
servers will be shut down. This usually will happen with consent of DUBAI HOLDING in
the non-working or agreed hours (of DUBAI HOLDING)
f. Post-Migration: - In this phase, monitoring will be done on the functioning of Azure VMs
for a while to ensure smooth ascent to cloud
g. Rollback: - In this phase, if any of the VMs malfunctions during the monitoring phase,
Cloud4C will transfer the control back to on-prem for a while as Cloud4C takes care of
the issue
3. Post Migration Activities: - After migration, Cloud4C will provide following services
i. Post cutover White Glove Support
ii. On Prem Decommission
Workload Assessment & Migration Blueprint - Migration RACI
Services Cloud4C ADC Microsoft
Engagement and Planning
Discovery workshop for CAF based assessment and workload
R A, C C, I
migration
Implement Microsoft azure tools in customer environment
- Implement VM for running Azure Migrate Service in
customer environment
R A, C C, I
- Install dependency visualization: Microsoft monitoring
agents, dependency agent, log analytics for machines with no
internet connection
Run assessment of VMware, Hyper-V, Physical Server based
R A, C C, I
workload
Run assessment of MySQL, PostgreSQL & Oracle DB based
R A, C C, I
workload (Manual)
Assess the current firewall rules and prepare the NSG rules for
R A, C C, I
Azure & other firewall / networking NVA rules on Azure
Page | 41
Understanding of client backup policy and plan for backup on
R A, C C, I
Azure
Planning for monitoring parameters, resource tag naming
R A, C C, I
convention & automation.
Identify tools for migration (Default Azure Migration Tool) R, A C, I C, I
Prepare migration approach and TCO R, A C, I C, I
Preparing Migration Blueprint
Migration Blueprint Document (As per deliverables agreed)
- Infrastructure as is and to be report
- Landing Zone Design
- Network (FW, VNET, ER, VPN GW, LB, DDoS)
- Security Tools Mapping
R, A C, I C, I
- Compliance Control Mapping
- Monitoring & Automation
- Migration Approach and Methodology
- Backup and DR Plan
Migration approach and tools
Preparing for Azure Landing Zone & Creation on Landing
Zone
Landing Zone Preparation & Initialization
Create Azure Tenant / Admin Users / Subscription under CSP /
R A, C C, I
EA
Create Azure Portal Users with administrator rights / RBAC on
R A, C C, I
Azure
Create Resource Group with specific resource policy R, A C, I C, I
Deployment of Azure Policy and Configuration as per
organisation SOP
• Resource Group Resource Loc Resource Tag
• etwor & Security [Vnet Peering Policy DR SG
Application GW, WAF, ER SKU]
R,A C,I C,I
• Compute & Storage [Allowed S Images placement group,
Scale Set audits approved dis ’s & si e encryption policy
access policy]
• Security & Monitoring
• A ure lueprints – Standard / Custom
Landing Zone Build
Integrate on premise AD with Azure (If required) as per client
R A, C C, I
access policy (pass thru authentication)
Network
Create Virtual Network Space with CIDR Block (Region
R, A C, I C, I
Specific)
Create Address Space (to be non-conflicting with customer
R, A C, I C, I
range if any)
Create Subnet with IP assignment schema R, A C, I C, I
Create NSG and configure traffic in/out policy R, A C, I C, I
Page | 42
Implement networking gears - NVA or Azure Firewall at Azure
R, A C, I C, I
subscription perimeter and define network routing policy
Page | 43
6.8 Integration with OnPrem systems
Azure VNet can integrate on-premises networks through private network connections between the on-
premises network and the Azure Cloud Environment.
The following graphic and subsequent descriptions explain the different ways to connect an on-
premises network with the Azure virtual network:
• Point-to-site VPN: this type of connectivity helps establish the connection between a single
PC and a VNet with changes to the existing network. It can be used to provide encrypted
communications between a client and the VNet via the internet. Secure Socket Tunnelling
Protocol (SSTP) is used in establishing encrypted communication for this connectivity. The
VPN device is not required to implement point-to-site connectivity, but it requires the Azure
VPN gateway at the on-premises side.
• Site-to-site VPN: In this type, the connection is established between the VPN devices and the
Azure VPN Gateway. This type of connection provides VNet access to any on-premises
resource via the internet. It uses an IPSec VPN to establish secure communication between
on-premises resources and the Azure VNet gateway via the internet. A VPN device is required
on-premises to establish site-to-site connection.
• Azure ExpressRoute: Unlike point-to-site and site-to-site VPNs where the connection is over
the internet, Azure ExpressRoute is used to set up a direct private connection between an on-
premises network and a VNet. Compared with similar connectivity options, this type of
connectivity is secure, reliable, and fast, as the traffic traverses through a private network and
not the internet.
Page | 44
6.9 Compute, Storage, Network Designs
DC Mapping
Env VM Name SAP Module DB To be OS No of vRA vHDD DB Total Azure Instance Type
Cores M GB Storage Storage
DEV SAP HANA DB Appliance HDB Server HANA SLES 11 SP 4 40 / 2 384 5000 300 5300 E48ds_v4(48 vcpu 384 GB Memory)
DEV SAP ECC - Suite On Hana CI+APP Server HANA SLES 15 SP 1 3 24 220 230 450 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
DEV SAP BW On Hana CI+APP Server HANA SLES 12 SP 4 2 24 250 25 275 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
DEV / QAS Enterprise Portal CI+APP+DB Server ASE SLES 15 SP 1 2 24 200 70 270 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
DEV / QAS Content Server CS Server+Webdispatcher MaxDB SLES 15 SP 1 2 8 200 100 300 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
DEV SAP Fiori Netweaver Gateway CI+APP+DB Server ASE SLES 15 SP 1 1 8 300 50 350 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
QAS SAP HANA DB Appliance HDB Server HANA SLES 11 SP 4 40 / 2 512 5000 400 5400 M64ls (64 vCPU 512 GB Memory) SAPS 66600
QAS SAP ECC - Suite On Hana CI+APP Server HANA SLES 15 SP 1 4 32 220 220 440 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
QAS SAP BW On Hana CI+APP Server HANA SLES 12 SP 4 2 24 250 25 275 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
QAS SAP Fiori Netweaver Gateway CI+APP+DB Server ASE SLES 15 SP 1 2 8 200 50 250 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
DEV/QAS SAP Solution Manager CI+APP+DB Server ASE SLES 15 SP 1 4 32 650 200 850 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
DEV/QAS Workforce Performance Builder APP server MSSQL Windows 2012 R2 4 24 700 100 800 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
DEV/QAS SAP Business Objects APP server Windows 2012 R2 8 38 500 30 530 D8s_v4 (8 vCPU, 32 GB Memory) SAPS 8710
PRD SAP HANA DB Appliance HDB Server HANA SLES 11 SP 4 40 / 2 768 5000 700 5700 M64s (64 vCPU 1024 GB Memory) SAPS 67315
PRD SAP ECC - Suite On Hana CI+APP Server HANA SLES 12 SP 4 8 80 320 700 1020 E8s_v4 (8 vCPU 64 GB Memory) SAPS 8710
PRD SAP BW On Hana CI+APP Server HANA SLES 12 SP 4 2 24 250 80 330 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
PRD Enterprise Portal CI+APP+DB Server ASE SLES 12 SP 4 2 24 200 70 270 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
PRD Content Server CS Server+Webdispatcher MaxDB SLES 12 SP 4 2 8 200 120 320 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
PRD SAP Fiori Netweaver Gateway CI+APP+DB Server ASE SLES 12 SP 4 1 8 300 50 350 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
PRD SAP Solution Manager CI+APP+DB Server ASE SLES 12 SP 4 4 32 650 300 950 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
PRD Workforce Performance Builder APP server MSSQL Windows 2012 R2 4 24 700 100 800 E4s_v4 (4 vCPU 32 GB Memory) SAPS 4178
PRD SAP Business Objeects APP server Windows 2012 R2 8 38 500 30 530 D8s_v4 (8 vCPU, 32 GB Memory) SAPS 8710
Env VM Name SAP Module DB To be OS No of vRA vHDD DB Total Azure Instance Type
Cores M GB Storage Storage
DEV SAP Webdispatcher + Web Server SLES 15 SP 1 2 8 50 0 50 D2s_v4 (2 vCPU, 8 GB RAM) SAPS 2178
SAP Cloud Connector
QA SAP Webdispatcher + Web Server SLES 15 SP 1 2 8 50 0 50 D2s_v4 (2 vCPU, 8 GB RAM) SAPS 2179
SAP Cloud Connector
PRD SAP Webdispatcher + Web Server SLES 15 SP 1 2 8 50 0 50 D2s_v4 (2 vCPU, 8 GB RAM) SAPS 2180
SAP Cloud Connector
PRD SAP Router (For SAP Support) n/a SLES 15 SP 1 1 8 50 0 50 D2s_v4 (2 vCPU, 8 GB RAM) SAPS 2181
Env VM Name SAP Module DB To be OS No of vRA vHDD DB Total Azure Instance Type
Cores M GB Storage Storage
DEV + QAS ADCAssets & RFID System MSSQL DB+App Server MSSQL Windows 2012 R2 4 16 700 200 900 D4s_v4 (4 vCPU, 16 GB Memory) SAPS 4178
DEV + QAS Electronic Personnel on Board MSSQL DB+App Server MSSQL Windows 2012 R2 2 24 200 100 300 E2s_v4 (2 vCPU 16 GB Memory) SAPS 2178
(Bio-Metric Time / Attendence)
DEV + QAS INTELEX (QHSE System) MSSQL DB+App Server MSSQL Windows 2012 R2 2 12 200 100 300 E2s_v4 (2 vCPU 16 GB Memory) SAPS 2178
PRD ADCAssets & RFID System MSSQL DB+App Server MSSQL Windows 2012 R2 4 16 700 300 1000 D4s_v4 (4 vCPU, 16 GB Memory) SAPS 4178
