Orange County’s IT shop has opened a formal conversation about moving major workloads off Microsoft Azure, issuing a Request for Information (RFI) that explicitly asks the market how to migrate applications, virtual machines, storage, databases and networking from Azure to another cloud — a move that, if pursued, would be a rare and consequential “cloud exit” for a large U.S. county.
Orange County Information Technology (OCIT) published an RFI describing a comprehensive Cloud Services Migration effort: the county seeks vendor input on approaches, tools and costs to transition workloads currently running on Microsoft Azure to an alternative cloud provider. The RFI lists application services, networking configurations, storage, databases and virtual machines as in-scope and frames the engagement around planning, testing, verification, training and security validation. Submission and question deadlines reported in public summaries are: questions due by 4 p.m. PT on Oct. 6 and RFI responses due by 4 p.m. PT on Nov. 3. OCIT is not new to cloud diversity: county budget documents and recent public records show that some county systems already run on Amazon Web Services and Oracle cloud applications have been adopted for finance/HR modernization, indicating a multi-vendor posture for certain workloads. OCIT’s FY 2025–26 budget and leadership details confirm the scale of the organization and that KC Roestenberg serves as CIO.
Key legal/commercial items to investigate:
For vendors, integrators and county IT leaders watching closely, the important takeaways are practical: plan for staggered migrations, prioritize identity and data integrity, cost-evaluate egress and dual-running windows, and put reversibility at the heart of each migration phase. The RFI’s publication is the beginning — not the conclusion — of a complex, high-stakes program that will test Orange County’s technical discipline, procurement rigor and readiness to operate across multiple cloud ecosystems.
Orange County’s RFI is now a public focal point for the hard question many IT leaders prefer to avoid: how do you undo the cloud when the organization’s business needs, budgets or risk calculus change? The answers will be technical, contractual and organizational — and they will set a useful precedent for other counties and cities that must reconcile modern cloud adoption with long-term portability, resilience and cost predictability.
Source: GovTech Orange County Seeks Info on Migrating Off Azure
Background
Orange County Information Technology (OCIT) published an RFI describing a comprehensive Cloud Services Migration effort: the county seeks vendor input on approaches, tools and costs to transition workloads currently running on Microsoft Azure to an alternative cloud provider. The RFI lists application services, networking configurations, storage, databases and virtual machines as in-scope and frames the engagement around planning, testing, verification, training and security validation. Submission and question deadlines reported in public summaries are: questions due by 4 p.m. PT on Oct. 6 and RFI responses due by 4 p.m. PT on Nov. 3. OCIT is not new to cloud diversity: county budget documents and recent public records show that some county systems already run on Amazon Web Services and Oracle cloud applications have been adopted for finance/HR modernization, indicating a multi-vendor posture for certain workloads. OCIT’s FY 2025–26 budget and leadership details confirm the scale of the organization and that KC Roestenberg serves as CIO. Why this RFI matters: the politics and the practice of leaving a hyperscaler
Moving onto a hyperscale cloud like Azure is now routine for government agencies; moving off one is not. Hyperscalers invest heavily in government certifications, compliance programs and integrations that government IT teams rely on — which is exactly what creates vendor lock-in over time. Orange County’s RFI is therefore important for three reasons:- It publicly acknowledges a county-level willingness to consider vendor diversification or a platform change at scale.
- It sets a formal procurement trail that vendors and consulting firms must respond to, creating an arena for commercial and technical proposals.
- It forces a practical reckoning with cloud exit mechanics — the technical, contractual and operational tasks required to successfully leave a provider without disrupting critical public services.
What OCIT is asking the market to do (summary of RFI scope)
The public reporting and procurement notices show OCIT framing the effort as comprehensive, requiring vendors to demonstrate capacity across the lifecycle:- Inventory and assessment of Azure-hosted assets (apps, VMs, databases, storage, networking).
- Migration planning: mapping services to a target cloud platform, target architecture and landing zones.
- Reconfiguration and rehosting/replatforming as needed so applications run correctly in the chosen destination.
- Data migration and integrity verification, including rollback plans and reconciliation.
- Security, backup and disaster recovery design in the target environment.
- Training, documentation, runbooks and operational handover.
- Test plans that validate functional behavior, performance baselines and RTO/RPO goals.
What we can verify (hard facts)
- The RFI exists and was publicly reported by Government Technology’s Industry Insider — California on Sept. 19, 2025. The article summarizes the RFI’s in-scope areas and the submission timeline.
