From the course: Cloud Governance Concepts: Tools and Requirements
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Identity and access tools
From the course: Cloud Governance Concepts: Tools and Requirements
Identity and access tools
- [Lecturer] Let's turn our attention to identity and access tools, and their role within cloud computing governance. What's important here is that you're focused on who's who and what they need to do. We can't really create governance policies, either at the service level or at the resource level, if we don't know who's interacting with those resources. Again, this is about the ability not only to create static policies that guard services from everybody or guard resources from everybody but the ability to select key capabilities that a person should have or a machine should have, one versus the other. For instance, one person may have the ability to use a service at all hours of the day or night, or another person may only have the ability to use this service for one hour a day. And your ability to create policies like that is based on two things. Number one, we're able to create the policy, and we're able to identify the resource or the service. And also, we're able to identify…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Cloud management platforms (CMPs)3m 7s
-
(Locked)
Service governance tools1m 52s
-
(Locked)
Identity and access tools3m 34s
-
(Locked)
Security and governance tools1m 25s
-
(Locked)
Compliance and governance tools3m 2s
-
(Locked)
Example of a cloud governance project3m 19s
-
(Locked)
Estimated costs3m 52s
-
(Locked)
Needed skills3m 3s
-
-
-
-