From the course: Cloud Governance Concepts: Tools and Requirements

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Identity and access tools

Identity and access tools

From the course: Cloud Governance Concepts: Tools and Requirements

Start my 1-month free trial

Identity and access tools

- [Lecturer] Let's turn our attention to identity and access tools, and their role within cloud computing governance. What's important here is that you're focused on who's who and what they need to do. We can't really create governance policies, either at the service level or at the resource level, if we don't know who's interacting with those resources. Again, this is about the ability not only to create static policies that guard services from everybody or guard resources from everybody but the ability to select key capabilities that a person should have or a machine should have, one versus the other. For instance, one person may have the ability to use a service at all hours of the day or night, or another person may only have the ability to use this service for one hour a day. And your ability to create policies like that is based on two things. Number one, we're able to create the policy, and we're able to identify the resource or the service. And also, we're able to identify…

Contents