Cloud-Native-Roadmap Sample Report
Cloud-Native-Roadmap Sample Report
Cloud-Native-Roadmap Sample Report
CHALLENGE:
Modernizing existing applications to become cloud native and deployed in a PaaS environment without re-developing an
entire software system can deliver on the promise of cloud – scalability, resiliency, performance, economics, access to
services such as AI/ML, DBaaS, containers, and more.
The process can be slow and risky, depending on accurate understanding of the existing application inner workings, required
to determine the following:
2
Cloud Native Application Modernization
SCOPE:
• This document is a sample of automatically generated intelligence about a portfolio of 17 applications considered for
modernization to cloud native:
• Some of the applications are still on-premise and others have already been rehosted on cloud (IaaS)
• Key insights in this report include:
• Specific recommendations on how to modernize each application to be cloud native
• Specific recommendations on open source risks, software health, and green impact to be considered as part of the
modernization
CAST Highlight was used to produce the intelligence in a few hours by automatically understanding the source code and
capturing qualitative information via a built-in survey.
Contact us to
CAST Highlight website
learn more
3
Contents
4
Application Portfolio Snapshot
17
applications
10
technologies
5.1m
lines of code
527
open-source components
(programming languages)
6
Roadmap to Cloud Native - Sample Report
Cloud Readiness
Cloud Readiness Section
This section of the report contains key insights generated by CAST Highlight on the
readiness of applications for adopting cloud native including:
• Recommended modernization approaches for each application (Refactor, Rearchitect, Rebuild)
• Blockers to PaaS deployment, estimated effort to remove them, and the required code changes
• Recommended cloud native services that applications can adopt when deployed in a PaaS environment
• Summarized action plan for the application portfolio
8
Portfolio Advisor for Cloud
The Portfolio
Advisor for Cloud
automatically
segments each
application and
recommends the
ideal
modernization
approach based
on fact-based
technical
characteristics (via
automated source
code analysis) and
qualitative criteria
such as business
impact (captured
via survey).
9
Portfolio Advisor for Cloud
11
Blocker Detail: Using Stateful Sessions
12
Blocker Detail: Use of File System
13
Blocker Detail: Perform File Manipulation
14
Cloud Boosters & Blockers for Roslyn Application
Insights are available at the application level to understand the specific Blockers that occur
within each application and estimated effort to remove them so that the modernization
plan can be further refined based on individual application characteristics. 15
Cloud Native Service Recommendations for Roslyn Application
16
Cloud Native Roadmap Recommendations
Applications to Retire:
• Cassandra, Groot
Addtional recommendatons:
• Investigate Health of each application to understand opportunities to improve resiliency and agility.
• Analyze Software Composition of each application to identify any open-source components that need to be upgraded
and/or replaced due to CVEs, license risk, or obsolesence.
• Investigate Green Impact of each application to identify opportunities for reducing energy consumption and carbon
emissions.
17
Roadmap to Cloud Native - Sample Report
Software Health
Software Health Section
This section of the report contains key insights generated by CAST Highlight on the
Software Health of applications that should be addressed during modernization
including:
• Applications that are business critical and have low Resiliency
• Specific improvement opportunities within the code to improve Resiliency
• Summarized action plan for the application portfolio
19
Software Resiliency vs Business Impact
DANGER ZONE
INDUSTRY AVERAGE
DANGER ZONE
Hadoop Loki
CONFIDENCE ZONE Hades IMDB
Grogu Shopizer
GCP-Client
CONFIDENCE ZONE
Business Impact
VULNERABILITIES
Loki Mando
Hadoop GCP-Client
Some applications have Resiliency scores that are severely low. Code alerts should be remediated before
modernization for cloud native on these applications:
• Hades
• Loki
• Grogu
Security Vulnerabilities were identified in a few applications and a deeper Software Composition Analysis should be
performed to investigate the open source components in these applications further:
• Loki
• Hadoop
• Mando
• GCP-Client
22
Roadmap to Cloud Native - Sample Report
This section of the report contains key insights generated by CAST Highlight on the
Software Composition (open source risks) of applications that should be addressed during
modernization including:
• Security vulnerabilities to be addressed
• Risky open source licenses that create potential legal exposures
• Summarized action plan for the application portfolio
24
Software Composition Analysis Overview
Open source is one of Open source licensing can Open source components can
the major entry points be complex and become out of date or
for hackers. It is critical confusing. Visibility on the unsupported resulting in
to identify if the third- licenses used by open operational risks and outages.
party components in source components is These out of date
use contain security required to detect any components must be
vulnerabilities. restrictive license detected and replaced with
compliance issues. supported components.
