
1
00:00:00,000 –> 00:00:04,080
Most organizations say they picked public cloud or hybrid or multi-cloud.
2
00:00:04,080 –> 00:00:07,680
They didn’t. It happened. One exception, one acquisition, one latency problem,
3
00:00:07,680 –> 00:00:09,480
one regulatory memo at a time.
4
00:00:09,480 –> 00:00:13,200
And these architectures quietly decide who can ship, who can comply,
5
00:00:13,200 –> 00:00:15,200
and who gets blamed when something breaks.
6
00:00:15,200 –> 00:00:16,680
This isn’t a provider preference.
7
00:00:16,680 –> 00:00:21,680
It’s an operating model decision with security debt, cost debt, and organizational debt attached.
8
00:00:21,680 –> 00:00:25,120
So before anyone argues Azure versus anything else, step back.
9
00:00:25,120 –> 00:00:27,920
The real question is, why did this get so confusing in the first place,
10
00:00:27,920 –> 00:00:31,200
the foundational misunderstanding, cloud as a place?
11
00:00:31,200 –> 00:00:34,480
The foundational mistake is treating cloud like a place,
12
00:00:34,480 –> 00:00:37,520
a location, a destination, a box you move things into.
13
00:00:37,520 –> 00:00:38,240
It is not.
14
00:00:38,240 –> 00:00:41,920
In architectural terms, cloud is an operating model.
15
00:00:41,920 –> 00:00:44,400
A control plane that allocates resources,
16
00:00:44,400 –> 00:00:48,400
enforces, or fails to enforce policy and builds you for behavior.
17
00:00:48,400 –> 00:00:50,320
The data plane is where workloads run.
18
00:00:50,320 –> 00:00:52,880
The control plane is where reality gets defined.
19
00:00:52,880 –> 00:00:56,240
Most enterprises obsess over the data plane because it feels concrete,
20
00:00:56,240 –> 00:00:58,720
service networks, storage, latency.
21
00:00:58,720 –> 00:01:03,200
Meanwhile, the control plane quietly becomes the system that decides what allowed even means.
22
00:01:03,200 –> 00:01:08,000
That distinction matters because you can’t choose public cloud if your control plane doesn’t
23
00:01:08,000 –> 00:01:09,520
match your organizational intent.
24
00:01:09,520 –> 00:01:13,520
You can buy Azure consumption all day and still run like it’s 2008,
25
00:01:13,520 –> 00:01:15,120
just with different invoices.
26
00:01:15,120 –> 00:01:18,480
This is where intent versus configuration starts to matter.
27
00:01:18,480 –> 00:01:21,360
Intent is what leadership says in a steering committee.
28
00:01:21,360 –> 00:01:22,560
We’re going cloud first.
29
00:01:22,560 –> 00:01:23,440
We’re standardizing.
30
00:01:23,440 –> 00:01:24,320
We’re reducing risk.
31
00:01:24,320 –> 00:01:25,920
We’re accelerating delivery.
32
00:01:25,920 –> 00:01:29,520
Configuration is what teams actually build when they hit constraints.
33
00:01:29,520 –> 00:01:33,200
The old identity stack, the on-prem dependency nobody documented,
34
00:01:33,200 –> 00:01:36,320
the third party vendor that only supports a specific topology,
35
00:01:36,320 –> 00:01:38,800
the plant network that can’t tolerate a new hop.
36
00:01:38,800 –> 00:01:39,760
Intent is a sentence.
37
00:01:39,760 –> 00:01:42,400
Configuration is the system and the system always wins.
38
00:01:42,400 –> 00:01:44,480
That’s why so many cloud debates stay shallow.
39
00:01:44,480 –> 00:01:48,000
People argue public versus hybrid as if it’s a philosophical identity,
40
00:01:48,000 –> 00:01:49,760
but those words are proxies for constraints.
41
00:01:49,760 –> 00:01:52,640
Sovereignty, latency, licensing, operational maturity,
42
00:01:52,640 –> 00:01:55,760
and the reality that policy erodes unless the platform enforces it,
43
00:01:55,760 –> 00:01:56,640
by design.
44
00:01:56,640 –> 00:01:58,880
Here’s a concrete example that shows up constantly.
45
00:01:58,880 –> 00:02:00,960
An enterprise announces cloud first.
46
00:02:00,960 –> 00:02:03,680
The infrastructure team start migrating workloads.
47
00:02:03,680 –> 00:02:07,280
The identity team, usually the last people invited to the celebration,
48
00:02:07,280 –> 00:02:09,600
finally maps the trust boundaries.
49
00:02:09,600 –> 00:02:13,360
And they find three incompatible identity realities operating at once.
50
00:02:13,360 –> 00:02:15,200
On-prem active directory assumptions,
51
00:02:15,200 –> 00:02:17,280
enter ID conditional access patterns,
52
00:02:17,280 –> 00:02:19,920
and third party says identity islands with their own rules.
53
00:02:19,920 –> 00:02:21,440
Nobody designed that on purpose.
54
00:02:21,440 –> 00:02:22,080
It emerged.
55
00:02:22,880 –> 00:02:25,600
Now the organization has to answer uncomfortable questions,
56
00:02:25,600 –> 00:02:28,640
which environment is authoritative for access decisions?
57
00:02:28,640 –> 00:02:30,080
Where do privileged roles live?
58
00:02:30,080 –> 00:02:31,440
What is the break-glass model?
59
00:02:31,440 –> 00:02:34,320
Which logs are actually complete enough to satisfy audit?
60
00:02:34,320 –> 00:02:36,080
This is where hybrid by default begins,
61
00:02:36,080 –> 00:02:37,680
not as strategy but as entropy.
62
00:02:37,680 –> 00:02:40,640
Because hybrid is often the natural byproduct of organizations
63
00:02:40,640 –> 00:02:42,960
trying to reconcile two things at the same time.
64
00:02:42,960 –> 00:02:46,640
Modern control plane capabilities and legacy data plane dependencies.
65
00:02:46,640 –> 00:02:48,480
And if they don’t reconcile them intentionally,
66
00:02:48,480 –> 00:02:49,920
they reconcile them accidentally.
