1. Drivers
    1. Capacity Planning
      1. Predicting future system resource usage
      2. Balancing steady state and peak usage
    2. Operating Overhead
      1. Upfront capital expenditure
      2. Administrative burden
    3. Organizational Agility
      1. Changing business landscape
      2. Scaling beyond what was planned for
    4. Grid Computing
      1. Pool of shared computing resources
      2. Foundation for elastic services
    5. Clustering
      1. Group resources resources
      2. Adapt to fluctuating demand
    6. Virtualisation
      1. Increase physical server resource usage
      2. Concurrent usage of virtual resources
  2. Capabilities
    1. Ubiquitous Access
      1. Widely accessible via range of protocols
    2. On-Demand Usage
      1. Self provisioning by cloud consumer
    3. Measured usage
      1. Consumer pays for what they use
    4. Elasticity
      1. Dynamically and transparently scale resources
    5. Resiliency
      1. Distribute computing capacity across locations
  3. Terminology
    1. On-premises
      1. Resides within internal IT network
    2. Cloud
      1. Remotely provision and accessible IT environment
    3. Resource
      1. Physical or virtual IT hardware or software
    4. Service
      1. Remotely accessible web service
    5. Agent
      1. Event driven program intercepts and process messages
  4. Benefits
    1. Investment
      1. Pay-as-you-go model aligns spend to demand
    2. Availability
      1. Multi-regional deployment for disaster recovery
    3. Scalability
      1. Instant scale up and scale down based on demand
  5. Challenges
    1. Control
      1. Lack of control over security policies and controls
    2. Visibility
      1. Lack of visibility into policy and controls effectiveness
    3. Manageability
      1. Not able to manage all aspects of access and audit policies
    4. Governance
      1. Reliance on SLAs and warranties due to no direct infrastructure control
    5. Interoperability
      1. Proprietary services may limit portability
    6. Compliance risk
      1. Dependency on data and systems outside the organization's direct control
    7. Isolation failure
      1. Multitenancy and resource sharing presents risk from malicious software
    8. Boundaries
      1. Expansion and overlapping trust boundaries
    9. Data protection
      1. Reliance on provider to keep data secure and destroy it when deleted
    10. Management Interface
      1. Public Internet exposure increases risk from security breach
  6. Roles
    1. Consumer
      1. Organisation or human that uses a cloud service
    2. Provider
      1. Organisation that provides a cloud service
    3. Administrator
      1. Administers cloud based IT resource
    4. Owner
      1. The person that owns the cloud service