These are not theoretical risks but they are the documented causes of the 65% failure rate in digital transformation programmes and the 31% average cloud waste figure where every one of them has a structural cause and a structural prevention which the prevention requires work before migration begins and which is exactly when most organizations are least inclined to invest time and money in strategy rather than execution.
01
Cloud costs exceed on-premises costs within 18 months
The business case for migration was built on headline cloud pricing applied to current resource consumption. It did not account for egress costs (paying to move data out of the cloud), reserved instance underutilization when demand forecasts are wrong, licensing cost changes when on premises licenses do not transfer to cloud, the operational cost of managing cloud environments and the tendency of cloud provisioning to expand beyond initial scope because provisioning is frictionless.
Seen in
Organization migrates a 40 server on premises environment with an annual infrastructure cost of £280,000. First cloud bill is £38,000 per month. Annualized from £456,000 which is 63% above the on premises baseline they migrated to escape.
Structural prevention
Total cost of ownership modelling per workload before migration including egress, licensing changes, operational overhead and a 20% contingency for demand variance. FinOps governance framework in place before the first workload moves with tagging taxonomy, cost allocation by team and workload, automated right sizing alerts, commitment discount planning. Budget ceiling per environment with automated enforcement.
02
Applications break in cloud that worked on premises
On premises applications develop dependencies that are invisible until the environment changes with hardcoded IP addresses, network latency assumptions built into timeout configurations, local file system paths that do not exist in cloud, Active Directory integrations that rely on network proximity and Windows licensing tied to specific hardware. Lift and shift migration and moving VMs without modification which preserves all of these dependencies in a new environment where they no longer work.
Seen in
ERP system migrated successfully at the VM level. Failed to start because a hardcoded reference to the on premises file server that hosted configuration files now resolved to an unreachable address. Discovery time of 6 hours during business hours. Root cause identification with 4 additional hours. Resolution with configuration file relocated, 2 hours. Total disruption of 12 hours. This was in the dependency assessment for any experienced pre migration analyst to find.
Structural prevention
Dependency mapping at application layer and not just infrastructure layer which is before classification. Every dependency with network paths, authentication integrations, file system references, hardcoded IPs, timeout configurations, licensing integrations. Applications classified for migration approach based on what the dependency map reveals, not on application age or business priority alone.
03
Data sovereignty obligations discovered after migration
Data residency requirements under UK GDPR, sector specific regulations and contractual obligations with clients or partners are not always systematically reviewed before cloud selection. A default cloud provider selection (typically AWS us east 1 or Azure West US because those are where most tutorial deployments point) places data outside UK jurisdiction. For NHS data, financial services data and government data, this may constitute a regulatory breach which is discovered during audit, not during migration planning.
Seen in
NHS connected digital health company migrates to AWS. Post migration audit reveals that NHS patient data is stored in EU West 1 (Ireland). NHS DSPT requires data to remain in the UK. Full re migration to UK region required. Cost of remediation from £180,000 in additional migration work plus 3 month delay to a product launch.
Structural prevention
Data classification and residency mapping before any cloud selection. Every data type with its regulatory classification, the jurisdiction it must remain in, the contractual obligations affecting it and the cloud provider regions that satisfy those obligations. Cloud provider selection made after data residency requirements are mapped and not before. For NHS, government and financial services with UK sovereign cloud regions identified and validated as compliant before architecture is finalized.
04
Security posture degrades after migration
The cloud shared responsibility model means the cloud provider secures the infrastructure; the customer is responsible for everything above it — operating system, application, data, identity, network configuration and access controls. Organizations that migrated from on-premises environments where firewalls, network segmentation, and access controls were managed by the infrastructure team arrive in cloud environments where those controls must be deliberately configured — and if they are not, the default configuration is frequently permissive in ways that on premises environments were not.
Seen in
Organization migrates database server to cloud. On premises with database accessible only from the application server via VLAN segmentation, enforced by physical network. In cloud with database security group left at default configuration during migration pressure which is accessible from any IP on port 3306. This misconfiguration existed for 47 days before detection. During that period once one confirmed external scan attempt and one successful authentication attempt from an unrecognized IP.
Structural prevention
Security posture design as an integrated component of the migration architecture which is not a post migration hardening exercise. Every workload where the security controls required in cloud, the default cloud configuration and why it is insufficient and the specific configuration changes required before the workload goes live. Cloud security baseline standards enforced via policy as code before any workload is migrated. Configuration drift monitoring active from day one of cloud operation.
05
Migration waves planned by convenience rather than dependency
Migration waves are often planned around team availability, vendor contract expiry dates or organizational politics and not around application dependency chains. Migrating an application before the database it depends on is in the cloud creates a hybrid dependency that performs poorly and creates a split that must eventually be resolved. Migrating a front end application before the authentication service creates an interim period where the security architecture is genuinely weaker than either pure state.
Seen in
Wave 1 migrations selected by the department heads most willing to volunteer their applications. Result is 14 applications migrated in wave 1 of which 9 had dependencies on systems remaining on premises. Performance of migrated applications are degraded due to WAN latency on every on premises dependency call. Unexpected WAN egress cost from £12,000 per month. All 9 required re sequencing into later waves, effectively duplicating the migration work.