67
00:02:49,920 –> 00:02:53,920
Accidental hybrid is what happens when each team solves its own local problem
68
00:02:53,920 –> 00:02:56,720
and the enterprise calls the aggregate architecture.
69
00:02:56,720 –> 00:02:58,320
The confusion isn’t cultural first.
70
00:02:58,320 –> 00:03:00,320
It’s structural.cloud platforms.
71
00:03:00,320 –> 00:03:02,720
As you’re included, scale decisions.
72
00:03:02,720 –> 00:03:04,000
They don’t scale intent.
73
00:03:04,000 –> 00:03:05,760
But they scale what you actually configured.
74
00:03:05,760 –> 00:03:08,160
That means every exception, every unmanaged subscription,
75
00:03:08,160 –> 00:03:10,560
every temporary bypass becomes part of the machine
76
00:03:10,560 –> 00:03:11,920
that makes decisions later.
77
00:03:11,920 –> 00:03:13,760
Missing policies create obvious gaps.
78
00:03:13,760 –> 00:03:15,440
Drifting policies create ambiguity.
79
00:03:15,440 –> 00:03:17,760
And ambiguity is the birthplace of incidents.
80
00:03:17,760 –> 00:03:20,080
This is also why executives get blindsided.
81
00:03:20,080 –> 00:03:22,080
They think they approved a cloud move.
82
00:03:22,080 –> 00:03:25,120
What they actually approved is a distributed decision engine
83
00:03:25,120 –> 00:03:27,360
that now makes thousands of micro decisions per day
84
00:03:27,360 –> 00:03:31,120
about identity, network paths, data access and spend.
85
00:03:31,120 –> 00:03:32,560
When those decisions go wrong,
86
00:03:32,560 –> 00:03:35,360
the incident review doesn’t blame the cloud.
87
00:03:35,360 –> 00:03:37,280
It blames your organization’s inability
88
00:03:37,280 –> 00:03:39,680
to express intent in enforceable terms.
89
00:03:39,680 –> 00:03:42,480
So when someone says, we should go public cloud,
90
00:03:42,480 –> 00:03:44,720
the right response isn’t agreement or disagreement.
91
00:03:44,720 –> 00:03:46,960
It’s what operating model are you committing to?
92
00:03:46,960 –> 00:03:48,160
Who owns the control plane?
93
00:03:48,160 –> 00:03:49,360
Who owns policy drift?
94
00:03:49,360 –> 00:03:50,800
Who owns cost behavior?
95
00:03:50,800 –> 00:03:52,480
And which parts of the business are allowed
96
00:03:52,480 –> 00:03:55,040
to stay deterministic versus becoming probabilistic?
97
00:03:55,040 –> 00:03:58,080
Because once the control plane becomes the enterprises nervous system,
98
00:03:58,080 –> 00:04:00,720
the debate stops being where do workloads run
99
00:04:00,720 –> 00:04:02,960
and becomes how do we keep governance from decaying?
100
00:04:02,960 –> 00:04:06,080
And that leads to the next uncomfortable truth.
101
00:04:06,080 –> 00:04:07,520
Hybrid wasn’t a choice.
102
00:04:07,520 –> 00:04:08,800
It was inevitable.
103
00:04:08,800 –> 00:04:09,440
Why?
104
00:04:09,440 –> 00:04:11,600
Hybrid by default was inevitable.
105
00:04:11,600 –> 00:04:15,120
Hybrid shows up in enterprises the same way gravity shows up in physics.
106
00:04:15,120 –> 00:04:16,080
You can disagree with it.
107
00:04:16,080 –> 00:04:17,280
You can budget against it.
108
00:04:17,280 –> 00:04:19,040
You can pretend it’s a phase.
109
00:04:19,040 –> 00:04:21,360
And then your system drifts back to it anyway.
110
00:04:21,360 –> 00:04:23,040
Because hybrid isn’t a product choice.
111
00:04:23,040 –> 00:04:25,200
It’s what happens when an organization has constraints.
112
00:04:25,200 –> 00:04:28,400
It can’t delete legacy applications, legacy identity,
113
00:04:28,400 –> 00:04:31,440
legacy networks, legacy data and legacy contracts.
114
00:04:31,440 –> 00:04:33,360
Those aren’t sentimental artifacts.
115
00:04:33,360 –> 00:04:35,200
They’re binding agreements with reality.
116
00:04:35,200 –> 00:04:37,600
Start with the legacy estate, not just old servers,
117
00:04:37,600 –> 00:04:39,040
whole operating assumptions,
118
00:04:39,040 –> 00:04:41,280
apps that were built with hard coded network paths,
119
00:04:41,280 –> 00:04:44,480
databases that assume local low latency storage.
120
00:04:44,480 –> 00:04:46,640
Batch jobs that run fine on-prem,
121
00:04:46,640 –> 00:04:49,840
but become unpredictable once you add cloud networking
122
00:04:49,840 –> 00:04:51,360
and metered services.
123
00:04:51,360 –> 00:04:53,280
And then the ugly part, operations.
124
00:04:53,280 –> 00:04:55,680
Runbooks written for systems that don’t scale,
125
00:04:55,680 –> 00:04:57,520
teams organized around ticket queues,
126
00:04:57,520 –> 00:04:59,280
and ownership models that assume someone
127
00:04:59,280 –> 00:05:01,040
can just log into the box.
128
00:05:01,040 –> 00:05:02,880
Public cloud doesn’t remove any of that.
129
00:05:02,880 –> 00:05:04,240
It just adds a new layer,
130
00:05:04,240 –> 00:05:07,040
where those assumptions start failing in new and expensive ways.
131
00:05:07,040 –> 00:05:09,120
Then you hit regulation and sovereignty.
132
00:05:09,120 –> 00:05:10,080
And here’s the thing.
133
00:05:10,080 –> 00:05:12,880
Regulation doesn’t care about your architecture diagram.
134
00:05:12,880 –> 00:05:15,600
Regulation cares about control, locality and evidence.
135
00:05:15,600 –> 00:05:16,960
You can’t talk your way out of,
136
00:05:16,960 –> 00:05:19,120
where does the data live with a strategy deck?
137
00:05:19,120 –> 00:05:20,480
You need provable boundaries.
138
00:05:20,480 –> 00:05:21,920
You need logs you can produce.