- A procurement aggregator captured the solicitation posting (ID 017‑RX1720273) and reproduced key elements including response deadlines and a short description of the migration scope. That record lists OCIT as the issuing agency.
- OCIT’s public materials confirm the department’s size, mission and CIO; county budget documents are available on the county’s budget website and the Auditor‑Controller / Clerk‑Recorder have documented prior cloud activity such as migrations to AWS for particular systems.
Technical considerations: how you actually move off Azure
Migrating an entire county IT estate from one cloud to another is not a single technical activity — it is a coordinated program made up of multiple projects. The technical workstreams will typically include:1. Discovery and classification
- Build a complete inventory of Azure resources (VMs, managed services, databases, storage accounts, networking, identity/Entra configurations, monitoring/telemetry flows).
- Classify workloads by criticality, compliance posture, licensing constraints and coupling to Azure-native services (e.g., Azure AD/Entra, Cosmos DB, Azure SQL features, Managed Identities).
2. Target architecture and landing zone design
- Define the target provider’s landing zones, identity model, network topology and security posture.
- Prepare for federated identity (if remaining on Microsoft Entra) or a new identity architecture — identity is often the hardest dependency to migrate cleanly.
3. Migration pattern per workload
- Lift-and-shift: VM exports and direct rehosting when application compatibility and licensing permit.
- Replatform: Minor changes to use target cloud managed services (for example, moving from Azure SQL to a managed RDBMS offering).
- Refactor: Application rewrites for cloud-native services (containerization, serverless) — highest cost and longest timeline.
- Data replication/sync and final cutover with reconciliation.
4. Network and connectivity
- Recreate network topologies, peering and dedicated connectivity (e.g., equivalents to Azure ExpressRoute) — low-latency backhaul and secure private links are often required for integrated services.
- Test failover, disaster recovery and cross-region routing.
5. Security, compliance and continuity
- Ensure encryption keys and key management strategy migrate or are re-provisioned with secure rollover.
- Revalidate FedRAMP, CJIS, HIPAA or other controls relevant to county workloads; maintain audit trails across migration.
- Run realistic RTO/RPO exercises.
6. Operations and runbooks
- Rebuild monitoring, alerting and runbooks (new console, telemetry, dashboards).
- Train staff on operational differences and escalations.
Costs, timeframes and procurement realities
Moving at this scale is expensive and complex. Typical cost drivers include:- Inventory and discovery tooling and consulting hours.
- Data egress fees and network transit costs (some providers charge for transferring data out).
- Staff time for testing, remediation and training.
- Licensing changes (some vendor licenses are tied to a cloud or require different models on another provider).
- Temporary dual-running costs while both environments are live for cutover windows.
Vendor lock-in, contracts and legal traps
A core challenge in any cloud exit is disentangling from provider-specific managed services and licensing. Orange County’s RFI specifically contemplates reconfiguring applications and verifying compatibility — an implicit recognition of lock-in risks.Key legal/commercial items to investigate:
- Contract termination rights, data export guarantees and the format of exported data.
- Licensing portability (are current licenses transferable, do they convert to BYOL or license-included models).
- Audit clauses and retrospective billing adjustments (important if CPU/vCPU accounting differs between providers).
- Service-level commitments for migration support (who is responsible if a migration activity causes extended outage).
Strategic options Orange County might be weighing
Based on common industry options and signals from county documents (Oracle adoption for finance/HR; pockets of AWS usage), the county appears to be embracing a hybrid/multi-cloud posture rather than a single-provider lock-in. Possible target strategies include:- Move to another hyperscaler (AWS, Google Cloud, Oracle Cloud) for parity of managed services and scale.
- Repatriate sensitive workloads to on-premises or colocation for control and predictable costs.
- Implement a multi-cloud architecture where workloads are placed on the most appropriate platform by cost, compliance and capability.
- Adopt a provider-agnostic operating model using containers and infrastructure-as-code to reduce future lock-in risk.
Practical risks specific to a county migration
- Service disruption risk for public-facing systems (courts, clerk-recorder, public safety interfaces) with real-world consequences.
- Data integrity risk during mass migrations and during the window when active writes occur.
- Identity and access management risk: migrating or federating Entra/Azure AD requires careful mapping or users will lose access.
- Regulatory and continuity risk: public records and legal holds must be preserved with auditable provenance.
- Vendor coordination risk: managing triage across vendor boundaries during incidents can cause time-to-resolution escalation.