PRD Electronic Personnel on Board MSSQL DB+App Server MSSQL Windows 2012 R2 2 24 200 100 300 E2s_v4 (2 vCPU 16 GB Memory) SAPS 2178
(Bio-Metric Time / Attendence)
PRD INTELEX (QHSE System) MSSQL DB+App Server MSSQL Windows 2012 R2 6 16 200 100 300 D4s_v4 (4 vCPU, 16 GB Memory) SAPS 4178
PRD ManageEngine Service Desk MSSQL DB+App Server MSSQL Windows 2012 R2 2 32 450 200 650 E2s_v4 (2 vCPU 16 GB Memory) SAPS 2178
PRD ManageEngine DesktopCentral MSSQL DB+App Server MSSQL Windows 2012 R2 2 16 500 300 800 E2s_v4 (2 vCPU 16 GB Memory) SAPS 2178
(Patch Management)
PRD Domain Controller (AD) Windows 2012 R2 3 24 200 200 D4s_v4 (4 vCPU, 16 GB Memory) SAPS 4178
PRD AZURE SYNC Windows 2012 R2 2 16 150 150 E2s_v4 (2 vCPU 16 GB Memory) SAPS 2178
Azure BOQ
Service Service type Custom name Region Description
category
Storage Storage P6 (64 GB)-14 UAE Managed Disks, Premium SSD, LRS Redundancy, P6 Disk Type 14 Disks; Pay as you
Accounts North go
Storage Storage P10 (128 GB)-14 UAE Managed Disks, Premium SSD, LRS Redundancy, P10 Disk Type 14 Disks; Pay as you
Accounts North go
Storage Storage P15 (256 GB)-24 UAE Managed Disks, Premium SSD, LRS Redundancy, P15 Disk Type 24 Disks; Pay as you
Accounts North go
Storage Storage P20 (512 GB)-10 UAE Managed Disks, Premium SSD, LRS Redundancy, P20 Disk Type 10 Disks; Pay as you
Accounts North go
Storage Storage P30 (1024 GB)-2 UAE Managed Disks, Premium SSD, LRS Redundancy, P30 Disk Type 2 Disks; Pay as you
Accounts North go
Compute Virtual E4s_v4-14 UAE 14 E4s v4 (4 vCPUs, 32 GB RAM) (3 year reserved), Linux, SUSE Linux Enterprise +
Machines North Patching only (Pay as you go); 0 managed disks – S4; Inter Region transfer type, 5 GB
outbound data transfer from UAE North to East Asia
Compute Virtual E4s_v4-2 UAE 2 E4s v4 (4 vCPUs, 32 GB RAM) (3 year reserved), Windows (License included), OS
Machines North Only; 0 managed disks – S4; Inter Region transfer type, 5 GB outbound data transfer
from UAE North to East Asia
Compute Virtual E8s_v4-1 UAE 1 E8s v4 (8 vCPUs, 64 GB RAM) (3 year reserved), Linux, SUSE Linux Enterprise +
Machines North Patching only (Pay as you go); 0 managed disks – S4; Inter Region transfer type, 5 GB
outbound data transfer from UAE North to East Asia
Compute Virtual M64ls-1 UAE 1 M64ls (64 vCPUs, 512 GB RAM) (3 year reserved), Linux, SUSE Linux Enterprise +
Machines North Patching only (Pay as you go); 0 managed disks – S4; Inter Region transfer type, 5 GB
outbound data transfer from UAE North to East Asia
Page | 45
Compute Virtual E48ds_v4-1 UAE 1 E48s v4 (48 vCPUs, 384 GB RAM) (3 year reserved), Linux, SUSE Linux Enterprise +
Machines North Patching only (Pay as you go); 0 managed disks – S4; Inter Region transfer type, 5 GB
outbound data transfer from UAE North to East Asia
Compute Virtual M64s-1 UAE 1 M64s v2 (64 vCPUs, 1024 GB RAM) (3 year reserved), Linux, SUSE Linux Enterprise
Machines North + Patching only (Pay as you go); 0 managed disks – S4; Inter Region transfer type, 5
GB outbound data transfer from UAE North to East Asia
Compute Virtual D8s_v4-2 UAE 2 D8s v4 (8 vCPUs, 32 GB RAM) (3 year reserved), Windows (License included), OS
Machines Windows North Only; 0 managed disks – S4; Inter Region transfer type, 5 GB outbound data transfer
from UAE North to East Asia
Storage Storage P6 (64 GB)-4 UAE Managed Disks, Premium SSD, LRS Redundancy, P6 Disk Type 4 Disks; Pay as you go
Accounts North
Compute Virtual D2s_v4-4 UAE 4 D2s v4 (2 vCPUs, 8 GB RAM) (3 year reserved), Linux, SUSE Linux Enterprise +
Machines North Patching only (Pay as you go); 0 managed disks – S4; Inter Region transfer type, 5 GB
outbound data transfer from UAE North to East Asia
Storage Storage P6 (64 GB)-1 UAE Managed Disks, Premium SSD, LRS Redundancy, P6 Disk Type 1 Disks; Pay as you go
Accounts North
Storage Storage P10 (128 GB)-6 UAE Managed Disks, Premium SSD, LRS Redundancy, P10 Disk Type 6 Disks; Pay as you
Accounts North go
Storage Storage P15 (256 GB)-7 UAE Managed Disks, Premium SSD, LRS Redundancy, P15 Disk Type 7 Disks; Pay as you
Accounts North go
Storage Storage P20 (512 GB)-2 UAE Managed Disks, Premium SSD, LRS Redundancy, P20 Disk Type 2 Disks; Pay as you
Accounts North go
Storage Storage P30 (1024 GB)-2 UAE Managed Disks, Premium SSD, LRS Redundancy, P30 Disk Type 2 Disks; Pay as you
Accounts North go
Compute Virtual E2s_v4-6 UAE 6 E2s v4 (2 vCPUs, 16 GB RAM) (3 year reserved), Windows (License included), OS
Machines North Only; 0 managed disks – S4; Inter Region transfer type, 5 GB outbound data transfer
from UAE North to East Asia
Compute Virtual D4s_v4-4 UAE 4 D4s v4 (4 vCPUs, 16 GB RAM) (3 year reserved), Windows (License included), OS
Machines North Only; 0 managed disks – S4; Inter Region transfer type, 5 GB outbound data transfer
from UAE North to East Asia
Compute Virtual Firewall VM UAE 2 D4s v4 (4 vCPUs, 16 GB RAM) (3 year reserved), Linux, (Pay as you go); 1 managed
Machines North disk – P10; Inter Region transfer type, 5 GB outbound data transfer from UAE North
to East Asia
Compute Virtual Commvault UAE 1 D8s v4 (8 vCPUs, 32 GB RAM) (3 year reserved), Linux, (Pay as you go); 1 managed
Machines Server VM North disk – P30; Inter Region transfer type, 5 GB outbound data transfer from UAE North
to East Asia
Storage Storage Backup_Storage UAE Block Blob Storage, General Purpose V2, LRS Redundancy, Hot Access Tier, 15 TB
Accounts North Capacity - Pay as you go, 10 x 10,000 Write operations, 10 x 10,000 List and Create
Container Operations, 10 x 10,000 Read operations, 100,000 Archive High Priority
Read, 1 x 10,000 Other operations. 1,000 GB Data Retrieval, 1,000 GB Archive High
Priority Retrieval, 1,000 GB Data Write
Storage Storage Backup_Storage UAE Block Blob Storage, General Purpose V2, LRS Redundancy, Cool Access Tier, 10 TB
Accounts North Capacity - Pay as you go, 10 x 10,000 Write operations, 10 x 10,000 List and Create
Container Operations, 10 x 10,000 Read operations, 100,000 Archive High Priority
Read, 1 x 10,000 Other operations. 1,000 GB Data Retrieval, 1,000 GB Archive High
Priority Retrieval, 1,000 GB Data Write
Security Microsoft UAE Logs ingested - 33 GB Basic logs per day, 9 GB Analytics logs per day; Azure
Sentinel North Monitor Retention - 3 months of Data Retention, 0 months of Data
Archive; Azure Monitor Data Restore - 300 Basic log queries per day, 1400
GB data scanned per query, 2000 GB Data Restored, 0 days data restored;
Azure Monitor Search Queries and Search Jobs – 0 queries per day, 0 GB
data scanned per query of Search Queries, 0 queries per day, 0 GB data
scanned per query of Search Jobs
Security Microsoft UAE Microsoft Defender for Cloud by Resource: 0 Plan 1 servers x 730 Hours, 36 Plan 2
Defender for North servers x 730 Hours, 0 Container vCores x 730 Hours, 0 App Service nodes x 730
Cloud Hours, 0 SQL Database servers on Azure, 0 SQL Database servers outside Azure x
730 Hours, 0 MySQL Instances, 0 PostgreSQL Instances, 0 MariaDB Instances x 730
Hours, Cosmos DB 0 RU/s x 730 Hours, 0 x 10,000 Storage transactions, 0 Key Vault
transactions, 0 x 1 million ARM API calls, 0 x 1 million DNS queries; Microsoft
Defender for Cloud for IoT: 0 x 100 committed devices for agentless monitoring, 0
IoT Hub Devices, 0 x 25,000 IoT Hub Message transactions
DevOps Azure UAE Log analytics: 2 GB Daily logs ingested; Application Insights: 0 GB Daily logs ingested,
Monitor North 3 months Data retention, 0 Multi-step Web Tests; 36 resources monitored X 1
metric time-series monitored per resource, 0 Log Alerts at 5 Minutes Frequency, 0
Additional events (in thousands), 0 Additional emails (in 100 thousands), 0
Additional push notifications (in 100 thousands), 0 Additional web hooks (in
millions)
Networking Azure UAE 730 Hours, 5 GB Outbound Data Transfer
Bastion North
Page | 46
DR Mapping
Replication
Env VM Name SAP Module DB To be OS No of Cores vRAM vHDD GB DB Storage Total Storage type Duing Normal Hours During DR Drill
M64s (64 vCPU 1024 GB Memory) M64s (64 vCPU 1024 GB Memory)
PRD SAP HANA DB Appliance HDB Server HANA SLES 11 SP 4 40 / 2 768 5000 700 5700 Live SAPS 67315 SAPS 67315
E8s_v4 (8 vCPU 64 GB Memory) SAPS
PRD SAP ECC - Suite On Hana CI+APP Server HANA SLES 12 SP 4 8 80 320 700 1020 Offline 8710
E4s_v4 (4 vCPU 32 GB Memory) SAPS
PRD SAP BW On Hana CI+APP Server HANA SLES 12 SP 4 2 24 250 80 330 Offline 4178
E4s_v4 (4 vCPU 32 GB Memory) SAPS E4s_v4 (4 vCPU 32 GB Memory) SAPS
PRD Enterprise Portal CI+APP+DB Server ASE SLES 12 SP 4 2 24 200 70 270 Live 4178 4178
E4s_v4 (4 vCPU 32 GB Memory) SAPS E4s_v4 (4 vCPU 32 GB Memory) SAPS
PRD Content Server CS Server+Webdispatcher MaxDB SLES 12 SP 4 2 8 200 120 320 Live 4178 4178
E4s_v4 (4 vCPU 32 GB Memory) SAPS E4s_v4 (4 vCPU 32 GB Memory) SAPS
PRD SAP Fiori Netweaver Gateway CI+APP+DB Server ASE SLES 12 SP 4 1 8 300 50 350 Live 4178 4178
E4s_v4 (4 vCPU 32 GB Memory) SAPS E4s_v4 (4 vCPU 32 GB Memory) SAPS
PRD SAP Solution Manager CI+APP+DB Server ASE SLES 12 SP 4 4 32 650 300 950 Live 4178 4178