139
00:05:21,920 –> 00:05:23,520
You need identity decisions.
140
00:05:23,520 –> 00:05:26,480
You can explain to an auditor who does not accept it’s in the cloud,
141
00:05:26,480 –> 00:05:27,360
as an answer.
142
00:05:27,360 –> 00:05:30,960
So the organization does what organizations always do under pressure.
143
00:05:30,960 –> 00:05:32,480
It keeps certain workloads local.
144
00:05:32,480 –> 00:05:34,080
It keeps certain data sets local.
145
00:05:34,080 –> 00:05:35,520
It keeps certain keys local.
146
00:05:35,520 –> 00:05:37,120
It keeps certain processes local.
147
00:05:37,120 –> 00:05:38,560
Not because it loves on-prem,
148
00:05:38,560 –> 00:05:40,080
because it loves staying in business.
149
00:05:40,080 –> 00:05:41,760
Now at latency and data gravity,
150
00:05:41,760 –> 00:05:44,000
latency is the most honest part of architecture
151
00:05:44,000 –> 00:05:45,520
because it ignores your intent.
152
00:05:45,520 –> 00:05:47,200
It’s physics and physics wins.
153
00:05:47,200 –> 00:05:48,720
If you’ve got clinical systems,
154
00:05:48,720 –> 00:05:50,240
industrial control, point of sale,
155
00:05:50,240 –> 00:05:51,680
trading, real-time decisioning,
156
00:05:51,680 –> 00:05:54,160
anything where milliseconds translate into risk,
157
00:05:54,160 –> 00:05:57,120
then moving compute away from the data isn’t modernization.
158
00:05:57,120 –> 00:05:58,320
It’s adding failure modes.
159
00:05:58,320 –> 00:06:00,320
And data gravity is the quiet amplifier.
160
00:06:00,320 –> 00:06:02,560
The more data you generate in a location,
161
00:06:02,560 –> 00:06:04,320
the more things get pulled toward it.
162
00:06:04,320 –> 00:06:06,400
Analytics, inference, integrations
163
00:06:06,400 –> 00:06:07,920
and people making decisions.
164
00:06:07,920 –> 00:06:09,760
Moving the workloads becomes expensive.
165
00:06:09,760 –> 00:06:11,200
Moving the data becomes impossible.
166
00:06:11,200 –> 00:06:12,080
So you stop trying.
167
00:06:12,080 –> 00:06:14,400
This is where hybrid becomes not just a compromise,
168
00:06:14,400 –> 00:06:16,000
but a placement strategy.
169
00:06:16,000 –> 00:06:17,600
Put compute where it needs to be
170
00:06:17,600 –> 00:06:19,200
and manage it with a central control plane
171
00:06:19,200 –> 00:06:20,480
if you’re competent.
172
00:06:20,480 –> 00:06:22,320
Now the accelerant nobody plans for.
173
00:06:22,320 –> 00:06:23,760
Mergers and acquisitions.
174
00:06:23,760 –> 00:06:26,000
Most multi-cloud strategies are not strategies.
175
00:06:26,000 –> 00:06:26,960
They are HR events.
176
00:06:26,960 –> 00:06:27,840
You buy a company.
177
00:06:27,840 –> 00:06:29,280
They arrive with a cloud provider,
178
00:06:29,280 –> 00:06:30,480
an identity stack,
179
00:06:30,480 –> 00:06:31,360
a network model,
180
00:06:31,360 –> 00:06:32,880
and a pile of compliance exceptions
181
00:06:32,880 –> 00:06:35,200
that already have executive sponsorship.
182
00:06:35,200 –> 00:06:37,440
The fastest path to multi-cloud is acquisition.
183
00:06:37,440 –> 00:06:39,520
The second fastest path is a SaaS binge,
184
00:06:39,520 –> 00:06:41,040
neither is architecture.
185
00:06:41,040 –> 00:06:43,040
And leadership usually doesn’t want to hear.
186
00:06:43,040 –> 00:06:45,200
We need three years to rationalize this.
187
00:06:45,200 –> 00:06:46,480
They want synergy by Q3.
188
00:06:46,480 –> 00:06:47,760
So the systems co-exist,
189
00:06:47,760 –> 00:06:48,720
then they interconnect,
190
00:06:48,720 –> 00:06:49,920
then they share identities,
191
00:06:49,920 –> 00:06:51,360
then they share data.
192
00:06:51,360 –> 00:06:53,360
And now you’re not operating a clean architecture.
193
00:06:53,360 –> 00:06:54,960
You’re operating a stitched ecosystem
194
00:06:54,960 –> 00:06:57,120
with new attack paths you did not model.
195
00:06:57,120 –> 00:06:58,480
Here’s the grounding example
196
00:06:58,480 –> 00:07:00,640
that turns hybrid into a board level discussion.
197
00:07:00,640 –> 00:07:04,320
A team migrates a customer facing service into Azure.
198
00:07:04,320 –> 00:07:04,960
It works.
199
00:07:04,960 –> 00:07:05,840
Great.
200
00:07:05,840 –> 00:07:08,000
Then a dependency shows up.
201
00:07:08,000 –> 00:07:10,400
The service must call an on-prem system
202
00:07:10,400 –> 00:07:12,080
that wasn’t on the migration plan,
203
00:07:12,080 –> 00:07:14,160
performance drops, timeouts increase.
204
00:07:14,160 –> 00:07:16,160
The business sees customer impact.
205
00:07:16,160 –> 00:07:18,080
Someone says it’s a cloud problem.
206
00:07:18,080 –> 00:07:18,640
It’s not.
207
00:07:18,640 –> 00:07:19,840
It’s a distance problem.
208
00:07:19,840 –> 00:07:21,280
Then the question becomes,
209
00:07:21,280 –> 00:07:22,560
do we move the dependency?
210
00:07:22,560 –> 00:07:24,160
Do we replicate the data?
211
00:07:24,160 –> 00:07:25,840
Or do we move part of the workload
212
00:07:25,840 –> 00:07:27,280
back closer to the dependency?
213
00:07:27,280 –> 00:07:28,240
That is hybrid,
214
00:07:28,240 –> 00:07:29,120
not ideology,
215
00:07:29,120 –> 00:07:30,560
placement under constraint.