How vendors should respond to the RFI (practical advice)
For firms planning a response, the county will likely evaluate proposals on technical depth, proven migration experience for similar government customers, security posture and clarity on costs and timelines. A strong response should include:- A detailed discovery methodology and representative tooling to produce an inventory within a defined SLA.
- A migration roadmap with deliverables and measurable acceptance criteria for each phase.
- A reversibility plan and rollback triggers for each cutover.
- Security and compliance mapping (how controls will be preserved or replaced in the target environment).
- Staffing and knowledge transfer plans, including training materials and runbooks.
- Pricing models that separate professional services, tooling and any estimated transient dual-running costs.
What this means for other cities and counties
If Orange County proceeds beyond an RFI to a formal solicitation and ultimately executes a migration, it will create a public case study on how a large county executes a hyperscaler exit. That could have ripple effects:- Vendors will refine “cloud exit” service offerings tailored to public sector procurement requirements.
- Other counties will re-examine their own cloud contracts, export capabilities and contingency clauses.
- Legislative and audit bodies may start requiring clearer exit strategies and data portability guarantees in cloud contracts for public agencies.
Strengths of OCIT’s approach so far
- The RFI is the right first step: it invites market input rather than pre-committing to a single technical plan, which lowers procurement risk and improves market discipline.
- OCIT shows pragmatic multi-cloud behavior in existing procurements (some AWS usage; Oracle SaaS for finance/HR), suggesting a willingness to match workloads to the best tool rather than a dogmatic single‑vendor stance.
- The RFI’s explicit emphasis on testing, documentation and staff training shows awareness that people and processes matter as much as tooling.
Risks and weaknesses (what to watch for)
- The RFI summaries do not publicly disclose the county’s desired target environment or the contractual and budgetary constraints that will define feasibility; without that detail, bidders may produce optimistic or unrealistic plans.
- If the county underestimates egress/networking costs, the financials will shift quickly once data transfer volumes are known.
- Identity and vendor-managed services coupling (e.g., platform-provided identity, analytics or database features unique to Azure) may force expensive refactors.
- A political or schedule-driven rush to move critical systems increases the chance of outages or prolonged remediation.
What to expect next (procurement timeline and signals)
- The RFI question deadline and submission deadline spelled out in the public summaries (Oct. 6 and Nov. 3) suggest the county intends to gather market input quickly and then decide whether to proceed to an RFP or a different procurement vehicle.
- Vendors that bid should expect follow-up engagements such as vendor conferences, capability demonstrations and requests for clarification.
- Watch for attachments in subsequent procurement notices that disclose inventory baselines, performance baselines and regulatory constraints — those documents will materially change bidders’ costing and approach.
Bottom line: a test case for cloud strategy in local government
Orange County’s RFI is a significant procurement signal: it shows a large county is actively querying the market on how to leave a hyperscaler while emphasizing testing, security and operational readiness. That public posture is both pragmatic and audacious: pragmatic because it starts with discovery and market input; audacious because it contemplates a large-scale exit that many public agencies avoid precisely because it’s hard.For vendors, integrators and county IT leaders watching closely, the important takeaways are practical: plan for staggered migrations, prioritize identity and data integrity, cost-evaluate egress and dual-running windows, and put reversibility at the heart of each migration phase. The RFI’s publication is the beginning — not the conclusion — of a complex, high-stakes program that will test Orange County’s technical discipline, procurement rigor and readiness to operate across multiple cloud ecosystems.
Appendix: practical checklist for an exit-focused RFP (vendor and buyer checklist)
- Inventory: automated discovery, dependency mapping, configuration snapshots.
- Identity: Entra/Azure AD federation, service principals, managed identity mapping plan.
- Data: export formats, encryption key rollover, egress cost modeling.
- Applications: compatibility matrix (Azure-native to target equivalents), refactor vs rehost decisions.
- Network: private connectivity, routing, firewall rules, VPN/ExpressRoute analogs.
- Security & Compliance: FedRAMP, CJIS, HIPAA mapping and evidence of control continuity.
- Operations: monitoring, logging, incident response, runbooks, training.
- Contract: data ownership, export guarantees, liability for migration-caused outages.
- Pilot: clearly scoped POC, rollback criteria, runbook dry-runs.
- Acceptance: functional and performance acceptance criteria, reconciliation scripts.
- Start with a small, reversible pilot.
- Validate identity and access first (it unlocks everything).
- Iterate on automation to reduce human error.
- Hold vendor coordination off-sites; define single unified incident command for cutovers.
