Application Inventory

The assessment begins with creating an inventory of all applications deployed within the organization. This includes both in-house developed applications and third-party applications. The inventory should include details such as application names, versions, owners, usage patterns, and business functions supported.

Categorization Criteria

Osprey works with organizations to define criteria for categorizing applications into different tiers based on their importance, criticality, and performance requirements. This may include factors such as business impact, service level agreements (SLAs), data sensitivity, and regulatory compliance requirements.

Tier Definitions

Osprey defines the characteristics and attributes of each application tier based on the categorization criteria. Commonly used tiers include:

  • Tier 1 (Mission-Critical): Applications that are essential for core business operations and require high availability, reliability, and performance. These applications typically have stringent SLAs and require redundant systems, failover mechanisms, and disaster recovery capabilities.
  • Tier 2 (Business-Critical): Applications that support important business functions but may have slightly lower availability and performance requirements compared to Tier 1 applications. These applications may have moderate SLAs and may not require as much redundancy or failover capabilities.
  • Tier 3 (Supporting): Applications that support non-critical business functions or have lower usage and performance requirements. These applications may have more relaxed SLAs and can tolerate longer downtimes or performance issues without significant impact on business operations.
  • Tier 4 (Development/Test): Applications used for development, testing, or staging purposes that do not directly impact production systems. These applications have minimal or no SLAs and may have different requirements for scalability, performance, and availability.

Assessment Criteria

Osprey assesses each application against the defined criteria for its respective tier. This may involve evaluating factors such as availability requirements, performance benchmarks, data protection measures, security controls, compliance obligations, and supportability.

Dependency Analysis

Osprey analyzes the dependencies between applications within each tier and with other tiers to understand how changes or failures in one application may impact others. This includes identifying upstream and downstream dependencies, data flows, integration points, and service dependencies.

Performance Profiling

Osprey conducts performance profiling of applications to understand their resource utilization, scalability, and performance characteristics. This helps ensure that applications are appropriately placed in the correct tier based on their performance requirements and expected workload.

Risk Assessment

Osprey performs risk assessments to identify potential risks and vulnerabilities associated with applications in each tier. This includes assessing the impact of security threats, software vulnerabilities, infrastructure failures, and operational risks on application availability and performance.

Optimization Recommendations

Based on the assessment findings, Osprey provides recommendations for optimizing the placement of applications in different tiers and improving their performance, availability, and reliability. This may include upgrading infrastructure components, implementing redundancy and failover mechanisms, optimizing resource allocation, and enhancing security controls.

Lifecycle Management

Osprey establishes processes for managing the lifecycle of applications across different tiers, including deployment, monitoring, maintenance, and decommissioning. This involves defining procedures for deploying new applications, monitoring performance and availability, applying updates and patches, and retiring obsolete applications.

Continuous Review and Adjustment

Osprey conducts regular reviews and adjustments to the application tiering and assessment framework to ensure that it remains aligned with changing business needs, technology trends, and regulatory requirements. This involves periodically reassessing applications, updating tier definitions, and refining assessment criteria based on feedback and lessons learned.