E4s_v4 (4 vCPU 32 GB Memory) SAPS E4s_v4 (4 vCPU 32 GB Memory) SAPS
PRD Workforce Performance BuilderAPP server MSSQL Windows 2012 R2 4 24 700 100 800 Live 4178 4178
D8s_v4 (8 vCPU, 32 GB Memory) SAPS
PRD SAP Business Objeects APP server Windows 2012 R2 8 38 500 30 530 Offline 8710
SAP Webdispatcher + D2s_v4 (2 vCPU, 8 GB RAM) SAPS 2180
PRD SAP Cloud Connector Web Server SLES 15 SP 1 2 8 50 0 50 Offline
D2s_v4 (2 vCPU, 8 GB RAM) SAPS 2181
PRD SAP Router (For SAP Support) n/a SLES 15 SP 1 1 8 50 0 50 Offline
D4s_v4 (4 vCPU, 16 GB Memory) SAPS D4s_v4 (4 vCPU, 16 GB Memory) SAPS
PRD ADCAssets & RFID System MSSQL DB+App Server MSSQL Windows 2012 R2 4 16 700 300 1000 Live 4178 4178
E2s_v4 (2 vCPU 16 GB Memory) SAPS E2s_v4 (2 vCPU 16 GB Memory) SAPS
Electronic Personnel on Board 2178 2178
(Bio-Metric Time /
PRD Attendence) MSSQL DB+App Server MSSQL Windows 2012 R2 2 24 200 100 300 Live
D4s_v4 (4 vCPU, 16 GB Memory) SAPS D4s_v4 (4 vCPU, 16 GB Memory) SAPS
PRD INTELEX (QHSE System) MSSQL DB+App Server MSSQL Windows 2012 R2 6 16 200 100 300 Live 4178 4178
D4s_v4 (4 vCPU, 16 GB Memory) SAPS D4s_v4 (4 vCPU, 16 GB Memory) SAPS
PRD Domain Controller (AD) Windows 2012 R2 3 24 200 200 Live 4178 4178
E2s_v4 (2 vCPU 16 GB Memory) SAPS E2s_v4 (2 vCPU 16 GB Memory) SAPS
PRD AZURE SYNC Windows 2012 R2 2 16 150 150 Live 2178 2178
Azure BOQ
Page | 47
Compute Virtual D4s_v4-1 UAE 1 D4s v4 (4 vCPUs, 16 GB RAM) (3 year reserved), Linux, (Pay as you
Machines FW Central go); 1 managed disk – P10; Inter Region transfer type, 5 GB outbound
data transfer from UAE Central to East Asia
DevOps Azure UAE Log analytics: 0 GB Daily logs ingested; Application Insights: 0 GB Daily
Monitor Central logs ingested, 3 months Data retention, 0 Multi-step Web Tests; 11
resources monitored X 1 metric time-series monitored per resource, 0
Log Alerts at 5 Minutes Frequency, 0 Additional events (in thousands), 0
Additional emails (in 100 thousands), 0 Additional push notifications (in
100 thousands), 0 Additional web hooks (in millions)
Security Microsoft UAE Microsoft Defender for Cloud by Resource: 0 Plan 1 servers x 730 Hours,
Defender Central 11 Plan 2 servers x 730 Hours, 0 Container vCores x 730 Hours, 0 App
for Cloud Service nodes x 730 Hours, 0 SQL Database servers on Azure, 0 SQL
Database servers outside Azure x 730 Hours, 0 MySQL Instances, 0
PostgreSQL Instances, 0 MariaDB Instances x 730 Hours, Cosmos DB 0
RU/s x 730 Hours, 0 x 10,000 Storage transactions, 0 Key Vault
transactions, 0 x 1 million ARM API calls, 0 x 1 million DNS queries;
Microsoft Defender for Cloud for IoT: 0 x 100 committed devices for
agentless monitoring, 0 IoT Hub Devices, 0 x 25,000 IoT Hub Message
transactions
Page | 48
The current SAP Landscape based on SUSE Linux 12 / Win 2012 R2 and HANA1.0/ ASE16 / MaxDB
7.6/ MSSQL 2012/16 OS/DB platform hosted on-premises will be migrated to Cloud leveraging various
tools such as SAP’s standard tool Software Pac age Manager SWPM Cloud’s migration tool A A’s
HSR /ASE native database replication tool SRS.
Migration Methodologies
Expected
Migration Methodology SAP Landscapes Tools Used Technical
Downtime
Page | 49
Methodology -1 (HANA System Replication.)
Page | 50
Methodology-4 ( Export/Import using SAP BI Tools. )
Page | 51
Estimated Production Downtime or Blackout Period
The migration of Production Environment will be executed over the weekend to have minimum business
impact.
Target Architecture
SAP Production Landscape will be installed in AZURE by adhering to the following design
principles for achieving High availability and Disaster Recovery:
Architecture
High Availability Disaster Recovery
Component
SAP Central Linux Cluster Solution -or- Windows Server AZURE ASR, RSYNC etc.
Services Failover Cluster etc.
SAP Application VMs distributed between Availability sets AZURE ASR, RSYNC etc.
Server behind AZURE standard load balancer.
Page | 52
Synchronous HANA system replication Asynchronous HANA system
HANA Database between HANA databases in availability sets. replication between HANA
Server databases in two regions.
High Availability
igh Availability will be provided for SAP RP’s A A database layer. Standard reference architecture
on AZURE would be implemented as per the diagram below.
Disaster Recovery
Disaster recovery setup will be provided for SAP RP’s A A database layer. Standard reference
architecture on AZURE would be implemented as per the diagram below.
ASR -Azure site recovery is used to replicate the VMs of ASCS/SCS, SAP application Pool and
Native database replication tools to synchronize the database layer.
▪ Migration of Workload (as mentioned in Table ADC Current NON-SAP Landscape) to Cloud.
▪ Workload sizing and defining SAP architecture on target cloud.
▪ Setup and configuration of High Availability and Disaster recovery for identified Production
Landscapes.
▪ Operating System script remediation post migration.
▪ Two Weeks of Post Go-Live Support only for SAP Landscape Migration. This doesn’t include
normal application support.
Page | 53
Migration Methodologies
Page | 54
• MSSQL Version 2012 + CU11 and Later Non-Clustered Instances
• MSSQL Server versions 2005, 2008, 2008R2, 2012 and 2016 Full load (Enterprise)
Service Description
Microsoft A cloud workload protection solution that provides security management and
Defender for advanced threat protection across hybrid cloud workloads.
Cloud
Azure Key A secure secret store for the passwords, connection strings, and other information you
Vault need to keep your apps working.
Azure Monitor A monitoring service that collects telemetry and other data, and provides a query
logs language and analytics engine to deliver operational insights for your apps and
resources. Can be used alone or with other services such as Defender for Cloud.
Azure Sentinel SIEM Solution
We recommend using 3rd Party NVAs as Perimeter Firewall in HA in the DC/DR site to manage and
allow traffic flow between the hybrid network of On-premises & Cloud environments.
Page | 55
6.13 Proposed Solution Assumptions
SAP System Assumptions
• Customer and Cloud4C will work jointly on identifying the mitigation path / alternatives for identified
risks.
• Customer to initiate DB Backup well within time to minimize migration duration.
• Customer will provide the list of instances to be migrated to target Cloud.
• Project management and weekly status reporting will be required throughout the course of the
migration. Cloud4C shall nominate a Project manager to take care of these activities and SAP shall
also depute a Project manager for the tenure of the projects
• All the interfaces, Job Management and Promotion Management would be handled by
SAP/Customer.
• Dual Maintenance of transports in SAP ECC & BW Landscape will be handled by Customer.(If part
of Landscape)
• Cloud4C may require up to two (2) weeks to assemble a Project team. Cloud4C reserves the right
not to start the Project until Cloud4C has assembled a Project team.
• A hard development-freeze will be imposed from start of Regression/User-Acceptance testing; a
soft development-freeze may be applicable from the migration of development systems.
• The estimated Project schedules will be shared once the list of instances to be migrated is
received by Cloud4C.
• Decommissioning of the infra would happen only after confirmation from both customer and
Cloud4C.
• Primary scope is migration of SAP landscape from On Prem to Azure Cloud by leveraging SAP
Activate Methodology.
• Post successful migration of SAP Landscape ERP6.0 EHP6, ERP6.0 EHP upgrade to EHP8
• SAP sizing and defining SAP architecture on target cloud.
• Basis support for fixing function Integration Testing and remediation of interfaces or
communication channels with any third party non–SAP applications.
• Setup and configuration of Disaster recovery for identified SAP Production Landscapes if it
currently exists in source. Otherwise, to be discussed and aligned on the cost estimates to setup
DR / HA.
• Operating System script remediation post migration.
• Four Weeks of Post Go-Live Support only for SAP Landscape Migration. This doesn’t include
normal application support.
• System refresh of SAP systems On-Premise and setup of staging environment On-Premise or
C4C.
• Implementation of any new functionalities or new developments
• Any Functional / ABAP support during the project – If this support is needed it has to be called out
clearly and Digital team from Cloud4c will be involved.
• Any non/partially implemented SAP process / module.
• System Volume, Stress Testing, Load Testing, Benchmarking Testing.
• Solution Manager 7.2 re-installation and configuration.
• SAP Solution Manager Configuration like technical monitoring and EWA setup for Production SAP
systems
• Implementation of any functionalities on Solution Manager like CHARM, ITSM, etc..
• System administration and performance tuning at OS/DB and network levels required to be done
On-Premises.
• Data collection, cleaning, or validation from the current SAP/ non-SAP systems.
• Modification or development of existing or new interface and communication channels.
