The numbers are consistently uncomfortable. Depending on which analyst firm you ask, between 50% and 70% of cloud migrations either fail outright, run significantly over budget, or fail to deliver the expected benefits. For projects that organisations have invested months or years planning, these are not acceptable odds.
The causes are well understood. And yet organisations continue to make the same mistakes. This article documents the most common ones — and more importantly, the architecture and planning decisions that make the difference between a migration that succeeds and one that becomes a cautionary tale.
Mistake 1: Lifting and Shifting Without Understanding What You Are Moving
The fastest way to migrate to cloud is also the most dangerous: take every virtual machine from your data centre and move it to a cloud instance of equivalent size. No changes to applications, no re-architecture, no rethinking of how the workload should operate. Just move it.
The problem is that this approach moves your on-premises architecture to cloud and then charges you cloud prices for it. Legacy applications running on legacy architecture on cloud infrastructure are almost always more expensive than the same applications running on-premises — because cloud economics only work in your favour when you are taking advantage of cloud capabilities: elasticity, managed services, autoscaling, and pay-per-use pricing.
A proper workload assessment before migration classifies each application by migration approach: lift-and-shift, re-platform (move with minor modifications to use managed services), or re-architect (redesign for cloud-native operation). The right answer is different for every workload — and getting it wrong for even a few critical applications can undermine the entire business case for migration.
Mistake 2: Treating Security as a Phase
In the typical migration project, security comes in two places: at the beginning (a security requirements document that nobody reads) and at the end (a security review after the infrastructure is built). Neither is effective.
Cloud security requires architectural decisions that cannot be retrofitted. Network segmentation, IAM policy design, encryption key management, logging configuration — these must be designed into the architecture from the first whiteboard session. Adding them after the workloads are running is expensive, disruptive, and frequently incomplete.
The organisations that migrate successfully treat security as a design constraint, not a deployment phase. Their network architecture is designed with Zero Trust principles from day one. Their IAM policies are designed with least-privilege as the default. Their storage encryption is configured before the first byte of production data is written.
Mistake 3: Underestimating Data Migration Complexity
Compute is easy to migrate. Data is not. Database migrations involve dependency analysis, schema migration, data transformation, synchronisation strategy, and cutover planning — and they carry the highest risk of data loss or corruption of any migration activity. The organisations that run into serious trouble during cloud migrations almost always underestimated the complexity of their data migration.
A realistic data migration strategy addresses four questions before any migration activity begins: What data exists and where? What are the dependencies between data stores? What is the acceptable downtime or data loss window during cutover? What is the rollback plan if the cutover fails?
What the Successful Migrations Have in Common
The migrations that consistently succeed share a set of characteristics that have nothing to do with which cloud platform is selected or which migration tool is used.
They start with a thorough workload assessment before any infrastructure is provisioned. They have a clearly documented target architecture before any migration begins. They treat security as a design constraint, not a deployment task. They migrate in waves, starting with non-critical workloads, learning from each wave before moving to the next. And they have a clearly defined rollback plan for every workload before the cutover begins.
None of these are technically complex. All of them require discipline — and a partner who is willing to slow the project down long enough to do the planning properly.
Ready to apply this to your organisation?
Book a free 30-minute discovery call. No agenda except understanding your situation and telling you honestly what we'd recommend.