Orange County’s IT shop has opened a formal conversation about moving major workloads off Microsoft Azure, issuing a Request for Information (RFI) that explicitly asks the market how to migrate applications, virtual machines, storage, databases and networking from Azure to another cloud — a move that, if pursued, would be a rare and consequential “cloud exit” for a large U.S. county.
Orange County Information Technology (OCIT) published an RFI describing a comprehensive Cloud Services Migration effort: the county seeks vendor input on approaches, tools and costs to transition workloads currently running on Microsoft Azure to an alternative cloud provider. The RFI lists application services, networking configurations, storage, databases and virtual machines as in-scope and frames the engagement around planning, testing, verification, training and security validation. Submission and question deadlines reported in public summaries are: questions due by 4 p.m. PT on Oct. 6 and RFI responses due by 4 p.m. PT on Nov. 3.
OCIT is not new to cloud diversity: county budget documents and recent public records show that some county systems already run on Amazon Web Services and Oracle cloud applications have been adopted for finance/HR modernization, indicating a multi-vendor posture for certain workloads. OCIT’s FY 2025–26 budget and leadership details confirm the scale of the organization and that KC Roestenberg serves as CIO.
Timeframes depend on workload complexity. A phased program that pilots and migrates incrementally can take months to years; a wholesale, high-urgency migration can be run in compressed windows but at significantly higher risk and cost.
Key legal/commercial items to investigate:
For vendors, integrators and county IT leaders watching closely, the important takeaways are practical: plan for staggered migrations, prioritize identity and data integrity, cost-evaluate egress and dual-running windows, and put reversibility at the heart of each migration phase. The RFI’s publication is the beginning — not the conclusion — of a complex, high-stakes program that will test Orange County’s technical discipline, procurement rigor and readiness to operate across multiple cloud ecosystems.
Orange County’s RFI is now a public focal point for the hard question many IT leaders prefer to avoid: how do you undo the cloud when the organization’s business needs, budgets or risk calculus change? The answers will be technical, contractual and organizational — and they will set a useful precedent for other counties and cities that must reconcile modern cloud adoption with long-term portability, resilience and cost predictability.
Source: GovTech Orange County Seeks Info on Migrating Off Azure
Background
Orange County Information Technology (OCIT) published an RFI describing a comprehensive Cloud Services Migration effort: the county seeks vendor input on approaches, tools and costs to transition workloads currently running on Microsoft Azure to an alternative cloud provider. The RFI lists application services, networking configurations, storage, databases and virtual machines as in-scope and frames the engagement around planning, testing, verification, training and security validation. Submission and question deadlines reported in public summaries are: questions due by 4 p.m. PT on Oct. 6 and RFI responses due by 4 p.m. PT on Nov. 3. OCIT is not new to cloud diversity: county budget documents and recent public records show that some county systems already run on Amazon Web Services and Oracle cloud applications have been adopted for finance/HR modernization, indicating a multi-vendor posture for certain workloads. OCIT’s FY 2025–26 budget and leadership details confirm the scale of the organization and that KC Roestenberg serves as CIO.
Why this RFI matters: the politics and the practice of leaving a hyperscaler
Moving onto a hyperscale cloud like Azure is now routine for government agencies; moving off one is not. Hyperscalers invest heavily in government certifications, compliance programs and integrations that government IT teams rely on — which is exactly what creates vendor lock-in over time. Orange County’s RFI is therefore important for three reasons:- It publicly acknowledges a county-level willingness to consider vendor diversification or a platform change at scale.
- It sets a formal procurement trail that vendors and consulting firms must respond to, creating an arena for commercial and technical proposals.
- It forces a practical reckoning with cloud exit mechanics — the technical, contractual and operational tasks required to successfully leave a provider without disrupting critical public services.
What OCIT is asking the market to do (summary of RFI scope)
The public reporting and procurement notices show OCIT framing the effort as comprehensive, requiring vendors to demonstrate capacity across the lifecycle:- Inventory and assessment of Azure-hosted assets (apps, VMs, databases, storage, networking).
- Migration planning: mapping services to a target cloud platform, target architecture and landing zones.
- Reconfiguration and rehosting/replatforming as needed so applications run correctly in the chosen destination.
- Data migration and integrity verification, including rollback plans and reconciliation.
- Security, backup and disaster recovery design in the target environment.
- Training, documentation, runbooks and operational handover.
- Test plans that validate functional behavior, performance baselines and RTO/RPO goals.
What we can verify (hard facts)
- The RFI exists and was publicly reported by Government Technology’s Industry Insider — California on Sept. 19, 2025. The article summarizes the RFI’s in-scope areas and the submission timeline.