Structural prevention
Migration wave sequencing derived from the dependency graph, not from organizational convenience. Dependencies migrated before the systems that depend on them. Applications with shared dependencies grouped into the same wave. Where a dependency cannot be migrated in the required sequence, the architectural solution which is when the API gateway, data replication, interim caching is designed and costed before the wave plan is finalized.
06
Lift and shift applied to workloads that required re architecture
Lift and shift (moving a VM as is to cloud) is appropriate for some workloads and catastrophically wrong for others. A stateful monolithic application that was designed for on premises vertical scaling cannot take advantage of cloud elasticity and will cost more in cloud than on premises because cloud pricing assumes horizontal scaling and cloud native design. Organizations that lift and shift everything to meet a migration deadline with the intention of re architecting later, rarely re architect. The temporary architecture becomes permanent.
Seen in
Organization lifts and shifts 80 application servers. 12 of them are monolithic applications with no horizontal scaling capability. In cloud, they occupy oversized reserved instances to guarantee capacity because cloud elasticity does not apply to them. Annual cost of these 12 workloads in cloud from £340,000. Equivalent on premises cost from £95,000. “Temporary” lift and shift from 4 years and counting.
Structural prevention
Every workload classified using the correct migration approach before wave planning begins. Four approaches assessed per workload: Lift-and-Shift (justified only where the workload is cloud cost neutral and will be retired within 24 months), Re Platform (appropriate for most workloads with minimal code change, significant cloud cost benefit), Refactor (justified where cloud native elasticity delivers measurable ROI over the application lifetime) or Replace/Retire (workloads that should not be migrated because they should not exist). Classification drives sequencing, cost modelling, and architecture approach.
07
No rollback plan. Migration cannot be reversed when it fails.
Migration runbooks are written for the success path. The rollback path and what to do if the migrated application does not work correctly and needs to be reverted to on premises which is either not documented, not tested or impossible to execute because on premises infrastructure was decommissioned before the cloud migration was validated. A migration that cannot be rolled back is not a migration and it is a forced cutover.
Seen in
Core HR application migrated on a Friday evening. Application fails validation Saturday morning: data was migrated but the payroll integration does not function. Rollback plan with return the VMs to on premises. Problem is the on premises hypervisor host was decommissioned on Friday afternoon to free up hardware for a new purchase. Monday morning payroll run under manual processing for 2,400 employees. Tuesday an emergency procurement of temporary on premises hardware. Total cost including contractor time from £85,000. Payroll error corrections with 3 weeks of HR time.
Structural prevention
Every workload migration runbook includes the success validation criteria, failure criteria, rollback procedure and rollback validation. On premises infrastructure is not decommissioned until the cloud migration has operated successfully for a defined parallel run period with minimum 2 weeks for non critical workloads, minimum 4 weeks for critical workloads. Parallel run exit criteria are defined before migration begins, not after the cloud environment has been live for a month and someone wants to shut down the on premises hardware.
08
The team cannot operate what was built
Cloud infrastructure is fundamentally different from on-premises infrastructure in its management model. An IT team that has spent years managing VMware, Windows Server and on premises networking needs substantial retraining and adjustment time to manage AWS EC2, Azure Resource Manager and cloud networking. Migration programmes that deliver a cloud environment to a team unprepared to operate it create a risk exposure that is worse than the pre migration state which is more complex infrastructure, managed by people whose skills do not yet match the environment.
Seen in
Organization migrates successfully to Azure. 3 months post migration with a routine certificate renewal that previously took 30 minutes on premises takes 4 hours because no one on the team understands Azure Key Vault. A security group change that previously required a firewall rule change now requires understanding of NSGs, Application Security Groups, and Azure Policy which three concepts the team has not yet encountered. Time to resolve routine operational tasks with 3 to 8× on-premises equivalent for 6 months.
Structural prevention
Skills gap assessment as a mandatory component of migration strategy. Every operational task the team currently performs on premises under its cloud equivalent, the skills required and the gap between current team capability and required capability. Training programme designed and resourced before migration begins. Runbooks written to the capability level of the team that will execute them and not the capability level of the team that designed the migration. Operational handover period with design team support explicitly included in the migration timeline.
09
Licensing costs were not modelled before migration
Software licensing in cloud is materially different from on premises. SQL Server licenses do not transfer to cloud without significant cost change. Windows Server Datacenter Edition licenses which cover unlimited VMs on premises, cover a limited number of cloud VMs depending on the provider’s licensing model. Oracle database licenses in cloud are notoriously expensive and frequently require more licenses in cloud than on-premises for the same workload due to Oracle’s vCPU counting methodology. These costs are invisible until the first invoice.
Seen in
Organization migrates Oracle database to AWS RDS. Oracle licenses on premises which are covered by existing perpetual license with annual support. Oracle licenses in AWS with Oracle charges based on vCPU count in the cloud environment. AWS instance sizing required for the workload with 32 vCPUs. Oracle cloud license cost from £180,000 per year. On premises licensing is already paid. Net additional annual licensing cost from migration from £180,000. This was knowable before migration and was not modelled.
Structural prevention
Licensing audit before migration with every software product deployed across every workload, its current license terms, the cloud equivalent license terms from each candidate cloud provider and the cost differential. Oracle, Microsoft, SAP and Citrix receive specific attention because their cloud licensing terms are consistently surprising. Where licensing costs make a workload cloud uneconomic, Re Platform to an open source or cloud native alternative is assessed as the alternative migration approach.