cms.teleglobals.com

Nesta Lab LLP Moves from a Fragmented Multi-Cloud Setup to a Unified, Secure AWS Environment

Executive Summary 

Nesta Lab LLP was running workloads across three separate environments: Microsoft Azure, Google Cloud Platform, and on-premises servers. As the company grew, managing three platforms created real operational problems: inconsistent security controls, fragmented monitoring, and no unified way to scale infrastructure. 

Nesta Lab partnered with Teleglobal to consolidate everything onto AWS. The migration was planned and executed in five structured phases, covering all workloads from source environments to a secure, multi-AZ AWS architecture in the Mumbai region. The cutover was completed with minimal data loss, and the new environment gave the team a single platform to manage, secure, and scale. 

About Nesta Lab LLP 

Nesta Lab LLP is a technology company running application services, compute workloads, and data processing systems that require consistent availability and strong security. Over time, their infrastructure had grown across three separate environments: Microsoft Azure, Google Cloud Platform, and their own on-premises servers. 

Each environment had its own tooling, billing, and security model. What had started as a practical arrangement became increasingly difficult to manage as workloads grew and the team needed tighter control over performance, security, and costs. 

The Challenge 

Running workloads across Azure, GCP, and on-premises simultaneously created five problems that were getting harder to manage as the business scaled. 

  1. Operational complexity 

Every administrative task required switching between different platforms, each with its own console, APIs, and support model. This added overhead to routine operations and slowed the team down. 

  1. Security gaps across environments 

Enforcing consistent security policies, encryption standards, and access controls across three separate environments was difficult. Each platform had its own identity and access model, and making them work coherently was a constant challenge. 

  1. No unified approach to scaling 

Scaling workloads required separate decisions in separate environments. There was no single mechanism to add capacity quickly and consistently across the infrastructure. 

  1. Fragmented monitoring 

Without a centralised monitoring layer, the team had incomplete visibility into system health. Issues were harder to detect and took longer to diagnose because there was no single view across all environments. 

  1. Cost inefficiency 

Managing resources across multiple platforms made it difficult to track total spend, identify waste, or optimise resource utilisation. Each platform had its own pricing model and cost management tools. 

Migration Approach 

Teleglobal worked with Nesta Lab to design a structured migration using AWS Application Migration Service (MGN). The migration was executed in five phases, each with clear objectives and a rollback plan in place throughout. 

Phase 1: Assessment and planning 

Before moving anything, Teleglobal documented the full situation: server configurations, application dependencies, data flows, and security requirements across all three source environments. Based on this, the target AWS architecture was designed with a multi-AZ VPC in ap-south-1, public and private subnets, and secure network routing. 

Phase 2: AWS environment setup 

The destination environment was built and hardened before migration began. AWS IAM, VPC configuration, subnets, gateways, security groups, CloudWatch monitoring, and KMS encryption were all configured upfront so workloads would land in a ready and secure environment. 

Phase 3: Migration enablement and replication 

AWS Application Migration Service was configured and replication agents were installed on source servers across Azure, GCP, and on-premises. MGN continuously replicated workload state to AWS using encrypted replication, with no disruption to running services. 

Phase 4: Testing and cutover 

Test launches were performed for each workload to validate behaviour in the AWS environment before committing to cutover. The final cutover was executed in a planned maintenance window. A rollback plan was prepared and available throughout. 

Phase 5: Post-migration validation 

After cutover, each application was verified for functionality, performance, and data integrity. This confirmed zero data loss and that all workloads were operating correctly in the new environment. 

What Was Built on AWS 

Nesta Lab LLP Moves from a Fragmented Multi-Cloud Setup to a Unified, Secure AWS Environment

Compute and networking 

Amazon EC2 instances, including GPU-enabled instances, are deployed inside a secure multi-AZ VPC. An Application Load Balancer distributes traffic across availability zones, and private subnets keep backend workloads isolated from the public internet. 

Security and access control 

AWS IAM governs access across the environment with least-privilege policies. AWS WAF protects applications at the edge. AWS KMS handles encryption of all data at rest and in transit, with centralised key management. 

Storage and analytics 

Amazon S3 provides durable object storage for application data and backups. Amazon OpenSearch Service handles search and analytics workloads that were previously split across separate tools on different platforms. 

Monitoring and notifications 

Amazon CloudWatch provides a single monitoring, logging, and alerting layer across the entire environment. Amazon SNS, SQS, and SES handle messaging and notification workflows, replacing what was previously fragmented across platforms. 

AWS Services Used 

Service How It Was Used 
AWS Application Migration Service (MGN) Agent-based encrypted replication of workloads from Azure, GCP, and on-premises to AWS EC2 
Amazon EC2 Scalable compute for migrated workloads, including GPU-enabled instances 
Amazon VPC Multi-AZ network isolation with public and private subnets and secure routing 
Application Load Balancer (ALB) Traffic distribution across availability zones for high availability 
AWS WAF Application-layer protection against web threats at the perimeter 
AWS IAM Centralised identity and access management with least-privilege policies 
AWS KMS Encryption key management for data at rest and in transit 
Amazon S3 Object storage for application data, backups, and archives 
Amazon OpenSearch Service Centralised search and analytics replacing fragmented tools 
Amazon CloudWatch Unified monitoring, logging, metrics, and alerting across all workloads 
Amazon SNS, SQS, SES Messaging, queuing, and notification services 

Results 

The migration delivered practical improvements across every area that had been causing problems. 

Area Before After 
Infrastructure management Three separate platforms to manage Single unified AWS environment 
Security enforcement Inconsistent across Azure, GCP, and on-prem Centralised IAM, WAF, and KMS across all workloads 
Availability No unified high-availability design Multi-AZ architecture with ALB for fault tolerance 
Monitoring and visibility Fragmented across multiple tools Single CloudWatch view across the entire environment 
Cost management Multiple billing models, difficult to optimise Single platform, easier to track and control 
Data integrity Risk during any cloud-to-cloud move Zero data loss confirmed post-migration 

 “By migrating to AWS, we have streamlined our infrastructure and significantly improved our operational efficiency. The centralised environment provides better control, enhanced security, and the scalability required to support our growing business needs.”  

— Head of Infrastructure, Nesta Lab LLP 

What’s Next 

With a stable, unified AWS foundation in place, Nesta Lab is now in a position to optimise and expand: 

  1. Right-sizing EC2 instances and evaluating Reserved Instance pricing as workload patterns stabilise on AWS 
  1. Expanding CloudWatch coverage with custom dashboards and automated alerting thresholds 
  1. Evaluating AWS AI and ML services to add intelligence to existing application and data processing workloads 
  1. Strengthening the security posture further with Amazon GuardDuty for threat detection and AWS Config for continuous compliance monitoring