The assessment begins with creating an inventory of all applications deployed within the organization. This includes both in-house developed applications and third-party applications. The inventory should include details such as application names, versions, owners, usage patterns, and business functions supported.
Osprey works with organizations to define criteria for categorizing applications into different tiers based on their importance, criticality, and performance requirements. This may include factors such as business impact, service level agreements (SLAs), data sensitivity, and regulatory compliance requirements.
Osprey defines the characteristics and attributes of each application tier based on the categorization criteria. Commonly used tiers include:
Osprey assesses each application against the defined criteria for its respective tier. This may involve evaluating factors such as availability requirements, performance benchmarks, data protection measures, security controls, compliance obligations, and supportability.
Osprey analyzes the dependencies between applications within each tier and with other tiers to understand how changes or failures in one application may impact others. This includes identifying upstream and downstream dependencies, data flows, integration points, and service dependencies.
Osprey conducts performance profiling of applications to understand their resource utilization, scalability, and performance characteristics. This helps ensure that applications are appropriately placed in the correct tier based on their performance requirements and expected workload.
Osprey performs risk assessments to identify potential risks and vulnerabilities associated with applications in each tier. This includes assessing the impact of security threats, software vulnerabilities, infrastructure failures, and operational risks on application availability and performance.
Based on the assessment findings, Osprey provides recommendations for optimizing the placement of applications in different tiers and improving their performance, availability, and reliability. This may include upgrading infrastructure components, implementing redundancy and failover mechanisms, optimizing resource allocation, and enhancing security controls.
Osprey establishes processes for managing the lifecycle of applications across different tiers, including deployment, monitoring, maintenance, and decommissioning. This involves defining procedures for deploying new applications, monitoring performance and availability, applying updates and patches, and retiring obsolete applications.
Osprey conducts regular reviews and adjustments to the application tiering and assessment framework to ensure that it remains aligned with changing business needs, technology trends, and regulatory requirements. This involves periodically reassessing applications, updating tier definitions, and refining assessment criteria based on feedback and lessons learned.