Page | 56
• System/Database backup, restore and recover on source environment On-Premise
• SAP ABAP Custom Code remediation post migration.
• SAP ABAP Modifications and Adjustments (SPDD, SPAU and SPAU_ENH), if required.
• Procurement of any software license.
Assumptions
DC Region: UAE North
1
DR Region: UAE Central
Compute capacity has been considered as per details provided in Calc Sheet and additional
2 requirements will be handled as per CR process
3 IaaS sizing based on customer data, customer to validate the same & provide sign off.
4 Client to provide licenses for Applications & Databases
5 Application Functional Support is excluded
Backup storage has been considered as per Policy for commercial calculation & will be charged
6
additionally as per retention policies
Page | 57
For PAYG VM's - the estimation is based on fixed hours usage & may vary based on actual
24
usage.
Inclusion
SAP NON SAP Workload Migration and Azure Platform Management & Managed Services as
1
per SOW
2 Cloud4C licenses as per BOQ
3 OS Licence Windows and SLES
Exclusion
1 Customer side network connectivity / Internet availability to connect to Cloud4C Cloud
2 Cross connect / MPLS termination charges are excluded
3 Customer Application Licenses & Support
4 Customer Business application configuration / client-side configuration / App monitoring
5 Any Onsite resource deployment
6 Customer Application functional & development Support
7 Azure Express Route/ Link termination charges to be borne by customer
8 Compliance Certification / Auditor appointment & its associated charges
9 Customer Application security controls and validation testing
10 Any provisioning at Client DC
11 Database Licenses (except if specified)
12 SAP Functional SAP
13 Customer Application customisation and management
14 Functional business logic and processes of organization
15 Load Testing of application and stress testing of infrastructure
16 Helpdesk for customer internal / Business users
17 Disaster Recovery Site Network convergence & DR declaration
Page | 58
• Handover to Service Delivery for routing issues
Project Manager will be responsible for preparing & maintaining the following documents:
• Project Charter
• Project Plan
• Risk register
• Issue Register
• CMDB
• Lesson Reports
Page | 59
• Focusing on measurable results in the areas that are critical to Customer `s business and
objectives
• Delivering of high-quality IT services to meet Customer business needs
• Providing a central repository for all standard operational management procedures and practices
• Delivering high satisfaction levels for Customer`s Participants
• Developing the business rationale and benefits of any proposed changes and communication of
these to Customer IT
• Eliminate and mitigate business risks with appropriate planning and monitoring of current trends
• Working within the mutually agreed-upon structure for execution of processes and procedures
Reports: -
Cloud4C will provide periodic reports categorized into the following two types to Customer giving it
insight into the Operational performance of the team.
Service Support Reports – These reports will enable transparency into the day-to-day operations.
They will provide a unified infrastructure view and detailed insight into health of the infrastructure
components.
Disaster Recovery Reports – These reports underpin the business aspects that Cloud4C takes into
consideration to maintain a steady and satisfying relation.
All SLA and KPI reports will be customized and generated as per Customer service levels, the data
and reports will be real time and will be pulled out for individuals as per the custom access provided.
Page | 60
7.1.2 Project Cadence
Cloud4C has designed a governance process which will facilitate a transparent model where ADC Team
will have visibility into the day-to-day operations and progress of the project. The model provides for
clear communication and prioritization which helps in addressing issues. The governance process
addresses the following three levels of relationship reviews:
Strategic – where at an executive management level, Cloud4C and ADC Team can maintain and grow
the partnership, resolve significant issues, set direction, approve strategic changes and plan for the
future.
Tactical – where through regular review meetings Cloud4C and ADC Team can ensure that progress is
being made according to the overall objectives of the project.
Operational – where we can work on a day-to-day basis to deliver services and respond to requests,
problems and queries, in line with the objectives of the project.
Cloud4C believes that the proposed organization model and governance structure will give maximum
benefit to ADC. However, Cloud4C is open to engaging in a collaborative dialogue with ADC to explore
other models or refine the suggested models.
Page | 61
• Control: review the effectiveness of risk and issue management actions.
Active issues and risks will be regularly monitored during the program.
Escalation Matrix
Transition Phase
Page | 62
7.2 Service Management
Cloud4C delivers the Managed Delivery services using our Hybrid Delivery Framework driven by ITIL
processes. We use an established operating model which aims to address the services and solutions
required by ADC project. At the same time, it allows to provide cost benefits as we are utilizing the
offshore resource model. This model also results in increased productivity, efficiency and maximize the
contribution of every team member.
A Service Desk is a primary IT service called for in IT service management (ITSM) as defined by the
Information Technology Infrastructure Library (ITIL). It is intended to provide a Single Point of Contact
("SPOC") to meet the communication needs of both Users and IT employees. But also to satisfy both
Customer and IT Provider objectives "User" refers to the actual user of the service, while "Customer"
refers to the entity that is paying for service.
The ITIL approach considers the service desk to be the central point of contact between service
providers and users/customers on a day-to-day basis. It is also a focal point for reporting Incidents
(disruptions or potential disruptions in service availability or quality) and for users making service
requests (routine requests for services).
The below flow illustrates the Cloud4C AIOps supported service delivery based on ITIL
ITIL Based Delivery Process
Page | 63
7.2.2 Service Windo Coverage & SLA’s
Cloud4C considers a key goal for Service Level compliance is to maintain and improve service quality
by closely managing SLA performance and targets. This includes the instigation of actions to improve
under-performing services. These activities would help to develop and maintain a service orientated
relationship between Cloud4C and ADC by establishing effective lines of communication to understand
service expectations. Following are the factors considered to frame SLAs.
Service Levels:
The below table describes the various Service Levels-
The Incidents and Service Requests are classified into the following severity levels
Page | 64
Urgency
3 - Low 2 - Medium 1 – High
Issue prevents Issue prevents the
Incident Priority Service or major
the user from user from
portion of a
performing a performing critical
service is
portion of their time sensitive
unavailable
duties. functions
• Degraded Service
3 – Low
• Degraded Service
Levels but not
2 – Medium
level of service
• t appears cause of
incident falls across
multiple functional areas
• Maximum number of
customers are affected
1 – High
for customer
• Pu lic facing service is P1 P1 P1
unavailable
• Any item listed in the
Crisis Response tables
Service Levels:
The below table describes the various Service Levels-
The Incidents and Service Requests are classified into the following severity levels
• P1 Incident: Any incident reported as a complete Stop, Down, Outage will be Critical and needed
Page | 65
to be highest priority.
• P2 Incident: Any Incident reported for slow performance in Service, Latency and Packet drops or
Service Performance alerts which are creating high impact on ADC business.
• P3 Incident: All Service Requests will be treated as P3, excluding a few of them which are having
business urgency. Incidents which are not creating business impact and urgency will be prioritized
as P3.
* Disclaimer:
Cloud4C will use reasonable efforts to resolve problems as quickly as possible. However, Cloud4C
offers this service based on a combination of third-party Hardware & Software; for instance - Cloud4C
will not offer any service credits to the ADC in case of non-availability of application due to a problem
with the Managed SOC Services. In such cases, Cloud4C will work with the ADC to remedy problems
at the earliest.
Page | 66
RACI Alert Tickets
Activities C4C NOC C4C SME Team C4C PM ADC Service Desk
Page | 67
Event Correlation A I R,C A
Classify Event A I R,C A
Log Event A I R,C A
Auto Response A I R,C A
Corrective Action R A R,C R
Raise Incident A I,C R,C A
Review & Closure R A R,C R
Review Resolved Events R A R,C R
Update CMS and close
R A R,C R
events
Page | 68
Follow-up With Vendor R A R,I
Resolution & Recovery A R C,I
Carry out the task for the incident resolution A R C,I
Carry out the task to recover A R C,I
Update Work log and resolve Incident A R C,I
Confirmation & Closure R I A,C
Confirm resolution with user R I A,C
re-open the incident R I A,C
Ask user to provide feedback and close
R I A,C
incident record
Provide feedback & close incident record R I A,C
Major Incident R A I
Accept Major Incident R I A,C
Review Incident Details A I R,C
Open Conference Bridge R R A,I
Tech team will join the Technical bridge in 10
R,A R,A A,I
Min
Involve Related Support Groups C R,A I
Determine Stakeholders for communication R,A R,A A,I
Coordinate Resolution R,A R,A A,I
Collect Status and Update Incident Record R,A R,A A,I
Communicate on Status to Stakeholders R,A R,A A,I
Perform Post Mortem and Prepare Incident
R,A R,A A,I
Report
Page | 69
Problem Management Process
Problem Management C4C NOC C4C PM C4C SME C4C Quality ADC
Raise Problem Ticket A,R I C I I
Trend Analysis(Recurring Incidents) A,R I C I I
Review, Audit Customer Feedback R R C I I
Input From Other Processes R C I A I
Detection & Recording C S S I
Identify the Problem A,R I I,R I,R I
Record the problem A,R C S,R S,R I
Classification & Initial Assessment A,R R A,R A,R I
Assigning problem to Level2 /Onsite team A,R R A I I
Inform the Requester/Customer A,R R C I I
Page | 70
Investigation & Diagnosis I R A R I
Investigate and diagnose the problem I R A R I
Update KEDB and inform stakeholders I A A R I
Error Control & Resolution I R A C I
Error assessment I R A C I
Determine the resolution procedure I R A C I
Submit the RCA including ETR I R A C I
Raise RFC as applicable I R A C I
Provide resolution I R A C I
Confirmation & Closure I R A,R A I
Update the KEDB I R A,R A I
Review and confirm resolution I R A,R A I
Attach RCA report & Close the Problem I R A,R A I
Timelines of any change will be in lines with the timelines defined by CAB and as per criticality of the
change
A complete process covering Problem & Change Management as per ITIL process is showed below:
The platform may require additional capacity in the infrastructure to support organic growth or sudden
increase in transaction volume and usage. Any Infrastructure changes that are to be accommodated to
hardware addition or configuration changes must be supported through emergency or rapid change
control once identified through a change management process including SLA reviews. Extended
capacity planning that requires additional physical infrastructure modifications has to be completed
Page | 71
within 5 to 7 business days. This will also be handled through change management process including
SLA reviews.