216
00:07:30,560 –> 00:07:33,360
So if you’re wondering why hybrid by default is so common,
217
00:07:33,360 –> 00:07:34,560
the answer is simple.
218
00:07:34,560 –> 00:07:36,480
Enterprises don’t start with a blank sheet.
219
00:07:36,480 –> 00:07:38,640
They start with an estate and a risk model.
220
00:07:38,640 –> 00:07:41,680
They inherit constraints faster than they can retire them.
221
00:07:41,680 –> 00:07:43,920
And every constrained forces locality decisions
222
00:07:43,920 –> 00:07:45,680
that pure public cloud can’t satisfy
223
00:07:45,680 –> 00:07:48,480
without either extreme redesign or extreme risk tolerance.
224
00:07:48,480 –> 00:07:49,760
This is the uncomfortable truth.
225
00:07:49,760 –> 00:07:51,200
Hybrid wasn’t chosen.
226
00:07:51,200 –> 00:07:52,480
It was the only architecture
227
00:07:52,480 –> 00:07:54,000
that could survive long enough
228
00:07:54,000 –> 00:07:56,640
for the organization to pretend it had a choice.
229
00:07:56,640 –> 00:07:58,480
And that’s why the next question matters.
230
00:07:58,480 –> 00:08:00,080
When you do go public first on Azure,
231
00:08:00,080 –> 00:08:01,520
what is it actually excellent at
232
00:08:01,520 –> 00:08:03,520
and what does it quietly punish?
233
00:08:03,520 –> 00:08:04,960
Public cloud on Azure,
234
00:08:04,960 –> 00:08:06,400
where it’s actually excellent.
235
00:08:06,400 –> 00:08:08,560
Public cloud on Azure is not a morality play.
236
00:08:08,560 –> 00:08:10,320
It’s a capability accelerator.
237
00:08:10,320 –> 00:08:11,760
When it fits, it feels unfair.
238
00:08:11,760 –> 00:08:14,080
Teams ship faster environments appear on demand
239
00:08:14,080 –> 00:08:16,080
and the business stops waiting for infrastructure
240
00:08:16,080 –> 00:08:17,840
as a prerequisite to strategy.
241
00:08:17,840 –> 00:08:18,800
That’s the real value.
242
00:08:18,800 –> 00:08:20,400
Not that servers are somewhere else,
243
00:08:20,400 –> 00:08:21,760
but that the control plane
244
00:08:21,760 –> 00:08:23,760
makes provisioning policy, identity
245
00:08:23,760 –> 00:08:26,080
and managed services consumable at scale.
246
00:08:26,080 –> 00:08:28,480
Azure is especially strong when you can actually use it
247
00:08:28,480 –> 00:08:30,480
as designed leaning into managed services
248
00:08:30,480 –> 00:08:32,000
instead of recreating your data center
249
00:08:32,000 –> 00:08:33,280
with a new billing model.
250
00:08:33,280 –> 00:08:37,040
The moment you stop treating Azure as VMs with better branding,
251
00:08:37,040 –> 00:08:39,680
you start seeing why public first is attractive.
252
00:08:39,680 –> 00:08:41,920
The first place Azure is excellent is global reach
253
00:08:41,920 –> 00:08:43,680
with deep managed service coverage,
254
00:08:43,680 –> 00:08:44,640
not just regions.
255
00:08:44,640 –> 00:08:46,480
A practical menu of services
256
00:08:46,480 –> 00:08:48,720
that let teams assemble working systems
257
00:08:48,720 –> 00:08:50,240
without building the plumbing,
258
00:08:50,240 –> 00:08:54,000
manage databases messaging, identity integration monitoring,
259
00:08:54,000 –> 00:08:55,200
security posture tooling,
260
00:08:55,200 –> 00:08:56,800
things that would be months of work
261
00:08:56,800 –> 00:08:58,560
on prem become a configuration choice.
262
00:08:58,560 –> 00:08:59,760
That doesn’t mean easy.
263
00:08:59,760 –> 00:09:02,560
It means the complexity moved from construction to consumption
264
00:09:02,560 –> 00:09:04,160
and consumption is faster.
265
00:09:04,160 –> 00:09:05,760
The second place Azure is excellent
266
00:09:05,760 –> 00:09:07,440
is enterprise identity gravity.
267
00:09:07,440 –> 00:09:09,280
This is not marketing, it’s history.
268
00:09:09,280 –> 00:09:11,840
Most enterprises already have identity processes,
269
00:09:11,840 –> 00:09:14,320
directory patterns and compliance expectations
270
00:09:14,320 –> 00:09:17,440
that map more naturally into Microsoft’s ecosystem.
271
00:09:17,440 –> 00:09:20,320
Enter ID becomes the default decision engine,
272
00:09:20,320 –> 00:09:21,360
not because it’s perfect,
273
00:09:21,360 –> 00:09:24,480
but because it already sits in the blast radius of everything else.
274
00:09:24,480 –> 00:09:27,280
Microsoft 365, device management,
275
00:09:27,280 –> 00:09:28,880
conditional access patterns,
276
00:09:28,880 –> 00:09:30,320
legacy federation,
277
00:09:30,320 –> 00:09:32,560
and the organizational muscle memory around it.
278
00:09:32,560 –> 00:09:34,560
That distinction matters.
279
00:09:34,560 –> 00:09:36,560
In public cloud identity isn’t a feature,
280
00:09:36,560 –> 00:09:38,080
it’s the control plane spine.
281
00:09:38,080 –> 00:09:39,920
If your organization already treats identity
282
00:09:39,920 –> 00:09:41,360
as the first control surface,
283
00:09:41,360 –> 00:09:44,480
Azure tends to feel coherent, not simpler coherent.
284
00:09:44,480 –> 00:09:48,640
The third place Azure is excellent is par as velocity,
285
00:09:48,640 –> 00:09:50,080
when teams are allowed to consume it
286
00:09:50,080 –> 00:09:52,320
without being strangled by internal gatekeeping.
