Cloud Migration is the process of partially or completely migrating digital assets, IT services, data, and applications of an organization to the cloud. It is also referred to as Business Process Outsourcing (BPO) that moves IT Infrastructure (Compute, Storage, Network, Software, and Platform services) to the Cloud. The move or migration typically results in one or more immediate benefits such as cost-savings, lower TCO, business agility, ease of management, and on-demand scalability. What gets migrated depends on organization's business. Companies like to use a phased approach to gradually migrate services and assets to the Cloud i.e. Operating in Hybrid mode and gradually move on to fully migrated to the Cloud. A common practice is to use more than one Cloud Services Provider; this is referred to as a Multi-Cloud deployment.
Cloud Security refers to securing and managing access to digital assets and data in the Cloud. Digital assets and data in the Cloud is accessed over the Internet and thus vulnerable to unauthorized access, accidental leakage, or manipulation by malicious actors known as threat agents. Although Cloud Services Providers deploy state-of-the-art security controls and mechanism to protect their customers; customers share responsibility with Cloud Services Providers to protect their assets and data in the Cloud. This is referred to as Shared Responsibility Model. Customers use In-Transit/data-at-rest encryption and hashing to protect the integrity of their data. While authentication and authorization controls are used to ensure who can access what and where and when.
Cloud Storage refers to storing, retrieving, backing-up, restoring, and archiving data using Cloud-based Storage offerings. Cloud Services Providers offer highly redundant and durable storage facility at fraction of the cost while maintaining high availability and security of the data. This data is accessible from anywhere using any device. Cloud Storage is usually classified as Tiers where Tiers refer to how fast and quickly the data needs to be written or read. Data that is accessed or modified frequently is placed in higher tiers than data that is stored for backups (less frequent accessed). Archived data (rarely accessed) is placed in the lowest tier.