Both Customer and Cloud4C will avoid emergency hardware provision through planned capacity and
growth review allowing for proactive planning for capacity changes. Customer will have final say for
change prioritization and scheduling the change for execution
The list of activities for release management shall include, but not be limited to:
- Evaluating Production Readiness of Changes based on predefined checklist
- Tracking all the production fixes and maintenance activities going in or overlaying by new changes
- Opening all the CRQs related to holding production jobs and/or executing the deployment scripts
- Opening support bridge if required, for Severity 1
- Conducting Post Mortem analysis as needed
- Tracking new production fixes due to install related issues and install the same in mid-month
releases
The matrix above shows the delays of handling and resolution for changes based on their characteristic
Minor / Medium / Major.
Definitions
Standard Change
Pre-Approved changes are typically pre-approved and require no CAB approvals. However, a
business level approval would be mandatory. These changes are low risk, low impact with
High frequency changes.
Normal Change
A change that requires Change Management approval, and encompasses the majority of changes
which carry High/Medium Risk, High/Medium Impact.
Emergency Change
A Change that must be introduced as soon as possible, with response to a Priority 1 or Priority 2
Production incident.
• A Project Change Request (PCR) will be the vehicle for communicating change. The PCR must
describe the change; the rationale for the change and the effect the change will have on the
project.
• The designated Project Manager of the requesting party will review the proposed change and
determine whether to submit the request to the other party.
• Both Project Managers will review the proposed change and recommend it for further
investigation or reject it. Cloud4C will specify any charges for such investigation. A PCR must be
signed by authorized representatives from both parties to authorize investigation of the
Page | 72
recommended changes. The investigation will determine the effect that the implementation of
the PCR will have on price, schedule and other terms and conditions of the Agreement.
• A written Change Authorization and/or PCR must be signed by authorized representatives from
both parties to authorize implementation of the investigated changes.
• Given the nature of the project, it is important to have a clear and well-defined change control
procedure to ensure a proper, systematic and documented approach for changing scope of work
to be performed. All necessary changes to the scope shall be executed via this change control
procedure.
• All changes should recorded and then evaluated, authorized, prioritized, planned, tested,
implemented, documented and reviewed in a controlled manner.
• All changes performed or executed must have a Change Request
• Changes to infrastructure must not occur without a Change Request.
• A Roll Back Plan must be in Place to avoid unplanned downtime – A Customer Centric
Approach.
• A Change Request may take the form of:
➢ A formal Request for Change from a Client
➢ A Request Ticket for standard or pre-approved changes
• All Change Work must occur in the context of an Incident, a Problem or a Change Request.
• All required fields in the Change Portal to be filled religiously.
• Standard Changes usually takes 4 to 48 hours to implement the Change, on a best effort basis.
• Normal Changes usually takes 48 to 72 hours to implement the Change, on a best effort basis.
• Emergency Changes usually takes 4 to 8 (Business) hours to implement, on a best effort basis
• Cloud4C Technical Management holds final decision, if a change is a Normal Change or
Emergency Change
Page | 73
C4C
C4C
Change Management ADC Onsite CAB/ECAB
PM
SME
Initiate Request for Change (RFC) R,A,I I C
Classify RFC A,R,C I,R -
Review RFC R,C A C
Return RFC to Customer R,A,C R C
Assign/Review Priority & Category R,A,C R C
Review RFC for completeness & Accuracy R,C,I C A
Perform Emergency Change R,A,I R C
Request Emergency Change R,C,I A, R C
Email/System Approval R,I A C
Execute the Change as per plan R,A,I I C
Inform Requestor & Close RFC R,A,I C I
Perform Standard Change R,A,C I -
Assign Change R,A,C I -
Schedule Change R,A,C I -
Carry out Implementation Task R,A,C I -
Update Requestor & Close RFC R,A,C I -
Perform Normal - Change R,S,A I,C R,I
Assign Change R,C,I A, R C
Identify Resources R,I I C
Prepare Detailed Plan R,A,I I C
Co-ordinate Implementation R,A,I I I
Implementation Authorization/Approval R,A,I I C
Inform Requestor & Close RFC/BRD R,A,I I C
Change Review and Closure R,C A,R I
Post Implementation review R,C A I
Closed RFC A,C R I
Page | 74
7.3 Proposed Timeline
Executive Summary:
Azure Cloud Architect with 10+ years of experience in the specification and delivery of high-availability
secure infrastructure projects including data centers, Cloud Services, Identity Security, Data Integrations
and Modern Apps DevOps. Passionate about technology and innovation, a delivery focused
professional with a proven track record in challenging and demanding environments. Solid business
judgment and strong desire to tackle complex business and technical problems. Capable of determining
keys issues and synthesizing information into cohesive conclusions.
Recent Projects:
• Designed the Public cloud solutions for US, EMEA, APAC and Middle East Customers.
Page | 75
• Cloud Migrations, Assessments, and Migration strategy plans.
• Developing and Establishing Security Governance of Cloud Digital Projects for Enterprise
Organizations.
• Expertise in Transforming the Application from Monolithic to Microservice based architecture.
• Expertise in designing the solutions on cloud for Cloud Native and Blockchain Services in
Azure Cloud.
• Expertise in designing the Cloud identity Solutions for SPA & Multi-tenant Apps.
• Azure Resource Automation with Devops.
• Designing the Data Integrations and IOT Solutions.
• Experience the rearchitecting the obsolete cloud services architecture.
• Experience in providing Cost Optimization Solutions on Public Cloud Architecture.
Experience Summary:
✓ Total Number of Virtual Machines Migrated: 180+
✓ Database Migrations: 15+
✓ Application Modernization: 25+
✓ Data Integrations: 3
✓ Disaster Recovery in Cloud: 50+
Page | 76
▪ Total Number of Virtual Machines Migrated: 380+
▪ Database Migrations: 30+
▪ Application Integration: 35+
Project Highlights
▪ Migrated the Business-Critical applications like HRMS, ERP, Analytics.
▪ Designed the Cloud Virtual Network Architecture with more than 10 Virtual network and with 3
Express Circuits connecting to different regions.
▪ Migrated the Virtual Machines with HA leveraging Multi-regional approach.
▪ Implemented Secured Virtual Network restricting East-West Traffic using Virtual Appliance.
▪ Refactor the Database to Azure SQL Databases and NO SQL DB.
▪ Re-architect and Migrated the applications to Azure Web app and ACS with Multi-regional HA
leveraging Traffic Manager and AGW.
▪ Designed the Automated workflow process for Beer Manufacturing unit using Logic Apps, Azure
Functions, Event Grid & Azure Service Bus.
▪ Redesigned the Big data analytics process to leverage using Azure HD Insight with the
combination of Azure Data lake and Azure Storage.
▪ Migrated ADFS RPT SSO Application to Azure AD.
▪ Implemented Enterprise Integration between ERP and Azure Block chain services.
Executive Summary:
• CERTIFIED – PMP, Six Sigma Green Belt
• 18+ years of Experience spanned across IT Infrastructure, Project Management, ERP &
Workforce Management Systems
• Expertise in ITSM - Service Operations, Change Management, Request Management, Problem
Management, Vendor Management
• Excellence in Business Communication, Client Management, Team Management, Risk
assessment and driving Continuous Improvement throughout Service Lifecycle
• Managed Service, Global Delivery teams, Resource Optimization, Outsourcing: Delivered
multiple outsourcing & managing service contracts across multiple geography, Realignment of
resources for cost efficient IT, Transition manager.
• Responsible for IT Infrastructure, Operations support, Software development, New projects and
End User support. Formulating strategy and Leading Digitization projects for the
organization, Creating Digital and Mobility space.
• Delivering new trading systems, forex, core transactions, mobile, user platforms and financial
services software development projects, to build a new robust AWS & K8S based system
accommodating large number of CI/CD processes, Build software of AI Machine Learning, AI
Predictive Models, Cognitive Computing, Data Science, Smart Mobility, Application Conceive,
Plan and Implement Digital Transformation projects for Website, Payment Systems, Omni
Channels, Lead Generation, CRM, Kiosks, Web Transactions and others, Managing software
development team, Owning software stack, Support entire application lifecycle, release
management and production software development life cycle.
Recent Projects:
Page | 77
Cloud, Automation and RPA Projects
Large scale migration to Amazon and Azure cloud services, Banking End of Day automation using
Atomic CA, Employee On boarding, IT Monitoring PRTG and other tools, events to Actions and
resolutions, UI Path to automate service desk and business processes, Automation of data feed process
to MIS reporting, Email screening and workflow, Approval and workflow automation, AML automation
and compliance reporting, multiple projects in RPA solutions using UI Path and other conventional
technologies, implemented several OCR solutions through the full project life cycle of scanning, imaging
and automation to business solutions. Digital Transformation projects
Omni channels, Payment gateways, Easy Online web channels for payments, Mobile payments and
mobile applications for customer search, improving customer communications using Online channels,
Kiosk applications and payments system, POS machines implementation, Loyalty cards, Online
payment instruction system, Rewards programs, Currency cards, Organization to Digitization and
Website User Experience.
IT Security Projects
PAM projects, SIEM Tools Implementation (ArcSight, Arcos, Qradar, Logrhythm, Trend Micro),
Implementation of SOC teams, IT Procedure and governance, Firewall security and rules cleanup,
Threat Protection systems, Data Loss Prevention (DLP), Mimecast, Cloud Access Security Broker
(CASB), Patch Management, Multi-factor Authentication, Regulatory Compliance like PCI Compliance,
GDRP, Banking, Intrusion Management, Endpoint Security, Ever greening of network devices, servers
and OS
Page | 78
✓ Microsoft Certified Cloud Administrator (Azure)
✓ Microsoft Azure DevOps Certified
✓ Certified Associate in Python Programming
✓ AWS Certified Machine Learning
✓ IBM BLOCK CHAIN Certified o Oracle Certified Professional
✓ IBM Certified Professional for (Web Sphere DB2, AIX, Tivoli)
✓ MCP, MCSA, MCTS, MCDBA (Microsoft Certified Database Administrator)
✓ SCSA (Solaris Certified System Administrator 9, 10)
✓ Certified Ethical Hacker (CEH) Security+ (CompTIA Certified)
✓ AICB Associate Institute of Canadian Bankers
✓ DevOps Trained
✓ Six Sigma Green Belt Certified (Exemplar Global)
Executive Summary:
A qualified Technocrat and a seasoned IT Manager having over 15 + years of rich and extensive
experience of IT Network and security Operations, SoC Operations, Cloud Networking, Services
Delivery Management; a senior IT Operations Manager experienced in support of IT Service Delivery at
the same time diverse responsibilities of deployment of multiple Data Centers on-premises, Public cloud
and private cloud in a Network, high quality IT services, Trouble Shooting & Problem Solving for High
Availability of Information Services for seamless flow of their business processes; track record of
success in developing & executing operational strategies to promote organizational growth & optimal
utilization of emerging technologies.
