This video covers defining cloud network governance.
- [Instructor] So now, let's take a quick look at cloud network governance. So what's important here is that this is about setting limits and not about control. So, while governance may work with security, this is about setting guard rails in terms of who can use the network and what ways they can use the network. Not just granting or not granting access to the network as we do with security. This is about focusing on creating policies, or basically ways that we're putting limits on the way the network is going to be utilized. This is more about ops, operations, than performance.
This is about our ability to in essence operate the network in such a way that we're eliminating saturation of resources, we're eliminating outages, we're eliminating some of the common problems by placing the limits around who's using the network and what they're doing with it. So we have cloud network governance, we have policies that we have to create in essence to program our setting limitations on utilization of the cloud networks. Repository where those policies are stored, and so we may have thousands of policies which exist, such as do not allow network access after midnight, and before 6:00 a.m. on any given day or weekends, and the ability to in essence shut things down that may have run for too long, so we're not paying for resources that we're not using.
Those sorts of things are how we, what we write policies for. Then links with security, the ability to have a governance system that has a direct symbiotic relationship with the security system. So ensuring that if someone is automatically going out of the policy controls and bounds if there, they may be a security breach in doing that and we're notifying the security system that this is occurring. Then automation of all of it, the ability to kind of automate governance within the systems. So we're not in essence monitoring things and then playing whack-a-mole in terms of pushing people out of the network or limiting their use by doing human or manual processes, these are about automating the policy enforcements.
And so, they receive the limitations, they receive an email that tells them how they went out of policy, they are asked to in essence comply with the policy, and they're limited automatically by the policies. And this sits through a complete automated mechanism that protects the network from the people who are using the networks and the applications and the devices that are connecting to it.
- Internal and external cloud network requirements
- Moving networking to the cloud
- Considering cloud network performance
- Troubleshooting a cloud network
- AWS, Azure, and Google cloud networking
- Picking your cloud networking solution
- Planning for your cloud network
- Testing and operating your cloud network