This curriculum spans the technical, operational, and governance dimensions of cloud migration with a scope and granularity comparable to a multi-workshop architecture review and remediation program conducted during an enterprise advisory engagement.
Module 1: Defining Migration Scope and Application Rationalization
- Decide which applications to rehost, refactor, retire, or replace based on business criticality, technical debt, and integration dependencies.
- Conduct workload dependency mapping using network flow analysis and application discovery tools to avoid breaking interdependent systems.
- Establish criteria for excluding legacy systems with incompatible architectures or unpatched vulnerabilities from migration.
- Negotiate ownership and timelines with business unit leaders whose applications are slated for retirement or consolidation.
- Document technical constraints such as unsupported operating systems or proprietary hardware dependencies that prevent lift-and-shift.
- Validate licensing models for third-party software to avoid cost overruns or compliance violations in cloud environments.
Module 2: Cloud Architecture and Design Patterns
- Select between multi-AZ and multi-region deployment based on RTO/RPO requirements and data residency regulations.
- Implement VPC design with segmentation for production, non-production, and DMZ workloads using shared services or transit gateway models.
- Choose between monolithic migration and microservices refactoring based on team capability, CI/CD maturity, and long-term support costs.
- Design data egress strategies to minimize cross-AZ and cross-region bandwidth charges in public cloud billing models.
- Integrate edge computing patterns for latency-sensitive applications instead of full cloud relocation.
- Define naming conventions and tagging policies that align with cost allocation, security, and automation requirements.
Module 3: Identity, Access, and Privilege Management
- Map on-premises Active Directory groups to cloud IAM roles using attribute-based or claim-based federation.
- Enforce least privilege by analyzing historical access logs and pruning excessive permissions before migration.
- Implement just-in-time (JIT) access for administrative functions using privileged access management (PAM) tools.
- Design service account governance to prevent long-lived credentials and enforce rotation policies.
- Integrate multi-factor authentication (MFA) enforcement at the identity provider level for all cloud console access.
- Establish cross-account IAM trust relationships with boundary policies to limit lateral movement in multi-account structures.
Module 4: Data Migration and Storage Strategy
- Select between online and offline data transfer methods based on data volume, network bandwidth, and downtime tolerance.
- Classify data by sensitivity and apply encryption at rest using customer-managed or cloud provider keys (CMK vs KMS).
- Define retention and archival rules for migrated data using lifecycle policies aligned with legal hold requirements.
- Migrate database workloads using native replication tools (e.g., AWS DMS, Azure Database Migration Service) with cutover validation checkpoints.
- Reconcile referential integrity after data migration when source and target schemas diverge.
- Implement storage tiering strategies (e.g., S3 Standard vs Glacier, Premium vs Standard SSD) based on access frequency and cost targets.
Module 5: Network and Connectivity Engineering
- Provision high-throughput connections (e.g., AWS Direct Connect, Azure ExpressRoute) with redundant paths and SLA-backed uptime.
- Configure DNS failover and split-horizon DNS to support phased cutover and hybrid resolution during transition.
- Implement firewall rules and security groups to restrict east-west traffic between migrated and on-premises systems.
- Size and deploy load balancers with health checks tuned to application-specific endpoints and response thresholds.
- Optimize MTU and TCP window scaling for high-latency WAN links between data centers and cloud regions.
- Monitor and baseline network performance pre- and post-migration to detect throughput degradation or packet loss.
Module 6: Security, Compliance, and Risk Posture
- Conduct cloud security posture management (CSPM) scans pre-migration to remediate misconfigurations in target environments.
- Map existing regulatory controls (e.g., HIPAA, PCI-DSS) to cloud-native services and shared responsibility model boundaries.
- Implement centralized logging with immutable storage for audit trails using cloud-native services (e.g., CloudTrail, Azure Monitor).
- Perform penetration testing on migrated workloads under cloud provider authorization policies.
- Define incident response playbooks that incorporate cloud-specific artifacts such as API call logs and console access events.
- Enforce encryption in transit using TLS 1.2+ and certificate management integrated with private CAs or public PKI.
Module 7: Operational Readiness and Monitoring
- Deploy monitoring agents and configure alerts for CPU, memory, disk I/O, and application-specific metrics in cloud environments.
- Integrate cloud-native logging with existing SIEM systems using structured ingestion pipelines and parsing rules.
- Test backup and restore procedures for cloud-native storage and databases using point-in-time recovery.
- Validate disaster recovery runbooks with failover simulations that include DNS and data replication components.
- Train L1/L2 support teams on cloud console navigation, log querying, and incident triage workflows.
- Establish cost anomaly detection using budget alerts and tagging compliance checks to prevent uncontrolled spending.
Module 8: Governance, FinOps, and Continuous Optimization
- Implement chargeback or showback models using resource tagging to allocate cloud costs to business units.
- Conduct monthly cost reviews to identify underutilized instances, orphaned storage, and idle resources.
- Standardize deployment templates using Infrastructure as Code (IaC) to enforce policy and reduce configuration drift.
- Enforce policy-as-code using tools like AWS Config, Azure Policy, or HashiCorp Sentinel in CI/CD pipelines.
- Negotiate reserved instance or savings plan commitments based on stable workload baselines and utilization forecasts.
- Establish feedback loops between operations, finance, and architecture teams to refine resource allocation and scaling policies.