Key Highlights:
➢ MOTC CORP : Brownfield migration from on premises to cloud : Dec 2019 to June 2020.
➢ MOTC Shared Services : Brownfield migration from on premises to cloud : Nov 2019 to
May2020.
➢ Qatar GN : Green Field network HUB deployment for all Govt entities Nov 2019 to March 2020.
➢ Qatar PSA : Brownfield migration from on premises to cloud : Feb 2020 to June 2020.
➢ Abunayyan Holdings: Brownfield migration from on premises to cloud : April 2020 to June
2020.
➢ Gulftainer : Brownfield migration from on premises to cloud : March 2020 to May2020.
➢ Y-Axis : Brownfield migration from on premises to cloud : May 202
Certifications:
▪ Microsoft # SR3395821: MCP, MCSA, Azure Solution Architecting -70-532, 533, 535
▪ Cisco Systems # CSCO11423332: CCNA, CCNP
▪ EC-Council: CEH –V.8, Certified Forensic Investigation (CHFI)
▪ ICSI | CNSS Certified Network Security Specialist
▪ Qualys: Vulnerability Management, Policy Compliance, PCI Compliance, Web App Scanning
▪ Splunk: Fundamentals, User Behavior Analytics, Building Add-ons, Creating Modular Inputs.
▪ Zscaler Certified Cloud Professional - Internet Access(ZCCP-IA)
▪ Zscaler Certified Cloud Administrator -Internet Access(ZCCA-IA)
▪ Palo Alto: ACE, Prisma Cloud, Cortex XDR,
▪ ZTE University: Level A of ZXR 10 MPLS Certified (10IURRA302)
Page | 79
Principal Security Engineer
Executive Summary:
Over 9 years of professional cyber security experience in highly innovative and globally diverse
environments in the Banking, Cloud, Financial, Services, Insurance, Telecommunication, Retail and
Media Infrastructure. Working in Cloud4C since last 2 years as Technical Account Manager.
Key Highlights:
Leading all the Cloud projects for various customers located in UAE, Canada and Malaysia. Have
expertise on Cloud native security tools as well as on-prem security tools. For ex: SIEM, PIM, DAM,
VA/PT, FIM, HSM & VM Encryption, ATP, Deception, Content filtering, Anti-Virus, DDOS, Phishing,
HIPS/NIPS, Web Application Firewall
Certifications:
✓ Azure AZ 500,
✓ Azure AZ 300,
✓ AWS Technical Professional Certificate,
✓ AWS Cloud Economics certificate,
✓ Certified Ethical Hacker (CEHv7),
✓ McAfee certified product specialist (SIEM),
✓ Pre-Post Sale certificate RSA,
✓ ITIL Foundation,
✓ Imperva DAM (Database Activity Monitoring)
Executive Summary:
▪ 10 Years of Experience as SQL Server DBA Level 2 Production and DR Support in Tier 4
Datacenter
▪ Extensive experience on SQL Deployment solutions in Azure Cloud Platform.
Key Highlights:
➢ Successfully Migrated On-Premises SQL databases to Azure Cloud with Zero Downtime
➢ Successfully Deployed Always O Availability group Solution on A ure SQL Server VM’s
➢ Successfully Migrated On premise Always ON Cluster servers AS IS to Azure Cloud by using
ASR (Azure Site Recovery) Approach
➢ Deployed ASR as a Disaster recovery (DR) solution for SQL Servers
Projects:
➢ Ministry of Transport and Communications (Qatar)
➢ Planning and Statistics Authority (Qatar)
➢ Cadillac Fairview (Canada)
➢ Kuwait International Airport (Kuwait)
➢ Abunayyan Holding Private Ltd
➢ PERSOL KELLY (Singapore)
Certifications:
✓ AZ-103 - Microsoft Azure Administrator
Page | 80
✓ 70-462: Administering Microsoft SQL Server 2012/2014 Databases
Team Lead
Executive Summary:
• 10+ Years of Extensive experience as MSSQL Database Administrator in SQL DBA,
• Extensive experience on SQl Deployment solutions in Azure Cloud Platform
Key Highlights:
➢ Migrated On-Premises SQL databases to Azure Cloud.
➢ Deployed High Availability Solution for MSSQL server database in Azure (Iaas & PaaS)
➢ Deployed DR solution for SQL database using native technologies ( SQl log shipping )
Projects:
➢ Ministry of Transport and Communications ( Qatar Central Region)
Certifications:
✓ AZ-103 - Microsoft Azure Administrator
Executive Summary:
• Over 5+ years of experience in IT industry on Azure/Linux/Virtualization Infrastructure Systems.
• Microsoft Azure Migration Expert with experience in handling client across multiple industry
verticals globally
• Assessment & Migration of on premise environments hosted on VMware, Hyper-V and
physical.
• Designing Azure landing zone based on the assessments and best practices as per the Cloud
Adoption Framework.
Key Highlights:
➢ Performed Assessment for multiple customers and developed a roadmap to migrate their
environment to Azure.
➢ Performed Migration for 1000+ VMs to Azure for verticals like Food, Petroleum Industry and
Government Entities.
➢ Designed and Implemented end-to-end migration using CAF for government entities like Qatar.
➢ Migration specialist on –premise workloads to Azure through Lift and Shift using Azure Migrate,
ASR other 3rd Party Migration tools based on Client requirement.
➢ Implemented Hybrid Networking model for multiple government entities.
Certifications:
✓ Microsoft Azure Architect Technologies AZ-300
✓ Microsoft Azure Security Technologies AZ-500
✓ Microsoft Azure Administrator AZ-103
✓ Google Cloud Certified Architect
Senior Engineer-Azure
Page | 81
Executive Summary:
Around 5 plus year’s hands-on experience on Microsoft Azure Infrastructure Solutions.
Plan and Develop roadmaps and deliverables to advance the migration of existing on premise
systems/applications to Azure cloud.
Good understanding about the Azure lift and shift migrations with various source environment like
VMware, Hyper- V, Physical servers and Other Clouds.
Key Highlights:
➢ Responsible for end-to-end Assessment and Migration of workloads for one of the core
government agency project in Qatar consisting of 40 workloads consisting of 800+ servers
residing on multiple platforms like Hyper-V ,VMware and physical .
➢ Designed and Implemented Complex Network and Security solutions In compliance with
Government of Qatar.
➢ Performed Assessments and Migrations for multiple projects in various locations like Singapore
with Huge workloads.
➢ Provided redundancy storage solution for critical workloads for multiple projects in Singapore
and Qatar locations.
Certifications:
✓ Microsoft Azure Architect Technologies AZ-300
✓ Microsoft Azure – 70-533
✓ Microsoft Azure Administrator AZ-103
✓ Google Cloud Certified Engineer
✓ Red Hat Certified System Administrator
✓ External ITIL certification
Page | 82
Cancellation fee for Reserved Instances is 12% with maximum refund of $ 50,000 per
11
customer.
12 Internet bandwith management and sizing out of Cloud4C scope
13 MPLS and SD-WAN management and SLAs out of Cloud4C scope
Customer by asking for this estimate, agrees to below
Acceptance to Microsoft Customer Agreement:
14
https://www.microsoft.com/licensing/docs/customeragreement
Azure Privacy statement: https://privacy.microsoft.com/en-ca/privacystatement
15 Other terms and conditions as per Cloud4C MSA, SLA and AUP
INTELLIGENT CLOUD MANAGED SERVICES POWERED BY AIOPS driven SHOP Platform which
helps in Reduced Event Noise, Predictive Alerting, Probable Cause Analysis and Intelligent Capacity
Management
As more businesses embrace hybrid cloud environments and adopt leading-edge technologies, IT
Operations become complex and data voluminous. IT Operations teams need to keep up with this pace.
Organizations need to innovate and find ways to free up skilled personnel for strategic projects rather
than focusing on mundane tasks.
Cloud4C SHOP platform leverages big data, Machine learning, and Analytics to help IT Operations
teams predict, find, and fix issues faster.
Self Healing Operations Platform (SHOP)
Automation Platform Driving Industry Leading Services delivered Through Multiple Products
SHOP DLx
6K SAP SIDs Central Reporting
SHOP MCx
Systems Built Data Aggregation Cloud
Pvt Cloud
Archive (historical)
Colo
SHOP SOx Hyper Scalers
DevSecOps
Threat – Detection and Analytics
Cloud4C SHOP : Self- healing operations platform is automated platform delivery system which is based
on various industry and vertical standards. This is our core managed service module which does
automated cloud-ops, sysops, dev-ops and other automation
Platform-based Application Managed Service Provider that is focused on managing Cloud and
applications, and providing highest SLAs in the industry
Achieved through implementation of innovation in processes, automation initiatives and millions of lines
of codes
Automated Command Center
Page | 83
• Fully automated command center
• Single pane of glass operations - customized based on the application platform supported
Minimum Human Touch
✓ Self-healing operations command and control to handle issues through auto remediation
✓ End to end automation being executed from alert generation to incident management
SOP and service request
Service Request automation through Standard Operating Procedures (SOP) executed by backend
platform or BOTs depending on the use case
Service Requests mapped to a SOP to minimize resolution time and provide high quality and consistent
Service Delivery
Page | 84
• With UCP, Deep understanding of Crescent cloud bills
• Our UCP is a subset of our SHOP platform helps customer maximize RoI
• In addition to our home grown UCP, we usually can integrate with 3rd party CMP often as needed
to ensure customers get the data and visibility they demand
Our CoE for Azure Managed Services at Cloud4C manages the tasks and processes required to support
Customer business applications hosted on Azure and the resources that support them. We enable and
customize many Azure services and tools that work together to provide complete management for
Customer.
Customer does not need to completely re-architect applications to get the full value out of Azure.
Cloud4C can identify high-impact areas to focus on so that Customer can migrate quickly and with the
greatest benefit.
Page | 85
Support Services 24 x 7
Below is a comprehensive list of Managed services on Azure platform. The services will be applicable as
per customer subscribed services Solution.
Page | 86
File Storage - Azure File Storage allows applications to mount file
4 shares from anywhere in the world, your on-premises applications R,A I
can take advantage of cloud storage without change.