Orange County’s RFI is now a public focal point for the hard question many IT leaders prefer to avoid: how do you undo the cloud when the organization’s business needs, budgets or risk calculus change? The answers will be technical, contractual and organizational — and they will set a useful precedent for other counties and cities that must reconcile modern cloud adoption with long-term portability, resilience and cost predictability.
Source: GovTech Orange County Seeks Info on Migrating Off Azure
- Joined
- Mar 14, 2023
- Messages
- 101,599
- Thread Author
-
- #2
Orange County Information Technology (OCIT) has formally asked the market how to move its data, applications and cloud services off Microsoft Azure — a move framed as a comprehensive “Cloud Services Migration” RFI that would, if executed, amount to a rare large-scale government cloud exit and a consequential technology and procurement undertaking. The notice asks vendors for approaches, tools, timelines, and cost estimates to relocate application services, networking configurations, storage, databases and virtual machines to an alternative cloud provider, and it emphasizes planning, testing, verification, training and security validation as core deliverables.
Orange County’s RFI appears in public procurement feeds as Opportunity ID 017‑RX1720273 and was reported by industry press in mid‑September 2025; question submissions close on October 6, 2025 and RFI responses are due November 3, 2025. The county’s public procurement notices and aggregator records describe a scope that includes VMs, databases, storage and networking, while also asking vendors to surface realistic timelines, tools and cost models. OCIT is not new to multi‑vendor cloud activity: county documents and press coverage show earlier migrations away from legacy systems (including retirement of an IBM mainframe in FY 2022–23) and selective use of other cloud vendors such as Amazon Web Services and Oracle for particular workloads. OCIT’s FY 2025–26 program and staffing scale are substantial — the organization’s annual budget and recent SaaS choices provide context for the RFI’s ambition.
The RFI is the right first step for OCIT; the real measure of success will be in realistic vendor responses, clear contractual guardrails (especially around data export and continuity), and an incremental migration plan that minimizes disruption while giving county teams the training and documentation they need to operate in the destination environment. Until the county publishes full solicitation documents and the final scope attachments, cost estimates and schedules remain provisional; vendors and observers should treat public estimate bands as illustrative and assume the county will need fully transparent, auditable migration plans to protect critical public services.
Source: Data Center Dynamics Californian county publishes RFI to migrate off Microsoft Azure
Background
Orange County’s RFI appears in public procurement feeds as Opportunity ID 017‑RX1720273 and was reported by industry press in mid‑September 2025; question submissions close on October 6, 2025 and RFI responses are due November 3, 2025. The county’s public procurement notices and aggregator records describe a scope that includes VMs, databases, storage and networking, while also asking vendors to surface realistic timelines, tools and cost models. OCIT is not new to multi‑vendor cloud activity: county documents and press coverage show earlier migrations away from legacy systems (including retirement of an IBM mainframe in FY 2022–23) and selective use of other cloud vendors such as Amazon Web Services and Oracle for particular workloads. OCIT’s FY 2025–26 program and staffing scale are substantial — the organization’s annual budget and recent SaaS choices provide context for the RFI’s ambition. What the RFI actually asks for
The RFI frames the migration as a lifecycle program, not a single tactical lift-and-shift sprint. Public summaries and the procurement listing outline the county’s immediate expectations:- Inventory and assessment of Azure‑hosted assets (applications, VMs, managed services, databases, storage, networking and identity configurations).
- A target architecture and landing zone design in the destination cloud, including identity, networking and security models.
- Migration approaches per workload (lift‑and‑shift, replatform, refactor), with testing, reconciliation and rollback plans.
- Security validation, backup & recovery planning, and compliance mapping (FedRAMP/CJIS/HIPAA or other applicable controls).
- Training, documentation, operational runbooks and a formal handover to county staff.
Why this RFI matters: beyond another procurement
Moving a large public‑sector estate off a hyperscaler is uncommon and strategically significant. Three reasons this RFI is noteworthy:- It signals a willingness by a major U.S. county to consider vendor diversification and the operational implications of leaving a single hyperscaler. That matters politically (contracting, vendor relations) and technically (lock‑in, interoperability).
- It creates a procurement trail and a market signal that vendors and systems integrators will respond to — leading to new “cloud exit” offerings targeted at public agencies.
- It forces an explicit reckoning with the practical mechanics of a cloud exit: identity, provider‑specific managed services, egress costs, licensing portability, and auditable continuity for public records. These are the issues that typically shape feasibility and cost far more than raw compute pricing.