CAST Confidential
25 25
Security Vulnerabilities Overview
88 159 169 13 23
CRITICAL HIGH MEDIUM LOW ADVISORY
Vulnerabilities
Application Components
GCP-Client minimatch 3.0.0, useragent 2.1.12, qs 2.3.3, decamelize 1.1.1, parsejson 0.0.3, hapi 15.x.x,
tomcat-embed-core 7.0.73, slf4j-api 1.7.7, cxf-rt-frontend-jaxws 2.7.12, is-my-json-valid 2.12.0, ua-parser-js 0.7.12,
Loki
marked 0.3.6, minimatch 3.0.0, useragent 2.1.11, jquery 1.7.2, hibernate-validator 4.2.0.Final,
openjpa-persistence-jdbc 2.1.1, commons-fileupload 1.2.1, jackson-databind 2.5.3, dom4j 1.6.1, jsoup 1.8.1,
Other applications
derby 10.1.1.0 …
531 25 50 412 12
Components HIGH RISK MEDIUM RISK LOW RISK Undefined
License Risk
MIT License (358), ISC License (39), Apache 2.0 (16), Eclipse 2.0 (1), BSD 2 (14), GNU Affero
Hades 379
GPL 3 (1), BSD 3 (1)
Roslyn 32 MIT License (2), Apache 2.0 (1), GNU GPL 3 (4)
Hadoop: Upgrade jsh component to latest version to reduce critical vulnerability risk
Hades:
• Upgrade hibernate component to latest version to reduce critical vulnerability risk
• Replace component that uses the GNU GPL license to avoid copyleft licensing risk
Mando: Replace component that uses the GNU GPL license to avoid copyleft licensing risk
Roslyn: Replace component that uses the GNU GPL license to avoid copyleft licensing risk
30
Roadmap to Cloud Native - Sample Report
Green Impact
Green Impact Section
This section of the report contains key insights generated by CAST Highlight on the Green
Impact of applications that should be addressed during modernization including:
• Prioritized actions to take for applications to improve green impact
• Green Deficiencies in the code, estimated effort to remove them, and the required code changes
• A view of the Green Impact score trends over time
• Summarized action plan for the application portfolio
32
Portfolio Advisor for Green
33
Green Deficiencies
Insights are available at the application level to understand the specific Green Deficiencies
that occur within each application, estimated effort to remove them, and remediation
advice so that applications can be made more sustainable as part of the modernization.
35
Green Impact Trends
36
Green Impact Recommendations
Shopizer: Remove the top 10 Green Deficiencies, less than one week of estimated effort
Quill: Remove top 2 Green Deficiencies, less than two weeks of estimated effort
Review two “Role Model” applications to identify best practices to share across the team:
• MultiCloud
• Starlord
37
Why CAST Highlight?
CAST Highlight gives enterprise leaders rapid insights across entire portfolios. Automated
source code analysis with built-in surveys for business context. Portfolio views. Instant
drilldowns. Recommendations. Operational in a week. Across hundreds of applications.
Trusted By:
38
Contact Us
to learn how to automatically generate an Visit the CAST Highlight web site.
application portfolio report
SAMPLE CO, INC.
Appendix
Date
Data Collection for CAST Highlight
A simple, 3-step process…
Step 1 - Point CAST Highlight at your code Step 2 – Encrypted statistical Step 3 – Instant visibility with
repositories for automatic scanning and results uploaded to secure cloud automatically generated and
rapid analysis, updated continuously and (27001-certified), no code leaves customizable dashboards, integrate
automatically, complete survey for each the premises data with other systems via API
application to enhance context
41 CAST Confidential
Key Metrics & Methodology Definitions
Measure the robustness and how bullet- Reflects presence of code patterns that Customer Satisfaction
Software Resiliency proof is the Software against production may comprise vulnerability of the Customer Confidence / Loyalty
failure software Opportunities & Revenue
42
CloudReady Index Calculation Formula
Based on Based on
CloudReady Survey** CloudReady Scan***
CloudReady
13.4 77.1
45.2
(weight of 50%) (weight of 50%)
Code Patterns Score
**CloudReady Survey score - from 0 to 100 - relies on the answers provided by the Application Owner. Depending on the importance of a question, its answers may impact the score differently.
***CloudReady Code Scan score - from 0 to 100 - relies on both Booster and Blocker scores, where Booster and Blocker scores respectively account for 20% and 80% in the Code Scan score. 43