Data lake Storage G2 - Used when customer is using Big data
5 C,I R,A
analytics
6 Firewall on Storage Account for Network Restriction (If Needed) R,A C,I
7 Private Storage Account (Private link Configuration)(If Needed) R,A C,I
Storage-Replication Types
Local Redundant storage (LRS) - blob storage account with Hot /
R,A C,I
cold access tier
Zone Redundant storage (ZRS) - blob storage account with Hot /
R,A C,I
cold access tier- not available in all regions
Global Redundant storage (GRS) - blob storage account with Hot /
R,A C,I
cold access tier
Read access (GRS) RA-GRS - blob storage account with Hot
R,A C,I
access tier
Page | 87
Azure Monitor
1 Create, view, and manage metric alerts using Azure Monitor R,A C,I
2 Metric alerts with dynamic thresholds R,A C,I
3 Configure metric alerts on logs R,A C,I
4 Configure alerts on analytic query R,A C,I
5 Troubleshooting log alerts R,A,C I
6 Alerts from operations manager ( if SCOM is configured ) R,A C,I
Critical 90%
Page | 88
9.3 OS Managed Services
Windows Server Service Catalog
Page | 89
ENT-WRAM1.100 Windows Server Remote Access Management. ✓
ENT-WRAM1.101 Enabling Remote Desktop ✓
ENT-WRAM1.102 Disable Remote Desktop ✓
ENT-WDDM1.100 Windows Server Device Drivers Management
ENT-WDDM1.101 Installation of Device Drivers. ✓
ENT-WDDM1.102 Modification of Device Drivers ✓
ENT-WDDM1.103 Removal of Device Drivers ✓
ENT-WSUM1.100 Windows Server User Management
ENT-WSUM1.101 Create/Modify/Delete Users ✓
ENT-WSUM1.102 Create/Modify/Delete Groups ✓
ENT-WSUM1.103 Reset Password/Un-Lock Users ✓
ENT-WSPM1.100 Windows Server Problem Management ✓
ENT-WSCM1.100 Windows Server Change Management ✓
ENT-WSIM1.100 Windows Server Incident Management ✓
Permitted Support tickets (Service Requests/Change Management)
ENT-WTIK1.100 for server /Month 5
24 H x 7
ENT-WSCO1.100 Support service coverage D/W
Page | 90
ENT-RISC.103.16 Log rotation configure ✓
ENT-RISC.103.17 LDAP configuration ✓
ENT-RISC.103.18 NFS shares ✓
ENT-WMSP1.100 Monitoring of Server Performance ✓
ENT-WSEC.100 Server Security Management
ENT-WSEC.101 Security Processes - User and Group Management ✓
ENT-WSEC.102 IP Tables Configuration ✓
ENT-WSEC.103 Security Patches and Hot Fixes ✓
ENT-WSEC.107 Audit Logging ✓
ENT-WSEC.109 Time Zone Setting ✓
ENT-WSEC.110 Event log setting ✓
ENT-WDM1.100 Linux Server Disk Management
Configuring disks and volumes includes creating Logical, Volume groups & ✓
ENT-WDM1.101 physical volume
ENT-WDLO1.100 Linux Server Kdump & Log analysis ✓
ENT-WSTM1.100 Linux Scheduled Tasks Management ✓
ENT-WRAM1.101 Cron & at ✓
ENT-WSUM1.100 Linux Server User Management
ENT-WSUM1.101 Create/Modify/Delete Users ✓
ENT-WSUM1.102 Create/Modify/Delete Groups ✓
ENT-WSUM1.103 Reset Password/Un-Lock Users ✓
ENT-USM1.106 Best effort support on Community Editions (Cent OS / Ubuntu) ✓
ENT-USM1.107 OS default Cluster Management (Pacemaker) ✓
ENT-USM1.108 Integration of Centralized Authentication Services (LDAP etc) ✓
ENT-USM1.109 Install & Configure Application services (Apache/Tomcat/JBOSS, etc) ✓
ENT-USM1.110 Disable Unnecessary OS services / Packages ✓
ENT-USM1.111 Incident Management ✓
ENT-USM1.112 Change Management ✓
ENT-USM1.113 Problem Management ✓
ENT-USM1.114 Performance Tuning ✓
ENT-USM1.115 Quarterly OS Patching (Maintain N-1 update) ✓
ENT-USM1.116 DNS configuration at OS Layer ✓
ENT-USM1.119 Fix Vulnerabilities as per VA scan ✓
Permitted Support tickets (Service Requests/Change Management) for >10 &
ENT-USM1.120
server /Month <20
ENT-USM1.121 Support service coverage 24x7
ENT-USM1.111 Incident Management ✓
ENT-USM1.112 Change Management ✓
ENT-USM1.113 Problem Management ✓
ENT-USM1.114 Performance Tuning ✓
ENT-USM1.115 Quarterly OS Patching (Maintain N-1 update) ✓
ENT-USM1.116 DNS configuration at OS Layer ✓
ENT-USM1.119 Fix Vulnerabilities as per VA scan ✓
Permitted Support tickets (Service Requests/Change Management) for >10 &
ENT-USM1.120
server /Month <20
ENT-USM1.121 Support service coverage 24x7
Page | 91
9.4 Network Managed Services
Virtual Network
1 Create Network Space with CIDR Block (Region Specific) R,A C,I
2 Create Address Space (to be non-conflicting with customer range if any) R,A C,I
3 Creating Vnet and Subnet R,A C,I
4 Deleting Vnet and Subnet R,A C,I
5 Delete Address Space R,A C,I
6 Associating IP to Host R,A C,I
7 Changing the IP Address of Device R,A C,I
8 Deleting the connected Device (If VM Deleted) R,A C,I
9 Adding/Changing DNS configuration on VNet R,A C,I
10 Associate / Dissociate NSG on VNet R,A C,I
Public IP Address
1 Reserve Static Public IP for host R,A C,I
2 Associate the Public IP to Host (Created VM) R,A C,I
3 Change Public IP for Host R,A C,I
4 Dissociate public IP from Host R,A C,I
5 Delete public IP R,A C,I
Page | 92
Network Interface
1 Create Network Interface with static IP assigned R,A C,I
2 Associate / Dissociate IP R,A C,I
3 Deleting Network Interface R,A C,I
4 Associate / Dissociate Network Interface R,A C,I
5 Associate / Dissociate Subnet R,A C,I
Commvault
1 Provision MAS Server & establish trust with CommServe R,A C,I
2 Backup license allocation as per BOQ R,A C,I
3 Provision Blob Storage as per requirements R,A C,I
4 Connect Blob to MAS & enable encryption R,A C,I
5 Establish Backup Network in Management zone R,A C,I
6 Backup Policy template Configuration R,A C,I
7 Backup agent installation in Client servers R,A R,C,
8 Agent-less VM Protection (Virtual Server Agent) R,A C,I
10 Scheduling of the backups R,A C,I
11 Storage policies / retention policy R,A C,I
12 Failure alert configuration R,A C,I
13 Monitor/Manually Trigger halted Backup R,A C,I
14 Policy Documentation R,A R,C,
15 Backup Summary Report R,A C,I
16 Capacity planning based on Retention, Frequency and Size R,A R,C,
18 Adhoc Backup Requests under ECR R,A C,I
Page | 93
9.6 Azure Sentinel SIEM Service
Cloud4C shall leverage the Azure Sentinel Security Incident and Event Management (SIEM) technology
for monitoring and alerting. This technology provides the automated collection and analysis of log data
from security devices, including firewalls, intrusion detection systems, and critical hosts and applications.
Cloud4C team will be only monitoring and collecting the security logs and will forward the same to
Crescent SOC team for further investigation.
Page | 94
Agent installation on servers
Integration of virtual machines with sentinel
Integration of network devices & security solutions with sentinel
Automation
Azure Playbook configuration
Rule creation
Playbook attachment
Azure Rule trigger and Playbook testing
Workbook creation for security products
Configure tools and log ingression of following services (as per
Scope agreed)
Active Directory Federation Services (ADFS)
Azure Activity Directory (AD) activity logs
Azure AD Identity Protection alerts
Azure Advanced Threat Protection (ATP) alerts
Azure Information Protection (AIP) alerts
Azure Key Vault logs
Azure Security Center (ASC) alerts
Business critical applications
Connect external solutions via agent
Microsoft Cloud App Security (MCAS) alerts R,A C
Network Security Group (NSG) logs
Azure Monitor
Azure Resource Group.
Azure Log Analytics workspace.
Azure Sentinel RBAC model.
Azure Sentinel Data Connectors.
Windows and/or Linux servers.
CEF and/or Syslog Servers.
Azure Sentinel Automation using Azure Playbooks.
Azure Sentinel Workbooks.
Azure Lighthouse, if deploying the remote monitoring
Page | 95
RACI for DR Azure Platform
Services Cloud4C ADC
• Provisioning Services on Azure Public Cloud Platform [As per
R,A I
Product and Services Matrix]
• Operating System Build RA I
• Database Migration (Oracle, HANA, ASE, MS SQL) RA I
• Provisioning Services (Network, OS, Database, Backup, Monitoring
R,A I
and Security Tools)
• Installation of Application C,I R,A
• Configuration and Customisation of application and Databases C,I R,A
• Disaster Recovery Site Creation using identified tools (RSYNC,
R,A
HSR, Log Shipping, Export Import) C,I
• Security & Compliance Services R,A C,I
• Functional Application Support I R,A
• Infrastructure Audits Support R,A I
• Compliance Certification for deployed infrastructure C,I R,A
• Cloud Platform Support R,A I
Cloud4C offers compliance ready, SLA based RPO/RTO for the applications on our Cloud Platform
/ Hyperscaler. It is a comprehensive offering which can handle the most diversified set of
applications & systems with end-to-end ownership during the toughest times of disaster with pay
as you go model.
Page | 96
Below is an example of DR RACI during an ongoing DR Project
Page | 97
Formulation of Primary DR Strategy document along with BIA & RA R, A R,A N,A
Page | 98
Operations support to planned annual tests (refer to the contract): N,A
R,A C,I
- Provide support to recover critical applications N,A
- Restore O.S. and applications on the recovery site N,A
Review and update the Disaster Recovery Plan for Applications. C,I R,A N,A
Provide a report of the test results following each test R,A C,I N,A
Standard Disaster Recovery
Review and update the Disaster Recovery Plan annually. R,A R,A N,A
Provide recovery priorities and time requirements C,I R,A N,A
Test the Disaster Recovery Plan C,I R,A N,A
Restitution of data for environments included in the “ usiness
R,A C,I N,A
Recovery services” service.
