Gather Application Information, collect details about each application, including: Business functions it supports, Number of users, Other relevant operational data Populate this information into the assessment template.
Conduct a detailed review of the system architecture and related diagrams, focusing on:- Integration Map: Identify all components and how they interact, Include APIs, data flows, and external/internal integrations- Pattern Map: Map each system or component to its corresponding migration pattern (e.g., Rehost, Refactor, etc.)- System Dependency: Analyze dependencies between systems and components, highlight critical paths and tightly coupled services- Recommendations on Criticality and Migration Priority: Assess the criticality of each system/component. Provide recommendations on migration order based on business impact, complexity, and risk
Challenge/Suggestion per System- Challenges (Technical limitations, Integration complexity, Data migration issues, Security concerns, Operational dependencies, Licensing constraints)- Suggestions / Recommendations (Mitigation strategies, Tooling recommendations, Architecture, Training…)
Use Assessment Tools: Utilize tools such as ModelizeIT, CAST, AWS Application Discovery Service or similar to gather technical data for the report.
Analyze System Dependencies: Identify how each application interacts with other systems and their interdependencies. Document these relationships in the assessment template.
Senior Engineers are responsible for classifying systems into appropriate migration patterns based on predefined criteria. These patterns may include strategies such as Rehost, Refactor, Replatform, Retire, or Retain
Perform TCO (Total Cost of Ownership) Analysis, based on predefined resource types, calculate the TCO. Break down the cost by components such as: Compute, Load Balancer (LB), Storage, Database (DB)
Collect and analytic Current System Information Related to Operations, Security, Backup, and Disaster Recovery Plan (DRP), Gather detailed information about the current systems:- Operations: Monitoring tools, incident management processes, SLAs, etc.- Security: Access control, authentication methods, encryption, compliance standards, etc.- Backup: Backup frequency, tools used, retention policies, and recovery procedures.- Disaster Recovery Plan (DRP): DR strategy, RTO/RPO targets.
Finding Customer Documentation: Study all documents provided by the customer to understand the current system and requirements.