Technical challenges and operational risks
Migrating an entire local government portfolio of services requires coordinated technical workstreams, each carrying distinct challenges and failure modes.1. Discovery and dependency mapping
A full inventory must capture not just VMs and databases, but the dependencies that break assumptions in a new environment: identity bindings, managed services (e.g., Cosmos DB, Azure SQL features), networking peering, private link architectures, monitoring and telemetry pipelines, secrets and key management, and service accounts. Underestimating these dependencies is the single most common root cause of migration overruns.2. Identity and authentication
Microsoft Entra ID (formerly Azure AD) is central to many Azure deployments. Federated sign‑on, managed identities, conditional access policies, service principals and token lifecycles are all tightly coupled to Microsoft’s identity stack. Replacing or federating those identities — or maintaining a hybrid identity model — is often the hardest technical and operational part of a migration. Microsoft’s documentation confirms that Azure AD (now Microsoft Entra ID) remains functionally stable but that names and branding have shifted; migration programs should assume identity is a first‑class migration deliverable.3. Managed‑service feature parity and refactor cost
Many Azure customers use managed platform services (serverless functions, PaaS databases, analytics, key vaults). Those services rarely map one‑to‑one across hyperscalers. Options are:- Lift‑and‑shift (VM exports) — lower code change but higher operational friction and potential license mismatches.
- Replatform (migrate to equivalent managed services) — moderate code/config changes and potential integration work.
- Refactor (rewrite for cloud native) — highest cost and longest timeline but best long‑term portability.
4. Network architecture and connectivity
Rebuilding private connectivity (the equivalent of Azure ExpressRoute), peering, DNS and routing, and ensuring low‑latency interlinking to on‑premises or other clouds is nontrivial. During dual‑run cutovers, you’ll manage cross‑cloud traffic flows that carry egress costs and potential latency impacts.5. Data integrity, continuity and legal holds
Public records, court filings, legal holds and audit trails require provable continuity and immutability during migration. Any data reconciliation failures or incomplete exports can have legal consequences. Agencies must retain auditable provenance and a defensible rollback posture. FedRAMP and other government guidance emphasise customer responsibilities in shared‑security models, which makes documenting control ownership critical during migration.6. Costs: egress, dual‑running, and licensing
Data egress and temporary dual‑run environments are major cost drivers. Licensing models that differ by cloud or are tied to specific vendor bundles can materially change OPEX and CAPEX. Public solicitation summaries show each of these concerns explicitly as areas for vendor responses.Costs, estimates and the hard truth about price tags
Public procurement summaries and bid aggregators offer estimates, but they vary and should be treated as indicative, not contractual.- One procurement aggregator listed the RFI and produced an automated range; different aggregators show different machine‑generated estimates. These are not the county’s official budget numbers.
- Industry reporting has repeated a $5 million–$15 million band in press summaries; however the underlying aggregator warns that its estimates were generated with AI and are illustrative. That discrepancy matters — a full county‑wide program can run much higher depending on scope, while a narrower portfolio migration could fit a smaller band. Treat any public estimate as uncertain until the final solicitation documents and scope attachments are released.
Strategic options the county (and vendors) will likely evaluate
The RFI invites market feedback on different target strategies. Practically, there are four broad paths — each with tradeoffs:- Move to another hyperscaler (AWS, Google Cloud Platform, Oracle Cloud) for managed feature parity and scale. This swaps one ecosystem for another and may preserve some managed service benefits, but it can still create new forms of vendor lock‑in.
- Adopt a multi‑cloud strategy, placing workloads where cost, compliance and functionality fit best. This reduces single‑vendor dependence but raises operational complexity and tooling overhead.
- Repatriate sensitive or compliance‑heavy workloads to on‑premises or colocated data centers to gain control and avoid recurring hyperscaler costs. This increases capital expense and operational burden but offers stronger control over data residency and egress.
- Pursue provider‑agnostic modernization (containers, Kubernetes, IaC, GitOps, service mesh) to reduce future lock‑in risk. This requires investment in refactoring and may pay off over multiple years with greater portability.
Procurement, contracts and legal traps to watch
Large cloud exits often stumble on contractual language and licensing:- Check termination rights, data export guarantees, and the format in which data can be exported. Vendors must demonstrate export capabilities for all asset types.
- Licensing portability: confirm whether existing licenses are transferable, convert to BYOL, or require renegotiation. Differences in CPU/vCPU accounting across clouds can also change billable units.
- Audit and retrospective billing clauses may surface during migration windows — propose contractual protections (escrowed configs, migration SLAs, indemnities) for the customer.