287
00:09:52,320 –> 00:09:54,400
App services manage databases,
288
00:09:54,400 –> 00:09:56,640
manage Kubernetes, eventing analytics,
289
00:09:56,640 –> 00:09:57,760
the payoff is fewer things,
290
00:09:57,760 –> 00:09:58,800
you patch, fewer things,
291
00:09:58,800 –> 00:09:59,440
you babysit,
292
00:09:59,440 –> 00:10:00,000
and fewer things,
293
00:10:00,000 –> 00:10:03,360
you pretend are standard while they quietly drift.
294
00:10:03,360 –> 00:10:05,120
But there’s an open loop here and it matters.
295
00:10:05,120 –> 00:10:06,480
Pious only accelerates you
296
00:10:06,480 –> 00:10:08,400
if you’re operating model supports it.
297
00:10:08,400 –> 00:10:10,960
If your platform team designs the environment
298
00:10:10,960 –> 00:10:12,000
as a permit office,
299
00:10:12,000 –> 00:10:15,040
slow approvals, exceptions as the default vague standards,
300
00:10:15,040 –> 00:10:16,160
then the business won’t wait.
301
00:10:16,160 –> 00:10:17,680
It will root around you.
302
00:10:17,680 –> 00:10:18,960
Shadow subscriptions appear,
303
00:10:18,960 –> 00:10:20,400
unmanaged resources proliferate,
304
00:10:20,400 –> 00:10:22,320
and the organization returns to the same problem
305
00:10:22,320 –> 00:10:24,000
it had on prem just faster.
306
00:10:24,000 –> 00:10:27,200
So what’s the archetype where public first Azure really wins?
307
00:10:27,200 –> 00:10:30,240
A digital retail or consumer services business?
308
00:10:30,240 –> 00:10:32,240
Bursty demand, seasonal spikes,
309
00:10:32,240 –> 00:10:34,240
marketing campaigns that can’t be scheduled
310
00:10:34,240 –> 00:10:35,840
around infrastructure windows,
311
00:10:35,840 –> 00:10:37,040
teams that release frequently,
312
00:10:37,040 –> 00:10:38,640
accept some variability,
313
00:10:38,640 –> 00:10:40,880
and value speed over perfect predictability.
314
00:10:40,880 –> 00:10:43,440
In that world, the elasticity story is real.
315
00:10:43,440 –> 00:10:46,240
Scaling out is cheaper than maintaining permanent capacity.
316
00:10:46,240 –> 00:10:47,840
And yes, cost moves around,
317
00:10:47,840 –> 00:10:50,400
but leadership accepts it because growth is the goal,
318
00:10:50,400 –> 00:10:51,920
not stability theater.
319
00:10:51,920 –> 00:10:53,680
Public first also fits organizations
320
00:10:53,680 –> 00:10:54,880
with high change, velocity,
321
00:10:54,880 –> 00:10:56,640
and sufficient cloud maturity.
322
00:10:56,640 –> 00:10:58,080
They can operate guardrails,
323
00:10:58,080 –> 00:10:59,520
tagging policy, identity,
324
00:10:59,520 –> 00:11:01,040
and observability as defaults,
325
00:11:01,040 –> 00:11:02,000
not as retrofits,
326
00:11:02,000 –> 00:11:04,640
they can treat infrastructure as code as normal behavior.
327
00:11:04,640 –> 00:11:07,600
They can measure cost per transaction or cost per customer,
328
00:11:07,600 –> 00:11:09,040
and make trade-offs consciously
329
00:11:09,040 –> 00:11:11,840
instead of reacting to a monthly invoice like it’s weather.
330
00:11:11,840 –> 00:11:14,880
Here are the fit signals executives should listen for.
331
00:11:14,880 –> 00:11:16,800
First, the organization wants speed
332
00:11:16,800 –> 00:11:18,080
and it’s willing to pay for it,
333
00:11:18,080 –> 00:11:19,120
not in slogans,
334
00:11:19,120 –> 00:11:21,280
in budgets and tolerance for variance.
335
00:11:21,280 –> 00:11:23,280
Second, teams can consume managed services
336
00:11:23,280 –> 00:11:24,480
without recreating everything
337
00:11:24,480 –> 00:11:26,480
as bespoke platforms inside Kubernetes
338
00:11:26,480 –> 00:11:27,920
because portability.
339
00:11:27,920 –> 00:11:30,320
If the platform team keeps reinventing services
340
00:11:30,320 –> 00:11:32,240
to avoid vendor dependency,
341
00:11:32,240 –> 00:11:33,680
it’s not building resilience.
342
00:11:33,680 –> 00:11:34,640
It’s building delay.
343
00:11:34,640 –> 00:11:36,080
Third, governance can keep up,
344
00:11:36,080 –> 00:11:37,440
not perfect governance,
345
00:11:37,440 –> 00:11:38,800
sufficient governance.
346
00:11:38,800 –> 00:11:40,240
The ability to set boundaries
347
00:11:40,240 –> 00:11:42,320
see what exists and enforce intent
348
00:11:42,320 –> 00:11:43,920
without human middleware.
349
00:11:43,920 –> 00:11:45,280
If those signals are true,
350
00:11:45,280 –> 00:11:47,280
public first Azure is an advantage.
351
00:11:47,280 –> 00:11:48,240
It compresses time,
352
00:11:48,240 –> 00:11:49,920
it compresses operational burden,
353
00:11:49,920 –> 00:11:51,280
it gives leadership a control plane
354
00:11:51,280 –> 00:11:53,040
that can be extended and standardized,
355
00:11:53,040 –> 00:11:55,200
but the same traits that make public cloud fast
356
00:11:55,200 –> 00:11:56,480
also make it unstable.
357
00:11:56,480 –> 00:11:58,320
Because Azure will happily let you scale,
358
00:11:58,320 –> 00:12:00,080
it will also happily let you sprawl,
359
00:12:00,080 –> 00:12:01,840
and that’s where the failure modes start.
360
00:12:01,840 –> 00:12:04,720
Wear pure public Azure breaks.
361
00:12:04,720 –> 00:12:06,320
Here’s what most people miss.
362
00:12:06,320 –> 00:12:07,760
Public cloud doesn’t fail
363
00:12:07,760 –> 00:12:09,600
because it can’t run your workload.
364
00:12:09,600 –> 00:12:11,520
It fails because it changes the economics
365
00:12:11,520 –> 00:12:13,440
and the control model under your workload
366
00:12:13,440 –> 00:12:15,040
and your organization keeps operating
367
00:12:15,040 –> 00:12:16,240
like nothing changed.
