This curriculum spans the technical and operational rigor of a multi-workshop cloud migration engagement, addressing infrastructure assessment, identity integration, hybrid networking, and compliance governance with the depth seen in enterprise advisory programs.
Module 1: Assessing On-Premises Infrastructure for IaaS Migration
- Conducting hardware lifecycle analysis to determine which physical servers are candidates for lift-and-shift versus refactoring.
- Evaluating application dependencies using network flow monitoring tools to map inter-service communication before migration.
- Classifying workloads by criticality, compliance requirements, and recovery time objectives to prioritize migration sequencing.
- Deciding whether to retain legacy identity systems or integrate with cloud-native directory services during discovery.
- Documenting existing backup and disaster recovery configurations to align with cloud storage tier strategies.
- Identifying non-x86 architectures (e.g., mainframe, Power Systems) that require specialized migration paths or emulation.
Module 2: Cloud Provider Selection and Account Architecture
- Comparing SLA terms for compute availability, network egress, and storage durability across AWS, Azure, and GCP for mission-critical systems.
- Designing multi-account structures using organizational units to enforce billing separation, security boundaries, and access delegation.
- Implementing centralized logging and configuration auditing using native tools (e.g., AWS Organizations with AWS Control Tower).
- Negotiating enterprise agreements that include reserved instance commitments while maintaining flexibility for burst workloads.
- Establishing DNS and domain management strategies that support hybrid resolution during phased migrations.
- Defining tagging standards across subscriptions and projects to enable cost allocation and resource ownership tracking.
Module 3: Network Design and Hybrid Connectivity
- Planning VPC/VNet CIDR block allocation to avoid IP conflicts with on-premises networks and support future expansion.
- Selecting between IPsec VPN and dedicated private connections (e.g., AWS Direct Connect, Azure ExpressRoute) based on latency and throughput needs.
- Configuring route tables and network gateways to enable asymmetric routing patterns in hybrid environments.
- Implementing DNS forwarding rules to resolve on-premises resources from cloud VMs and vice versa.
- Enforcing segmentation using NSGs, firewalls, and routing policies to isolate development, production, and management subnets.
- Validating failover behavior of hybrid routing protocols during network outages using controlled disruption testing.
Module 4: Compute and Storage Migration Strategies
- Choosing between agent-based (e.g., Azure Migrate, AWS Server Migration Service) and agentless replication tools based on OS support and performance impact.
- Converting physical disks to VHD/VMDK formats while preserving partition alignment and boot configurations.
- Sizing target VM instances using performance baselines, considering vCPU-to-memory ratios and burstable versus sustained workloads.
- Migrating stateful applications by coordinating storage snapshots with application quiescence procedures.
- Reconciling storage performance differences between local SAN and cloud block storage (e.g., IOPS, latency) through caching or tiering.
- Handling large datasets by staging data via offline methods (e.g., AWS Snowball, Azure Data Box) to reduce transfer time and cost.
Module 5: Identity, Access, and Security Governance
- Integrating on-premises Active Directory with cloud identity providers using federation or AD DS extensions (e.g., AWS Directory Service).
- Implementing least-privilege IAM policies that map to existing role-based access control models without over-permissioning.
- Enabling just-in-time (JIT) access for administrative VMs using privileged access management solutions.
- Configuring host-based firewall rules on migrated instances to align with zero-trust network principles.
- Managing SSH key rotation and Windows local administrator password policies across hundreds of cloud instances.
- Enforcing encryption of OS and data disks at rest using customer-managed keys and validating key rotation procedures.
Module 6: Operational Continuity and Monitoring
- Reconfiguring on-premises monitoring agents to report to cloud-based observability platforms (e.g., Datadog, Azure Monitor).
- Defining alert thresholds for CPU, memory, and disk that account for cloud instance variability and auto-scaling behavior.
- Integrating cloud logs with existing SIEM systems using ingestion pipelines that preserve event timestamps and source context.
- Updating runbooks to reflect cloud-specific failure modes, such as host decommissioning and zone outages.
- Automating VM patching using cloud-native tools (e.g., AWS Systems Manager, Azure Update Management) with maintenance windows.
- Validating backup consistency by restoring application VMs to isolated environments and verifying data integrity.
Module 7: Cost Management and Optimization
- Right-sizing underutilized instances by analyzing CloudWatch or Azure Monitor metrics over 30-day periods.
- Implementing automated start/stop schedules for non-production workloads using tagging and scheduler functions.
- Evaluating the total cost of ownership for reserved instances versus savings plans, including renewal and change fees.
- Monitoring storage sprawl by identifying unattached disks and snapshots older than retention policies.
- Setting up budget alerts with actionable thresholds that trigger operations team notifications and auto-remediation.
- Optimizing data transfer costs by relocating workloads to regions that minimize cross-AZ and egress charges.
Module 8: Governance, Compliance, and Audit Readiness
- Mapping existing regulatory controls (e.g., HIPAA, GDPR) to cloud provider compliance certifications and shared responsibility model boundaries.
- Configuring policy-as-code frameworks (e.g., AWS Config, Azure Policy) to enforce encryption, tagging, and region constraints.
- Documenting data residency requirements and restricting resource deployment to approved geographic regions.
- Preparing for external audits by generating evidence packages from cloud logging and configuration history.
- Implementing immutable logging for administrative actions using write-once storage and access logging.
- Reviewing third-party SaaS integrations for compliance with corporate data handling policies before enabling in cloud environments.