- A procurement aggregator captured the solicitation posting (ID 017‑RX1720273) and reproduced key elements including response deadlines and a short description of the migration scope. That record lists OCIT as the issuing agency.
- OCIT’s public materials confirm the department’s size, mission and CIO; county budget documents are available on the county’s budget website and the Auditor‑Controller / Clerk‑Recorder have documented prior cloud activity such as migrations to AWS for particular systems.
Technical considerations: how you actually move off Azure
Migrating an entire county IT estate from one cloud to another is not a single technical activity — it is a coordinated program made up of multiple projects. The technical workstreams will typically include:1. Discovery and classification
- Build a complete inventory of Azure resources (VMs, managed services, databases, storage accounts, networking, identity/Entra configurations, monitoring/telemetry flows).
- Classify workloads by criticality, compliance posture, licensing constraints and coupling to Azure-native services (e.g., Azure AD/Entra, Cosmos DB, Azure SQL features, Managed Identities).
2. Target architecture and landing zone design
- Define the target provider’s landing zones, identity model, network topology and security posture.
- Prepare for federated identity (if remaining on Microsoft Entra) or a new identity architecture — identity is often the hardest dependency to migrate cleanly.
3. Migration pattern per workload
- Lift-and-shift: VM exports and direct rehosting when application compatibility and licensing permit.
- Replatform: Minor changes to use target cloud managed services (for example, moving from Azure SQL to a managed RDBMS offering).
- Refactor: Application rewrites for cloud-native services (containerization, serverless) — highest cost and longest timeline.
- Data replication/sync and final cutover with reconciliation.
4. Network and connectivity
- Recreate network topologies, peering and dedicated connectivity (e.g., equivalents to Azure ExpressRoute) — low-latency backhaul and secure private links are often required for integrated services.
- Test failover, disaster recovery and cross-region routing.
5. Security, compliance and continuity
- Ensure encryption keys and key management strategy migrate or are re-provisioned with secure rollover.
- Revalidate FedRAMP, CJIS, HIPAA or other controls relevant to county workloads; maintain audit trails across migration.
- Run realistic RTO/RPO exercises.
6. Operations and runbooks
- Rebuild monitoring, alerting and runbooks (new console, telemetry, dashboards).
- Train staff on operational differences and escalations.
Costs, timeframes and procurement realities
Moving at this scale is expensive and complex. Typical cost drivers include:- Inventory and discovery tooling and consulting hours.
- Data egress fees and network transit costs (some providers charge for transferring data out).
- Staff time for testing, remediation and training.
- Licensing changes (some vendor licenses are tied to a cloud or require different models on another provider).
- Temporary dual-running costs while both environments are live for cutover windows.
Timeframes depend on workload complexity. A phased program that pilots and migrates incrementally can take months to years; a wholesale, high-urgency migration can be run in compressed windows but at significantly higher risk and cost.
Vendor lock-in, contracts and legal traps
A core challenge in any cloud exit is disentangling from provider-specific managed services and licensing. Orange County’s RFI specifically contemplates reconfiguring applications and verifying compatibility — an implicit recognition of lock-in risks.Key legal/commercial items to investigate:
- Contract termination rights, data export guarantees and the format of exported data.
- Licensing portability (are current licenses transferable, do they convert to BYOL or license-included models).
- Audit clauses and retrospective billing adjustments (important if CPU/vCPU accounting differs between providers).
- Service-level commitments for migration support (who is responsible if a migration activity causes extended outage).
Strategic options Orange County might be weighing
Based on common industry options and signals from county documents (Oracle adoption for finance/HR; pockets of AWS usage), the county appears to be embracing a hybrid/multi-cloud posture rather than a single-provider lock-in. Possible target strategies include:- Move to another hyperscaler (AWS, Google Cloud, Oracle Cloud) for parity of managed services and scale.
- Repatriate sensitive workloads to on-premises or colocation for control and predictable costs.
- Implement a multi-cloud architecture where workloads are placed on the most appropriate platform by cost, compliance and capability.
- Adopt a provider-agnostic operating model using containers and infrastructure-as-code to reduce future lock-in risk.
Practical risks specific to a county migration
- Service disruption risk for public-facing systems (courts, clerk-recorder, public safety interfaces) with real-world consequences.
- Data integrity risk during mass migrations and during the window when active writes occur.
- Identity and access management risk: migrating or federating Entra/Azure AD requires careful mapping or users will lose access.
- Regulatory and continuity risk: public records and legal holds must be preserved with auditable provenance.
- Vendor coordination risk: managing triage across vendor boundaries during incidents can cause time-to-resolution escalation.
How vendors should respond to the RFI (practical advice)
For firms planning a response, the county will likely evaluate proposals on technical depth, proven migration experience for similar government customers, security posture and clarity on costs and timelines. A strong response should include:- A detailed discovery methodology and representative tooling to produce an inventory within a defined SLA.
