Skip to main content This browser is no longer supported. Show
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Review and compare common cloud operating models
In this articleOperating models are unique and specific to the business they support, based on their current requirements and constraints. But operating models aren't snowflakes. There are several common patterns in customer operating models; this article outlines the four most common patterns. Operating model comparisonThe following image maps common operating models based on the range of complexity, from least complex (decentralized) to most complex (global operations). The following tables compare the same operating models based on the relative value of a few other attributes. Priorities or scopeA cloud operating model is primarily driven by two factors:
Important Adopting the cloud often triggers reflection on the current operating model and might lead to a shift from one common operating model to another. But cloud adoption isn't the only trigger. Business priorities and the scope of cloud adoption can change how the portfolio needs to be supported. Also, there could be other shifts in the most-appropriately aligned operating model. When the board, or other executive teams, develop 5 to 10 year business plans, those plans often include a requirement (explicit or implied) to adjust the operating model. Operating models are a good reference for guiding decisions. These models might change or need to be customized to meet your requirements and constraints. Accountability alignmentMany teams and individuals are responsible for supporting different functions. But each common operating model assigns final accountability for decision outcomes to one team or individual. This approach affects how the operating model is funded and what level of support is provided for each function.
Accelerate operating model implementation in AzureAs discussed in Define your operating model, each methodology of the Cloud Adoption Framework provides a structured path for developing your operating model. These methodologies might help you overcome blockers that stem from gaps in adopting the cloud operating model. The following table outlines ways to accelerate your operating model implementation.
Decentralized operationsOperations are always complex. If you limit the scope of your operations to one workload or a small collection of workloads, you control the complexity. Decentralized operations are the least complex of the common operating models. In this form of operations, all workloads operate independently by dedicated workload teams.
Advantages of decentralized operations
Disadvantages of decentralized operations
Centralized operationsStable state environments might not require focus on the architecture or distinct operational requirements of the individual workloads. Central operations tend to be the norm for technology environments that consist primarily of stable-state workloads. Examples of stable-state operations include things like commercial-off-the-shelf (COTS) applications, or well-established custom applications that have a slow release cadence. If a rate of change is driven by regular updates and patches, the centralization of operations might be an effective way to manage your portfolio.
Advantages of centralized operations
Disadvantages of centralized operations
Enterprise operationsEnterprise operations are the suggested target state for all cloud operations. Enterprise operations balance the need for control and innovation by simplifying decisions and responsibilities. Central IT is replaced by a more facilitative cloud center of excellence or CCoE team, which supports workload teams. The CCoE team, holds workload teams accountable for decisions, as opposed to controlling or limiting their actions. Workload teams are granted more power and more responsibility to drive innovation, within well-defined guardrails.
Advantages of enterprise operations
Disadvantages of enterprise operations
Distributed operationsThe existing operating model might be too engrained for the entire organization to shift to a new operating model. For others, global operations and various compliance requirements might prevent specific business units from making a change. In this case, it might require a distributing operations approach. This approach is by far the most complex, as it requires integrating one or more of the previously mentioned operating models. While heavily discouraged, this operations approach might be required for some organizations. The approach mainly relates to organizations that have a loose collection of disparate business units, a diverse base of customer segments, or regional operations.
Advantages and disadvantages of this approach are purposefully blank. After you complete the business alignment of your portfolio, see the predominant operating model section above for clarity on advantages and disadvantages. Next stepsLearn the terminology associated with operating models. The terminology helps you understand how an operating model fits into the bigger theme of corporate planning. Learn how a landing zone provides the basic building block of any cloud adoption environment. FeedbackSubmit and view feedback for Additional resourcesAdditional resourcesIn this articleWhich pillar defines the purpose of security operations team to the business and how it will be managed?The People pillar defines the humans who will be accomplishing the goals of the security operations team and how they will be managed.
What are the pillars of SOC?The paper also defines and delineates the four major pillars of SOC: Intelligence, Secure Service Development, Business Damage Control, and Continuous Monitoring. So, we've established the fact that a SOC team's main objective is to safeguard a company against cyberattacks.
Which element of the people pillar focuses on retaining staff members answer?Mentoring allows your organisation to develop top talent, to actively motivate your employees, to retain your most promising leaders enhancing productivity.
Which team is responsible for developing implementing and maintaining the network security policies?Security engineers, who build out and manage the organization's security architecture. Much of this work involves evaluating, testing, recommending, implementing and maintaining security tools and technologies.
|