368
00:12:16,240 –> 00:12:18,080
The first break point is predictable,
369
00:12:18,080 –> 00:12:19,200
always on demand.
370
00:12:19,200 –> 00:12:22,000
If a workload runs at a steady baseline 24/7,
371
00:12:22,000 –> 00:12:23,600
elasticity isn’t a benefit,
372
00:12:23,600 –> 00:12:24,400
it’s an invoice.
373
00:12:24,400 –> 00:12:26,560
You’re paying for the privilege of optionality
374
00:12:26,560 –> 00:12:27,680
you don’t use.
375
00:12:27,680 –> 00:12:29,440
And Azure will not tap you on the shoulder
376
00:12:29,440 –> 00:12:32,080
and say, hey, you’ve effectively rebuilt a static data center
377
00:12:32,080 –> 00:12:33,760
but now you’re rented by the hour.
378
00:12:33,760 –> 00:12:34,720
It will just bill you.
379
00:12:34,720 –> 00:12:36,320
This is where leaders get surprised.
380
00:12:36,320 –> 00:12:38,640
The business thought cloud meant cheaper.
381
00:12:38,640 –> 00:12:40,880
The system delivered cloud as designed,
382
00:12:40,880 –> 00:12:42,800
metered consumption with options.
383
00:12:42,800 –> 00:12:44,720
But the organization asked for stability,
384
00:12:44,720 –> 00:12:45,760
not volatility.
385
00:12:45,760 –> 00:12:47,680
Those are different operating models.
386
00:12:47,680 –> 00:12:50,080
The second break point is cost visibility decay
387
00:12:50,080 –> 00:12:51,120
after year two.
388
00:12:51,120 –> 00:12:52,160
Year one is clean.
389
00:12:52,160 –> 00:12:53,440
Everything is new, tagged,
390
00:12:53,440 –> 00:12:54,960
and still emotionally important.
391
00:12:54,960 –> 00:12:55,840
Year two is drift.
392
00:12:55,840 –> 00:12:57,520
The POC became production.
393
00:12:57,520 –> 00:12:59,520
The temporary environment never got deleted.
394
00:12:59,520 –> 00:13:00,960
The test clusters kept running.
395
00:13:00,960 –> 00:13:03,360
The will clean it up later list became the architecture.
396
00:13:03,360 –> 00:13:06,240
And because Azure makes provisioning easy,
397
00:13:06,240 –> 00:13:08,320
sprawl becomes normalized behavior.
398
00:13:08,320 –> 00:13:09,680
This is not a moral failure.
399
00:13:09,680 –> 00:13:10,560
It’s an entropy law.
400
00:13:10,560 –> 00:13:12,720
If creation is cheap and deletion has no owner,
401
00:13:12,720 –> 00:13:14,000
the estate grows.
402
00:13:14,000 –> 00:13:16,720
Then finance is a bill that looks like a corporate ransom note
403
00:13:16,720 –> 00:13:18,240
and asks, what is all this?
404
00:13:18,240 –> 00:13:19,600
The uncomfortable answer is,
405
00:13:19,600 –> 00:13:21,280
it’s your behavior aggregated.
406
00:13:21,280 –> 00:13:24,000
The third break point is licensing and entitlements.
407
00:13:24,000 –> 00:13:26,240
People love to call this misconfiguration.
408
00:13:26,240 –> 00:13:27,760
It’s not. It’s structural friction.
409
00:13:27,760 –> 00:13:30,800
Public cloud works best when identities, licenses,
410
00:13:30,800 –> 00:13:32,800
and consumption models line up cleanly.
411
00:13:32,800 –> 00:13:34,320
Enterprises don’t line up cleanly.
412
00:13:34,320 –> 00:13:36,000
They have windows and SQL entitlements,
413
00:13:36,000 –> 00:13:37,920
hybrid benefits, reserve capacity decisions,
414
00:13:37,920 –> 00:13:39,520
special licensing terms,
415
00:13:39,520 –> 00:13:41,200
and procurement contracts that when
416
00:13:41,200 –> 00:13:42,800
negotiated in a different era
417
00:13:42,800 –> 00:13:45,120
by different people with different assumptions.
418
00:13:45,120 –> 00:13:47,680
So you end up with a cloud that is technically scalable
419
00:13:47,680 –> 00:13:49,200
but commercially fragile.
420
00:13:49,200 –> 00:13:51,200
The architecture meets the functional requirement
421
00:13:51,200 –> 00:13:52,960
and then collapses under the billing model
422
00:13:52,960 –> 00:13:55,280
because nobody designed the financial control plane
423
00:13:55,280 –> 00:13:57,520
with the same seriousness as the network.
424
00:13:57,520 –> 00:13:59,120
The fourth break point is latency,
425
00:13:59,120 –> 00:14:01,040
sensitive, and locality bound systems.
426
00:14:01,040 –> 00:14:02,720
This is where pure public becomes dangerous,
427
00:14:02,720 –> 00:14:04,000
not just expensive.
428
00:14:04,000 –> 00:14:06,080
Clinical workflows, industrial systems,
429
00:14:06,080 –> 00:14:07,040
point-of-sale,
430
00:14:07,040 –> 00:14:09,520
plan-flow integration, real-time fraud checks,
431
00:14:09,520 –> 00:14:10,880
always-on-transaction systems
432
00:14:10,880 –> 00:14:13,040
where a few milliseconds become a contract term
433
00:14:13,040 –> 00:14:15,840
and retry later is not a business strategy.
434
00:14:15,840 –> 00:14:17,680
These environments punish distance.
435
00:14:17,680 –> 00:14:20,640
And when they punish distance, they punish your SLOs.
436
00:14:20,640 –> 00:14:22,720
Then SLO breaches become customer breaches,
437
00:14:22,720 –> 00:14:24,400
then outages become legal problems.
438
00:14:24,400 –> 00:14:26,080
That distinction matters.
439
00:14:26,080 –> 00:14:27,600
And this is the moment to be explicit
440
00:14:27,600 –> 00:14:30,000
about who pure public Azure is risky for.