Provide a report of the test results following each test R,A C,I N,A
Develop and maintain the Disaster Recovery Plan for Application &
R,A C,I N,A
Database connectivity and recovery in the event of a disaster
Point to Point Connectivity
Assessment of existing MPLS connectivity R,A C I
Recommendations of MPLS connectivity to Azure with Best
R,A C I
Practices
Discussion and Finalization of MPLS Network level changes at ADC
I R,A C
On-prem site with ISP
Final review of MPLS Network Connectivity Design C,I R,A C,I
Procurement, Deployment & Configuration of MPLS connectivity at
I R,A C
ADC On-prem site
Procurement, Deployment & Configuration of MPLS connectivity at
R,A C I
ADC Azure site
Each individual component of the service is interoperable and is used to deliver an overall service
availability to maintain committed SLA.
Type of
ENT-SAP1-PM SAP Monitoring Services Task
ENT-SAP1.PM1 Monitor SAP System log ✓
ENT-SAP1.PM2 Monitor failed updates ✓
ENT-SAP1.PM3 Monitor RFC errors ✓
ENT-SAP1.PM4 Monitor stale locks and analysis of lock ✓
ENT-SAP1.PM5 Monitor audit log ✓
ENT-SAP1.PM6 Monitor System dumps ✓
ENT-SAP1.PM7 Monitoring of work process ✓
Page | 99
ENT-SAP1.PM8 Validate successful Backup runs ✓
ENT-SAP1.PM9 Monitoring of operating system activity on CPU utilization ✓
ENT- ✓
SAP1.PM10 Monitor the “ p/ Down” status of SAP instances
ENT- ✓
SAP1.PM11 Monitor processes for in-scope SAP, Bolt-ons
ENT- ✓
SAP1.PM12 Monitor SAP print queue
ENT- ✓
SAP1.PM13 Monitor and respond to critical CCMS alerts
ENT- ✓
SAP1.PM14 Monitor Application performance
ENT- ✓
SAP1.PM15 Monitor overall Dialog Response
ENT- ✓
SAP1.PM16 Monitor the top critical business Transactions
ENT- ✓
SAP1.PM17 Monitor systems proactively for Response Time and CPU Utilization
Pre-Requisite ✓
1 EWA report without any Red Flag
Completion of SAP Solution Manager Monitoring Configuration &
2 Monitoring Level Access
3 Alert Configuration to Cloud4C Monitoring ID’s from Solution Manager
4 SAP Cockpit configuration completion from Customer end.
Page | 100
ENT-SAP1.120 Monitor the top critical business Transactions ✓
✓
ENT-SAP1.121 Monitor systems proactively for Response Time and CPU Utilization
✓
ENT-SAP1.129 Resolve Application and Configuration issues to transport errors
ENT-SAP1.130 Standard Reporting (Predefined & agreed Format with the customer ) ✓
✓
Optimize SAP system (system tuning) using pro-active monitoring,
ENT-SAP1.143 planning, scheduling early watch and implementing EWA
recommendations from Technical operations perspective
✓
ENT-SAP1.144 Provide application performance analysis (e.g. ABAP)
Basic SAP
Apps
ENT-SAP1.145 Support application team in resolution of app. performance problems troubleshot
support
Page | 101
Track , execute and resolve any issues related to Transport Requests ✓
ENT-SAP1.146
from Application Groups
✓
ENT-SAP1.147 Follow-up Basis OSS messages to closure
Page | 102
Implement / maintain additional SAP tools (e.g. SAP HANA Analytics ✓
ENT-HANA DB21 Foundation Browser)
Identify, analyse and optimize expensive SQL-statements to improve ✓
ENT-HANA DB22 application performance
System troubleshooting, e.g. blocked transactions, to overcome issues and ✓
ENT-HANA DB23 bring SAP HANA back to normal state of operations
ENT-HANA DB24 Create/modify users for HANA modelling in the SAP HANA Studio ✓
ENT-HANA DB25 User, roles and permissions management for non-technical users ✓
User, roles and permissions management for technical and administration ✓
ENT-HANA DB26 users
ENT-HANA DB27 Perform database backups (regular full backups and log backups) ✓
ENT-HANA DB28 Restore and recover SAP HANA after technical issues ✓
ENT-HANA DB29 dbcc (database consistency check) ✓
Implement SAP HANA database encryption on SAP HANA database
X
ENT-HANA DB30 already installed
ENT-HANA DB31 Operate encrypted HANA database ✓
Page | 103
ENT-MaxDB1.106 Scheduling Updates of the SQL Optimizer Statistics ✓
ENT-MaxDB1.107 Scheduling a Database Structure Check ✓
ENT-MaxDB1.108 Increase Data/Log Area when required ✓
ENT-MaxDB1.109 Set Database Parameters when applicable ✓
ENT-MaxDB1.110 Monitoring Data & Log Area ✓
ENT-MaxDB1.111 Monitoring accesses to Caches ✓
ENT-MaxDB1.112 Monitoring backups ✓
ENT-MaxDB1.113 Monitoring database activities using the Activities Overview ✓
ENT-MaxDB1.114 Monitoring the number of database sessions ✓
ENT-MaxDB1.115 Creating Backup Templates ✓
ENT-MaxDB1.116 Scheduling Data Backups and Log Backups ✓
ENT-MaxDB1.117 Checking the backup actions ✓
ENT-MaxDB1.118 Executing Performance Analysis in CCMS ✓
ENT-MaxDB1.119 Check the existing backups ✓
ENT-MaxDB1.120 Restore a database when required ✓
ENT-MaxDB1.121 Troubleshooting ✓
ENT-MaxDB1.122 Start/stop database ✓
ENT-MaxDB1.123 Perform upgrades of database software (Once per year) ✓
ENT-MaxDB1.124 Apply database patches (Twice per year) ✓
10References
Reference: - 1
Page | 104
Requirements:
• Mashreq required to move from their on-premises
DC’s to Cloud and Microsoft A ure was chosen as the
preferred cloud platform
• Customer was looking out for a reliable partner with a
strong experience in migrating and running mission
critical banking workloads
• Strict Compliance and Security standards had to be
met as per industry and country regulations
• Maintaining security standards and business continuity
Solution Approach :
Migrating 243 business applications and 1500 VMs
• Enabling complete migration in 18 months across 6
phases
• Migration of On premise Datacenter to Azure cloud
environment
• Migrating UAE and Non-UAE data across multiple
applications, and across countries
Narrative description of
Security and compliance
scope of consulting (provide
specific details regarding • Adhering to the major regulatory requirements for
Managed support services & banking industry
consulting experience • Identifying gaps across multiple technologies and
making recommendations
Out Comes:
• 99.95% application uptime
• Phase-wise migration with minimal disruption to BAU
• Enhanced Security & Compliance with banking
ready frameworks
Reference: - 2
Page | 105
Cloud4C account manager will facilitate the customer contact
details for any reference call post request from DIB
Start date and End Date 2021
Current status ( if work in
In Progress
progress/completed)
Contract Tenure Initial 12 Months + Ongoing support
Size of team engaged in
4
UAE
Name of the associated
Not Applicable
partners, if any
Since it’s an outcome driven model based on agreed SLA’s
Size of team engaged
Cloud4C has proposed a pool of resources to be operating
outside UAE
from our offshore center of excellence
Order value of the Largest
similar scope project (in AED TBS
millions annual)
Senior Program Manager, Project Manager, Azure Architect,
Details of the staff involved Security Architect, Azure Engineers, Database consultants,
Backup Engineer, Monitoring agents
Page | 106
• Azure Advanced Networking: assess, plan, and
build/remediate Azure Advanced Networking
components that support migration activities.
Azure IaaS Management: following migration, configuration
of Azure native services to assist with the monitoring, backup,
update management, and virtual machine replication for
disaster recovery of Azure IaaS environments
Reference: - 3
Page | 107
Proposed Solution:
• Azure Micro Services enabled cloud
• Azure Certified Solution Architect
• Compliant to an ’s uptime and CP requirement
• Well Architected expandable Solution on Azure
• Auto Scaling – Resource Minimization
• Enabling Continuous Compliance
▪ Secure landing zone for enterprise banking application
based on Azure best practice guidelines
▪ Hub and Spoke deployment model with centralized
management and governance
▪ Hybrid connectivity for private and internet-based
access to the applications
▪ Solution optimized to leverage Azure platform native
services
Reference: - 4
Page | 108
Solution
Migrating 95 business applications on Azure
❖ Migration of Complex applications built on different
technologies by different vendors
❖ Business Impact assessment and solutioning
❖ Legacy systems
On premises exchange mailbox migration to Office 365
Seamless migration of users
Reference: - 5
Page | 109
Program Governance: establish an Azure migration program
to discover, assess, plan, and migrate servers to Azure.
Azure Migration Services: migration services that will be
used to perform the following migration strategies:
• Rapid Server Migration: Tool-based migration by
servers or subnet with no application dependency
mapping
• Application Migration: Tool-based migration by
application guided by an application migration plan.
• Assessment Only: Assess servers and application
and jointly assign them to a strategy that is beyond the
scope of the program.
Migration Support Services: The following services support
the above Azure Migration Services, Customer-led
migrations.
• Architecture Review: Azure infrastructure
architecture review of virtual machine and storage
sizing, resiliency and scalability, and service
availability in target Azure region(s).
• Infrastructure Provisioning: Infrastructure-as-Code
(IaC) provisioning using ARM Templates or Terraform
• Database Migration: planning and migration of
Microsoft SQL, Oracle, MySQL, Sybase, DB2,
PostgreSQL, or NoSQL databases to Azure
IaaS/PaaS as appropriate for the platform and
migration strategy
• Azure Advanced Networking: assess, plan, and
build/remediate Azure Advanced Networking
components that support migration activities.
Azure IaaS Management: following migration, configuration
of Azure native services to assist with the monitoring, backup,
update management, and virtual machine replication for
disaster recovery of Azure IaaS environments
11Conclusion
Cloud4C looks forward to working with ADC and supporting your efforts for Cloud journey.
Cloud4C is confident that we can meet the challenges ahead and stand ready to partner with you in
delivering & managing this Azure setup. Cloud4C is a trusted digital transformation partner for fortune
500 companies. We have strong Enterprise customers leveraging our expertise on Azure platform.
If you have questions on this proposal, feel free to get in touch with us at your convenience.
Thank you for your consideration & business
Page | 110