- A migration roadmap with deliverables and measurable acceptance criteria for each phase.
- A reversibility plan and rollback triggers for each cutover.
- Security and compliance mapping (how controls will be preserved or replaced in the target environment).
- Staffing and knowledge transfer plans, including training materials and runbooks.
- Pricing models that separate professional services, tooling and any estimated transient dual-running costs.
What this means for other cities and counties
If Orange County proceeds beyond an RFI to a formal solicitation and ultimately executes a migration, it will create a public case study on how a large county executes a hyperscaler exit. That could have ripple effects:- Vendors will refine “cloud exit” service offerings tailored to public sector procurement requirements.
- Other counties will re-examine their own cloud contracts, export capabilities and contingency clauses.
- Legislative and audit bodies may start requiring clearer exit strategies and data portability guarantees in cloud contracts for public agencies.
Strengths of OCIT’s approach so far
- The RFI is the right first step: it invites market input rather than pre-committing to a single technical plan, which lowers procurement risk and improves market discipline.
- OCIT shows pragmatic multi-cloud behavior in existing procurements (some AWS usage; Oracle SaaS for finance/HR), suggesting a willingness to match workloads to the best tool rather than a dogmatic single‑vendor stance.
- The RFI’s explicit emphasis on testing, documentation and staff training shows awareness that people and processes matter as much as tooling.
Risks and weaknesses (what to watch for)
- The RFI summaries do not publicly disclose the county’s desired target environment or the contractual and budgetary constraints that will define feasibility; without that detail, bidders may produce optimistic or unrealistic plans.
- If the county underestimates egress/networking costs, the financials will shift quickly once data transfer volumes are known.
- Identity and vendor-managed services coupling (e.g., platform-provided identity, analytics or database features unique to Azure) may force expensive refactors.
- A political or schedule-driven rush to move critical systems increases the chance of outages or prolonged remediation.
What to expect next (procurement timeline and signals)
- The RFI question deadline and submission deadline spelled out in the public summaries (Oct. 6 and Nov. 3) suggest the county intends to gather market input quickly and then decide whether to proceed to an RFP or a different procurement vehicle.
- Vendors that bid should expect follow-up engagements such as vendor conferences, capability demonstrations and requests for clarification.
- Watch for attachments in subsequent procurement notices that disclose inventory baselines, performance baselines and regulatory constraints — those documents will materially change bidders’ costing and approach.
Bottom line: a test case for cloud strategy in local government
Orange County’s RFI is a significant procurement signal: it shows a large county is actively querying the market on how to leave a hyperscaler while emphasizing testing, security and operational readiness. That public posture is both pragmatic and audacious: pragmatic because it starts with discovery and market input; audacious because it contemplates a large-scale exit that many public agencies avoid precisely because it’s hard.For vendors, integrators and county IT leaders watching closely, the important takeaways are practical: plan for staggered migrations, prioritize identity and data integrity, cost-evaluate egress and dual-running windows, and put reversibility at the heart of each migration phase. The RFI’s publication is the beginning — not the conclusion — of a complex, high-stakes program that will test Orange County’s technical discipline, procurement rigor and readiness to operate across multiple cloud ecosystems.
Appendix: practical checklist for an exit-focused RFP (vendor and buyer checklist)
- Inventory: automated discovery, dependency mapping, configuration snapshots.
- Identity: Entra/Azure AD federation, service principals, managed identity mapping plan.
- Data: export formats, encryption key rollover, egress cost modeling.
- Applications: compatibility matrix (Azure-native to target equivalents), refactor vs rehost decisions.
- Network: private connectivity, routing, firewall rules, VPN/ExpressRoute analogs.
- Security & Compliance: FedRAMP, CJIS, HIPAA mapping and evidence of control continuity.
- Operations: monitoring, logging, incident response, runbooks, training.
- Contract: data ownership, export guarantees, liability for migration-caused outages.
- Pilot: clearly scoped POC, rollback criteria, runbook dry-runs.
- Acceptance: functional and performance acceptance criteria, reconciliation scripts.
- Start with a small, reversible pilot.
- Validate identity and access first (it unlocks everything).
- Iterate on automation to reduce human error.
- Hold vendor coordination off-sites; define single unified incident command for cutovers.
Orange County’s RFI is now a public focal point for the hard question many IT leaders prefer to avoid: how do you undo the cloud when the organization’s business needs, budgets or risk calculus change? The answers will be technical, contractual and organizational — and they will set a useful precedent for other counties and cities that must reconcile modern cloud adoption with long-term portability, resilience and cost predictability.
Source: GovTech Orange County Seeks Info on Migrating Off Azure