Issue link: https://insights.oneneck.com/i/1200933
Hybrid IT For Dummies, HPE Special Edition 28 These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Plus, as workloads, which are prime candidates for the cloud, continue to rise, there may be a sense of loss of control from internal IT as a service provider assumes responsibility for certain functions. It can be a frustrating state, particularly when cloud‐based workloads become unavailable. In these scenarios, IT is largely on the sidelines as they await return to service from the provider. It's an uncomfortable and unfamiliar place for IT professionals, who, with on‐premises infrastructure failure, can jump right into action themselves. Getting Clarity on Each Group's Role As you work through the appropriate location for each of your individual workloads, you'll also need to determine who is going to handle individual aspects of that workload. For the on‐premises side of your hybrid IT environment, this is pretty much business as usual. Your internal IT team will likely handle most things, including ongoing management, software updates, data protection, and disaster recovery. However, for your cloud‐based workloads, you'll need to spend a bit more time figuring all this out. You may decide that your in‐house IT staff are going to handle general applica- tion administration for a particular workload, but you're going to ask the provider to handle the data protection and disaster recovery responsibilities. With hybrid IT, you gain far more opportunity to assign roles in a granular fashion, enabling you to play to strengths instead of having to cover for weakness when you don't have sufficient internal skills. Getting the role clarity part nailed down is really important. Any ambiguity here can result in extended downtime as inter- nal IT and provider staff attempt to clarify who is supposed to be handling things. Resolving Cloud Security Myths We can't talk about workload control without discussing enduring cloud security myths. There are two diametrically opposed schools of thought when it comes to cloud security.