441
00:14:30,000 –> 00:14:32,400
Regulated industries with audit requirements,
442
00:14:32,400 –> 00:14:35,760
capital-intensive operations that can’t tolerate volatility
443
00:14:35,760 –> 00:14:37,680
and always-on-transaction systems
444
00:14:37,680 –> 00:14:39,920
where downtime isn’t an incident,
445
00:14:39,920 –> 00:14:42,640
it’s revenue loss with a regulator watching.
446
00:14:42,640 –> 00:14:44,240
Here’s the composite failure pattern.
447
00:14:44,240 –> 00:14:47,040
An organization moves a stable workload into Azure
448
00:14:47,040 –> 00:14:49,200
because the board demanded modernization.
449
00:14:49,200 –> 00:14:50,880
It’s a billing success in month one,
450
00:14:50,880 –> 00:14:52,000
then usage normalizes.
451
00:14:52,000 –> 00:14:53,600
The workload doesn’t scale down.
452
00:14:53,600 –> 00:14:54,880
The team adds redundancy.
453
00:14:54,880 –> 00:14:56,000
They add more monitoring.
454
00:14:56,000 –> 00:14:58,240
They add dev and staging environments,
455
00:14:58,240 –> 00:14:59,440
just like production.
456
00:14:59,440 –> 00:15:00,640
The invoice climbs.
457
00:15:00,640 –> 00:15:03,200
Then someone tries to fix cost by right sizing.
458
00:15:03,200 –> 00:15:05,280
Performance dips, the business complaints.
459
00:15:05,280 –> 00:15:06,640
So they scale back up.
460
00:15:06,640 –> 00:15:07,520
The bill returns.
461
00:15:07,520 –> 00:15:08,400
Nobody is happy.
462
00:15:08,400 –> 00:15:09,840
It’s not because Azure is broken.
463
00:15:09,840 –> 00:15:11,680
It’s because the workload is stable.
464
00:15:11,680 –> 00:15:13,680
And the organization tried to buy stability
465
00:15:13,680 –> 00:15:15,840
using a volatility-optimized platform
466
00:15:15,840 –> 00:15:18,000
without an explicit economic model.
467
00:15:18,000 –> 00:15:19,360
And there’s a deeper trap here.
468
00:15:19,360 –> 00:15:21,680
When public cloud is the default answer,
469
00:15:21,680 –> 00:15:24,080
executives stop funding hard conversations.
470
00:15:24,080 –> 00:15:26,240
They stop funding application rationalization.
471
00:15:26,240 –> 00:15:28,160
They stop funding data placement analysis.
472
00:15:28,160 –> 00:15:30,000
They stop funding operating model redesign.
473
00:15:30,000 –> 00:15:31,600
They say move it to Azure
474
00:15:31,600 –> 00:15:33,280
and assume value will appear.
475
00:15:33,280 –> 00:15:34,480
Value doesn’t appear.
476
00:15:34,480 –> 00:15:36,160
Systems behavior appears.
477
00:15:36,160 –> 00:15:37,600
So where does this leave you?
478
00:15:37,600 –> 00:15:40,160
Pure public Azure breaks when you need predictability
479
00:15:40,160 –> 00:15:41,440
more than optionality,
480
00:15:41,440 –> 00:15:43,200
when you can’t tolerate latency
481
00:15:43,200 –> 00:15:44,880
and when your governance can’t keep pace
482
00:15:44,880 –> 00:15:47,520
with how fast teams can create resources.
483
00:15:47,520 –> 00:15:49,040
And the bills don’t happen.
484
00:15:49,040 –> 00:15:50,720
They accumulate through behavior.
485
00:15:50,720 –> 00:15:52,080
Cloud economics reality.
486
00:15:52,080 –> 00:15:53,280
Builds are behavioral.
487
00:15:53,280 –> 00:15:54,720
Cloud economics is not mysterious.
488
00:15:54,720 –> 00:15:57,360
It’s just uncomfortable because it turns your bill into a mirror.
489
00:15:57,360 –> 00:15:59,200
On-prem spend is mostly structural.
490
00:15:59,200 –> 00:16:01,360
You buy capacity, you amortize it,
491
00:16:01,360 –> 00:16:02,960
and you hide a lot of waste inside.
492
00:16:02,960 –> 00:16:04,320
We already paid for it.
493
00:16:04,320 –> 00:16:05,920
Public cloud spend is behavioral.
494
00:16:05,920 –> 00:16:07,680
Every environment someone forgot.
495
00:16:07,680 –> 00:16:09,440
Every oversized SKU.
496
00:16:09,440 –> 00:16:11,680
Every log pipeline nobody tuned.
497
00:16:11,680 –> 00:16:14,160
Every backup policy set to forever.
498
00:16:14,160 –> 00:16:16,720
Every cross-region data transfer that looked harmless
499
00:16:16,720 –> 00:16:19,840
in a diagram, those behaviors compound into a bill.
500
00:16:19,840 –> 00:16:21,600
And as your doesn’t bill you for intent,
501
00:16:21,600 –> 00:16:23,040
it builds you for reality.
502
00:16:23,040 –> 00:16:24,640
This is why cost optimization fails
503
00:16:24,640 –> 00:16:26,560
when it’s treated as a cleanup project.
504
00:16:26,560 –> 00:16:28,960
If your organization thinks PhinOps means a quarterly panic
505
00:16:28,960 –> 00:16:30,640
and a spreadsheet, you will never win.
506
00:16:30,640 –> 00:16:33,360
You’ll just cycle, overspend, blame engineering,
507
00:16:33,360 –> 00:16:35,120
freeze projects, then overspend again.
508
00:16:35,120 –> 00:16:36,960
That’s not governance, that’s theatre.
509
00:16:36,960 –> 00:16:40,720
PhinOps in the adult form is an accountability loop.
510
00:16:40,720 –> 00:16:42,880
Visibility, allocation, and consequences.
511
00:16:42,880 –> 00:16:44,720
Not punishment, consequences.
512
00:16:44,720 –> 00:16:48,240
Visibility means you can answer basic questions
513
00:16:48,240 –> 00:16:49,760
without a week of detective work,
514
00:16:49,760 –> 00:16:51,520
what environments exist, who owns them,
515
00:16:51,520 –> 00:16:53,280
and what business capability they serve.
