By Joaquin Gamboa and Marc Lindsey
Cloud computing cannot solve every information and communications technology need, but it offers benefits to enterprises that have a practical understanding of its risks and how to manage those risks. The benefits of cloud computing done right include: * Easier, quicker and cheaper implementations;
* Faster transitions to new technology (due to shorter time-to-launch);
* Lower total usage costs when the right pricing tiers are selected (because the customer does not have to buy and deploy infrastructure to cover peak demand and expected growth);
* Improved resource elasticity and scalability, which allows customers to scale up or dial down services quickly in response to changes in business demand;
* Improved availability of enterprise applications like unified communications and collaboration services to mobile/remote workers;
* More efficient and effective management of technology resources by vendors with specialized skills; and
* Fewer technology management, maintenance and upgrade headaches (freeing internal IT teams to focus on more strategic initiatives).
Just What is Cloud Computing?
The definition of cloud computing is hazy, in part because many traditional IT vendors are positioning their products in the cloud. To qualify as cloud computing, a service should be:
* Hosted and managed by the vendor at its (or its supplier’s) facilities;
* Made available to customers remotely via an IP-based network (such as the Internet);
* Designed on a shared services/multi-tenant platform;
* Designed to provision resources dynamically and quickly in response to service requests submitted directly by users via automated, online tools;
* Set up to monitor and report usage in near real time; and
* Priced on a subscription basis where actual monitored usage is the dominant pricing variable.
Defining cloud computing is not just an academic exercise. Many of its benefits are available only when all of the characteristics listed above are present. There are three cloud computing service delivery models.
Software as a service ("SaaS")--end users access a standard vendor-developed and managed suite of software applications via a Web browser (e.g., Salesforce.com, WebEx, RightNow);
Platform as a service ("PaaS")--customer application specialists and programmers use a preconfigured computing platform to build and run custom applications within the cloud ecosystem (e.g., Force.com, Microsoft Azure); and
Infrastructure as a service ("IaaS")--customer network engineers obtain commoditized computing resources from the cloud in a manner that allows the customer to install, configure and run customer-provided software applications on the vendor’s infrastructure (e.g., Verizon CaaS, AT&T Synaptic Services, Amazon Web Services, RackSpace, GoGrid).
When enterprises decide to purchase cloud computing services, they face many business, legal and technical challenges. Some of these are common to other technology transactions, but several take on heightened significance in a cloud environment.
Standards
Investments in cloud computing have to be as future-proof as the IT world permits. To do that, enterprise buyers need to minimize dependence on proprietary vendor technology and buy services and systems that are open-standards-based, will operate with other systems they may adopt in the future, and will grow (in capacity and complexity) with the customer's needs. When possible, customers should avoid investing in an extensive set of application program interfaces ("APIs") for critical systems that work with only one cloud vendor's services--that strangles flexibility by tying the customer to a specific vendor.
Performance
From a customer’s perspective, solid service-level guarantees ("SLAs") are essential. Depending on the type of cloud service, key SLAs include those addressing:
* system availability/uptime;
* configuration change timeliness (including availability of newly ordered resources)--particularly for IaaS;
* application response time and transaction throughput--for SaaS;
* management portal/tools availability/uptime;
* incident response and problem-resolution times;
* service desk performance--particularly for end user adoption and satisfaction for SaaS;
* back up data success rate, and data restoration times where the vendor will host the customer’s production data; and
* customer satisfaction (and its importance increases as the deployment in the enterprise widens).
Meaningful SLAs should trigger material service credits when the vendor misses its performance thresholds. And the customer should not have to ask for credits--the vendor should proactively monitor its performance and automatically issue SLA credits when due. Solid SLAs can also be undermined by overly broad exclusions, including procedural hurdles and liability limits hidden in the fine print.
SLA best practices include escalating credits based on the severity, duration and frequency of service failures, and processes like the following to limit the recurrence of service level failures:
* requiring the vendor to conduct a root-cause analysis of service problems and to implement a corrective action plan at no additional cost to the customer;
* requiring the vendor to escalate chronic or critical service-level problems to its own and the customer’s senior management; and
* giving the customer the right to terminate the agreement for cause (or shorten the term) when performance failures reach defined levels.
Security
For good reason, security is often cited as the primary concern for customers considering cloud computing. The vendor’s security management approach and tools should be evaluated closely. Security vulnerabilities in the cloud can be the result of design defects, poor patch/update management, ineffectual authentication controls, storing and/or transmitting sensitive data without encryption, and inadequate procedures for security incident monitoring, reporting and mitigation.
When evaluating security, consider:
(1) how the vendor addressed security in its design; (2) customer references;
(3) the vendor’s track record;
(4) the vendor's physical and logical security practices, processes and management approaches;
(5) the vendor’s commitment to continuously improve security; and
(6) the vendor's compliance (validated by independent third party audits) with recognized information security standards. Negotiate the right to conduct periodic security assessments and to assign responsibility for security incident detection, reporting, response and mitigation, and include a defined path for management escalation of unresolved security problems.
It is also important to be practical. Demanding levels of security that are not justified by actual risks or that far exceed the customer's own internal capabilities will get you little and lead to poor decisions.
Data Governance
If the vendor will handle enterprise data, it should also demonstrate its data protection, disaster recovery and business continuity capabilities. The service agreement must clearly describe the vendor's obligations to protect the customer's data during its entire lifecycle, and the vendor should be liable for failure to do so. Contract clauses that support mature data governance include provisions that:
* Obligate the vendor to comply with the customer's vendor-facing privacy policies;
* State that the customer owns its data, has access to that data at its discretion, and will receive the data upon the expiration or termination of the agreement in a usable/standard format and medium;
* Identify the vendor's data extraction tools, and include the customer's use of them as part of the base scope of services;
* Describe the parties' responsibilities and liabilities for recovering lost or corrupted data;
* Define the countries where the vendor may (or may not) send or house the customer's data; and
* Require the cloud vendor to encrypt sensitive application data while in transit and at rest.
Technical, legal, and business issues face enterprises that want to use public cloud computing. Those that want to enjoy the cloud's benefits with minimum risk address provider lock in, service performance, security and privacy risks by selecting the appropriate service delivery model for each use case and negotiating service agreements (with capable providers) that get them the protections they need.
Joaquin Gamboa (jgamboa@lb3law.com) and Marc Lindsey (mlindsey@lb3law.com) are partners in the law firm of Levine, Blaszak, Block & Boothby, LLP. Joaquin will lead a session on Managed/Hosted UC at Enterprise Connect on Monday, February 28.
via http://www.nojitter.com/feature/229218628?pgno=2