Federal cloud migration, 7Rs done right.

FedRAMP landing zones in AWS GovCloud and Azure Government. 7Rs portfolio analysis, wave-based execution, and cutovers that respect the ATO boundary.

Overview — federal cloud migration beyond the slideware

Every federal agency has a cloud strategy slide deck. Far fewer have a cloud portfolio that actually delivers cost savings, mission agility, and defensible security. The gap is not strategy — it is disciplined execution: a per-workload 7Rs decision, a landing zone that inherits FedRAMP controls, waves that ship every 8-12 weeks, reconciled cutovers, and honest cost reporting to the sponsor. That's the work.

Precision Delivery Federal LLC helps agencies close that gap. We are a SAM.gov registered small business (UEI Y2JVCZXT9HP5, CAGE 1AYQ0, NAICS 541512). Our cloud migration practice is grounded in hands-on engineering, not just advisory slides. We write the Terraform, we build the CI/CD, we author the SSP updates, we run the cutovers at 2 AM.

Our technical stack

LayerPrimaryAlternatesWhen we use it
Target cloudsAWS GovCloud (US)Azure Government, Azure Gov IL5, AWS SecretPer agency / IL requirement.
Landing zoneAWS Control Tower + SCPsAWS LZA for GovCloud, Azure Landing ZonesMulti-account / multi-subscription baselines.
IaCTerraform + terragruntCloudFormation, Bicep, PulumiTerraform default for multi-cloud portability.
DiscoveryAWS Application Discovery ServiceAzure Migrate, CAST HighlightPortfolio inventory + dependency mapping.
Data migrationAWS DMS, Snowball EdgeAzure Data Box, AzCopy, rsync at scaleScale-dependent.
Server migrationAWS MGN (formerly CloudEndure)Azure Migrate, Carbonite MigrateRehost use cases.
ContainerizationEKS, ECSAKS, OpenShiftReplatform to containers when justified.
CI/CDGitHub Actions, GitLab CIAWS CodePipeline, Azure DevOpsFederal GitHub or GitLab tenants preferred.
ObservabilityCloudWatch + Grafana + OpenTelemetryAzure Monitor, Datadog GovernmentUnified telemetry across clouds.
FinOpsAWS Cost Explorer + CURAzure Cost Management, CloudHealthAgency-level chargeback and showback.

Federal use cases

  • Data-center exit — shuttering a government data center and migrating workloads to GovCloud in waves.
  • Commercial-to-GovCloud repatriation — workloads built in commercial AWS / Azure moved to GovCloud for compliance.
  • IL5 build-out for DoD mission systems — Azure Government IL5 landing zones supporting DoD components. DoD page.
  • VA modernization cloud target — landing zone for VA modernization workstreams. VA page.
  • USDA mission cloud — mixed SaaS + PaaS + IaaS consolidation. USDA page.
  • FedRAMP-high for HHS workloads — CMS and NIH program migrations.
  • Cloud-native greenfield for SBIR pilots — new capabilities built natively in GovCloud.
  • EPA environmental data platform migration.
  • DOI / BLM geographic data platform migration.
  • DHS component IT consolidation. DHS page.

Reference architectures

1. FedRAMP High landing zone in AWS GovCloud

Organization with accounts for: Management, Log Archive, Audit, Security Tooling, Network, Shared Services, and per-workload Workload accounts (Dev/Test/Prod). SCPs enforce region restrictions (GovCloud-only), deny root actions, and require KMS encryption on all data services. CloudTrail Organization Trail lands in the Log Archive account S3 with MFA-delete; AWS Config aggregator surfaces drift. Networking: Transit Gateway hub-and-spoke, PrivateLink for data services, egress through a centralized inspection VPC with AWS Network Firewall. Every workload account inherits these controls; the SSP references the landing zone baseline directly.

2. Azure Government IL5 landing zone

Management Group hierarchy: Root → Platform → Landing Zones → Decommissioned. Azure Policy enforces IL5 baseline: region restrictions, CMK requirements, private endpoints, Defender for Cloud. Bastion-only access. Networking via vWAN with regional hubs and Azure Firewall Premium. Log Analytics workspace with Sentinel for SOC integration.

3. Hybrid data-center-to-cloud wave

A data-center with 200 applications gets decomposed into 25 waves of ~8 applications each. Wave 1: low-risk static content sites (rehost). Wave 2: stateless web apps (replatform to ECS). Wave 3-5: data-heavy apps (replatform with RDS migration). Wave 6+: higher-risk tier-1 systems (refactor using strangler-fig patterns — see our legacy modernization capability).

Delivery methodology

  1. Mobilize (2-4 weeks) — stakeholder alignment, governance model, CCB formation.
  2. Discover (4-8 weeks) — portfolio inventory, dependency mapping, business criticality rating.
  3. Decide (2-4 weeks) — 7Rs decision per app, wave plan, landing zone design.
  4. Land (4-6 weeks) — build the landing zone, CI/CD, shared services.
  5. Migrate (ongoing, wave-by-wave) — 8-12 week waves, each ending with a measurable closeout.
  6. Optimize — rightsizing, RI/SP purchases, Graviton/ARM evaluation, architecture improvements.
  7. Retire — formal decommissioning of source systems; ATO boundary updates.

Engagement models

  • Fixed-price landing zone — bounded 8-12 week build with defined deliverables.
  • Fixed-price per wave — predictable per-wave pricing for migration factories.
  • T&M migration program — for long-horizon portfolios.
  • TMF, WCF, and agency modernization funds — shape the business case + deliver.
  • Sub to prime — landing-zone and migration specialist inside a prime's team.