- For government customers, ensure the destination cloud or architecture meets applicable compliance frameworks (FedRAMP, CJIS, HIPAA). FedRAMP has been evolving its model and guidance in 2024–25, so proposals should explicitly map how controls will be maintained in the target architecture.
How strong vendor responses should be structured
OCIT’s RFI is a market conversation. Respondents that stand out will bring depth, realism and auditability. Recommended structure for proposals:- Executive summary with clear assumptions and a proposed phased program.
- Discovery methodology and tooling to deliver a complete resource inventory within a defined SLA.
- Migration roadmap split into prioritized waves (pilot → non‑critical → critical), with measurable acceptance criteria for each wave.
- Security, compliance and identity plan mapping every control to FedRAMP/State policy responsibilities.
- Cost model that separates professional services, tooling, egress and dual‑run operational costs.
- Reversibility and rollback plans for every cutover, with defined triggers and KPIs.
- Staffing, knowledge transfer, runbooks, and training schedules for OCIT teams.
- Case studies and three verified government engagements of similar scale and complexity.
Broader implications for the public sector
If Orange County proceeds beyond this RFI to a large‑scale migration, the effects could ripple across state and local government procurement and cloud strategies:- Expect more explicit “exit” planning language in future cloud contracts (data portability, escrow, exit SLAs).
- Vendors will likely refine packaged “cloud exit” offerings for the public sector, blending tooling, compliance artifacts and guaranteed migration SLAs.
- Other counties and municipalities will reassess their cloud contracts and contingency clauses, possibly leading to multi‑vendor or hybrid strategies becoming more common in government IT portfolios.
Strengths and risks in OCIT’s approach so far
Strengths- The RFI is the right first step: it seeks market input and avoids premature technical commitments, which reduces procurement risk and invites more disciplined proposals.
- OCIT’s prior use of multiple cloud providers and adoption of SaaS for finance/HR shows pragmatic, workload‑specific decision making rather than ideological single‑vendor bias.
- The RFI’s emphasis on testing, verification and staff training demonstrates awareness that people and processes are as important as code.
- The procurement summaries do not publish OCIT’s desired target environment or detailed contractual constraints — gaps that may lead to optimistic or unrealistic vendor proposals. Until full solicitation documents are released, many important program variables remain unknown.
- Egress and network transit costs can be large and are often underestimated in early planning. These costs can reshape the business case for migration.
- Identity coupling (Microsoft Entra ID), managed service incompatibilities and licensing portability are practical blockers that can force expensive refactors if not handled properly.
Practical timetable and staged approach (recommended by best practice)
A modeled program for a migration of this scope typically includes the following phases and approximate sequencing (subject to the county’s priorities and workload complexity):- Discovery & classification (4–12 weeks): inventory, dependency mapping, criticality ranking.
- Pilot wave (8–16 weeks): migrate a small set of non‑critical services to validate tools and cutover processes.
- Wave planning & replatforming (3–12 months): execute batch migrations with iterative learnings.
- Critical cutovers & final reconciliation (3–9 months): migrate high‑criticality systems with extended rollback windows and audit validation.
- Post‑migration hardening (3–6 months): decommission old accounts, optimize costs and complete knowledge transfers.
Conclusion
Orange County’s Cloud Services Migration RFI is a significant market signal: a major U.S. county is formally opening the question of leaving Microsoft Azure for selected workloads and asking practitioners for concrete migration approaches, timelines and costs. That signal will catalyze vendor offerings, procurement scrutiny and operational planning across the public sector. The technical and contractual complexity of a cloud exit — identity, managed services, egress, licensing and legal continuity for public records — means successful proposals must be pragmatic, staged and explicit about assumptions.The RFI is the right first step for OCIT; the real measure of success will be in realistic vendor responses, clear contractual guardrails (especially around data export and continuity), and an incremental migration plan that minimizes disruption while giving county teams the training and documentation they need to operate in the destination environment. Until the county publishes full solicitation documents and the final scope attachments, cost estimates and schedules remain provisional; vendors and observers should treat public estimate bands as illustrative and assume the county will need fully transparent, auditable migration plans to protect critical public services.
Source: Data Center Dynamics Californian county publishes RFI to migrate off Microsoft Azure
Similar threads
- Article
- Replies
- 0
- Views
- 27
- Article
- Replies
- 0
- Views
- 25
- Article
- Replies
- 0
- Views
- 28
- Replies
- 0
- Views
- 41
- Replies
- 0
- Views
- 59