top of page
Background.jpg
Teacher Resources

Resource Organization

  • Organize workload into different virtual group of Resources

​

  • Create Access Management and Cost Management policies for the virtual group

​

  • Deploy workload to a region closest to where end users are

​

  • Deploy workload to minimize network Egress traffic

Access Governance

  • Identity is the new perimeter in the cloud

​

  • Implement Zero Trust Model

​

  • Contextual Identity and Access Management

​

  • Threat Modeling to prevent unauthorized access

nsplsh_64476b2d7159426b344f41_mv2_d_5627_3751_s_4_2.webp
Credit Assessment

Cost Governance

  • Cost Control

    • Set up cost limits​

    • Set up Resource limits

​

  • ​Cost Tracking

    • Detect Cost overrun and Alert Administrator​

    • Prepare weekly Cost Analysis Report

Observability

  • Cloud Security Posture Management​

  • Cloud Monitoring

  • Availability Monitoring​

  • Performance Monitoring

  • Security Monitoring​

  • Cloud Logging

  • Security Logging​

  • Application Logging

0fc0e8_440c5988ba574e1aaa2fadceb1684d3f_mv2.webp
bottom of page