Maturity model

  • Level 1 — Ad hoc cloud usage: scattered accounts, no central governance.
  • Level 2 — Managed landing zone: multi-account org, baseline SCPs, central logging.
  • Level 3 — Productized landing zone: self-service account vending, reusable IaC modules, SSP-inheritance documented.
  • Level 4 — FinOps-integrated: chargeback, rightsizing, committed-use planning.
  • Level 5 — Platform engineering: internal developer platform with paved paths for compliant deployment.

Deliverables catalog

  • Portfolio inventory (CSV + dependency graph).
  • 7Rs decision matrix.
  • Wave plan with dependencies.
  • Landing zone IaC (Terraform modules).
  • SCPs / Azure Policy baselines.
  • Shared services (logging, monitoring, backup).
  • Per-app migration runbooks.
  • Reconciliation and validation reports.
  • Cutover plans + rollback playbooks.
  • SSP updates and ATO package inputs.
  • Decommissioning checklists.
  • Cost model + realized-savings reports.

Technology comparison — honest tradeoffs

OptionStrengthsWeaknessesFederal fit
AWS GovCloudBroadest FedRAMP-High services, strong IL5, mature partners.Region lag behind commercial, pricing premium.Very high — default choice for many agencies.
Azure GovernmentDeep DoD IL5/IL6 footprint, strong M365 integration.Fewer services vs commercial, pricing premium.Very high — DoD and M365-heavy agencies.
Oracle Gov CloudOracle DB lift-and-shift, JWICS / DoD niches.Smaller ecosystem.Medium — Oracle-heavy portfolios.
Google Public SectorAssured Workloads, data analytics strength.Limited FedRAMP-High services.Medium — analytics-focused.
IBM Cloud for GovernmentIBM legacy integration.Smaller ecosystem.Low-medium.
On-prem Kubernetes (OpenShift)Full sovereign control.Ops burden on agency.Case-by-case.

Federal compliance mapping

Landing zones are designed so the workload's SSP inherits most baseline controls. Representative coverage:

  • AC-2, AC-3, AC-6 — SSO (Login.gov, agency IdP), SCP / policy-enforced least privilege, break-glass procedures.
  • AU-2, AU-6, AU-12 — CloudTrail Organization Trail / Azure Activity Log with immutable storage, centralized SIEM forwarding.
  • SC-7 — centralized ingress/egress inspection, private endpoints for data services.
  • SC-12, SC-13, SC-28 — KMS / Key Vault with CMKs, TLS 1.3 everywhere, at-rest encryption mandated by policy.
  • CP-9, CP-10 — cross-account backups, DR runbooks tested at least annually.
  • CM-2, CM-3, CM-8 — IaC as the authoritative configuration, drift detection, automated inventory.
  • IR-4, IR-5, IR-6 — GuardDuty / Defender for Cloud / Sentinel integrated with the agency SOC.

Sample technical approach — 50-app portfolio migration

A federal agency wants to exit a leased data center within 24 months. Portfolio: 50 applications, mix of .NET / Java / LAMP / COBOL, ranging from static content sites to a mission-critical case-management system.

Weeks 1-8: Mobilize + discover. Application Discovery Service agents on every VM; dependency graph built. Business criticality tier assigned per app; ATO status documented; data classification recorded.

Weeks 9-12: Decide. 7Rs decisions. 6 apps → retire (no longer used). 4 apps → retain (SaaS already). 18 apps → rehost via MGN. 14 apps → replatform (containerize or RDS). 6 apps → refactor (strangler-fig). 2 apps → repurchase (switch to SaaS equivalent).

Weeks 13-18: Land. FedRAMP High landing zone built. CI/CD factory for MGN cutovers. Shared services operational.

Weeks 19+: Migrate in waves of 8 apps, running 3 waves in parallel. Each wave: 6 weeks plan → 4 weeks build → 2 weeks cutover + validate. Rehost waves go first for velocity and confidence; replatform and refactor waves interleaved.

Month 24: final decommissioning. Data center terminated. Realized savings: TBD, reported monthly to the sponsor against the original business case.

Related capabilities, agencies, vehicles, insights

Federal cloud migration, answered.
What is the 7Rs framework?

AWS's expansion of Gartner's 6Rs: Retire, Retain, Rehost, Relocate, Replatform, Repurchase, Refactor. Decision framework for every workload in a portfolio.

GovCloud or Azure Government?

Depends on existing investment, required impact levels, and target services. Often both per program.

FedRAMP-inheritable landing zones?

Yes. SCPs / Azure Policy, CMK-backed KMS, centralized logging, hub-and-spoke networking, NIST 800-53 inheritance documented.

Can you migrate to IL5?

Yes. Azure Gov IL5 and AWS GovCloud IL5 CC SRG-aligned.

How long does migration take?

Single app 6-12 weeks. 50-app portfolio 12-24 months with waves of 5-8 parallel. Data-center exit multi-year.

Cloud-to-cloud migrations?

Yes. Commercial to GovCloud repatriation and Azure Gov to AWS GovCloud both supported.

Data gravity and egress?

Modeled in the business case. Snowball Edge / Data Box for bulk; reserved bandwidth for live migrations.

Containerization during migration?

When it's the right step per workload; not every workload should be containerized.

TMF alignment?

Yes. Business case shaping, milestone decomposition, financial reporting.

Pricing?

Fixed-price per wave, T&M for long-horizon portfolios, often blended.

Often deployed together.
1 business day response

Waves that actually land.

Federal cloud migration engineered to ship and be audited.

[email protected]
UEI Y2JVCZXT9HP5CAGE 1AYQ0NAICS 541512SAM.GOV ACTIVE