516
00:16:53,280 –> 00:16:56,480
If you can’t inventory your cloud estate accurately,
517
00:16:56,480 –> 00:16:58,240
you’re not optimizing your guessing.
518
00:16:58,240 –> 00:17:03,040
Allocation means costs are attached to something real.
519
00:17:03,040 –> 00:17:04,800
A product, a team,
520
00:17:04,800 –> 00:17:06,320
a customer segment, a region.
521
00:17:06,320 –> 00:17:08,000
If spend is pooled into one big bucket,
522
00:17:08,000 –> 00:17:09,600
you’ve designed for denial.
523
00:17:09,600 –> 00:17:11,600
Nobody feels the impact of their decisions,
524
00:17:11,600 –> 00:17:12,960
therefore behavior doesn’t change.
525
00:17:12,960 –> 00:17:14,720
And consequences means the organization
526
00:17:14,720 –> 00:17:16,640
has a response when behavior drifts,
527
00:17:16,640 –> 00:17:18,800
automated shutdowns for dev environments,
528
00:17:18,800 –> 00:17:21,040
guardrails that prevent untagged resources,
529
00:17:21,040 –> 00:17:23,040
budgets that trigger investigation,
530
00:17:23,040 –> 00:17:26,160
and a platform team empowered to enforce intent,
531
00:17:26,160 –> 00:17:27,680
not just advise, enforce.
532
00:17:27,680 –> 00:17:30,400
Because the default state of cloud is drift.
533
00:17:30,400 –> 00:17:33,600
Now, there’s a subtle trap that shows up around year two,
534
00:17:33,600 –> 00:17:35,280
and it’s always the same pattern.
535
00:17:35,280 –> 00:17:37,200
In year one, leaders ask,
536
00:17:37,200 –> 00:17:38,080
why is our bill high?
537
00:17:38,080 –> 00:17:40,000
In year two, leaders ask,
538
00:17:40,000 –> 00:17:41,760
why is our bill unpredictable?
539
00:17:41,760 –> 00:17:42,960
And the answer is,
540
00:17:42,960 –> 00:17:45,440
because you bought a system optimized for optionality,
541
00:17:45,440 –> 00:17:47,360
then you never built the discipline required
542
00:17:47,360 –> 00:17:48,480
to manage optionality.
543
00:17:48,480 –> 00:17:51,200
That’s what reservations and savings plans expose.
544
00:17:51,200 –> 00:17:52,880
Commitment discounts exist
545
00:17:52,880 –> 00:17:55,440
because the provider wants you to behave predictably.
546
00:17:55,440 –> 00:17:56,880
If your workloads are stable,
547
00:17:56,880 –> 00:17:58,400
and your architecture is mature,
548
00:17:58,400 –> 00:17:59,680
commitments are rational.
549
00:17:59,680 –> 00:18:01,040
If your workloads are volatile,
550
00:18:01,040 –> 00:18:03,920
or your organization changes direction every quarter,
551
00:18:03,920 –> 00:18:06,240
commitments are attacks on indecision.
552
00:18:06,240 –> 00:18:08,160
But either way, you have to pick a posture,
553
00:18:08,160 –> 00:18:11,280
pay for flexibility, or trade flexibility for predictability.
554
00:18:11,280 –> 00:18:12,720
And you can’t pretend to have both.
555
00:18:12,720 –> 00:18:14,320
That distinction matters because
556
00:18:14,320 –> 00:18:16,160
it forces executives to admit
557
00:18:16,160 –> 00:18:17,520
what kind of business they’re running.
558
00:18:17,520 –> 00:18:19,680
A business that values speed and experimentation
559
00:18:19,680 –> 00:18:21,120
will tolerate variance.
560
00:18:21,120 –> 00:18:22,880
A business that values predictability
561
00:18:22,880 –> 00:18:25,120
and fixed margins will need tighter constraints
562
00:18:25,120 –> 00:18:26,480
and more deliberate placement.
563
00:18:26,480 –> 00:18:27,840
If leadership refuses to choose,
564
00:18:27,840 –> 00:18:30,800
the cloud will choose for them through invoices.
565
00:18:30,800 –> 00:18:33,520
There’s another cost reality leaders consistently miss.
566
00:18:33,520 –> 00:18:36,000
Cloud costs are rarely too high in general.
567
00:18:36,000 –> 00:18:36,960
They’re misaligned.
568
00:18:36,960 –> 00:18:38,560
You can spend a lot and still be efficient
569
00:18:38,560 –> 00:18:40,240
if spent maps clearly to growth.
570
00:18:40,240 –> 00:18:42,720
More customers, more transactions, more revenue.
571
00:18:42,720 –> 00:18:44,160
You can also spend a moderate amount
572
00:18:44,160 –> 00:18:46,720
and be inefficient if it’s mostly idle capacity
573
00:18:46,720 –> 00:18:48,160
and duplicated tooling.
574
00:18:48,160 –> 00:18:49,200
The number isn’t the truth.
575
00:18:49,200 –> 00:18:50,320
The ratio is.
576
00:18:50,320 –> 00:18:51,840
So the mature question isn’t,
577
00:18:51,840 –> 00:18:53,040
how do we lower the bill?
578
00:18:53,040 –> 00:18:54,560
It’s, what is the bill buying?
579
00:18:54,560 –> 00:18:55,920
And that’s where unit economics
580
00:18:55,920 –> 00:18:57,920
becomes the only argument that survives.
581
00:18:57,920 –> 00:19:00,000
Cost per transaction, cost per active user,
582
00:19:00,000 –> 00:19:01,520
cost per customer on boarded,
583
00:19:01,520 –> 00:19:02,960
cost per model inference.
584
00:19:02,960 –> 00:19:04,720
Pick the unit that reflects your business,
585
00:19:04,720 –> 00:19:06,320
then track it relentlessly.
586
00:19:06,320 –> 00:19:09,200
When teams know the unit cost is visible and owned,
587
00:19:09,200 –> 00:19:11,360
architecture stops being an aesthetic debate
588
00:19:11,360 –> 00:19:12,640
and becomes an economic one.
589
00:19:12,640 –> 00:19:14,720
This also changes how you talk about modernization.
590
00:19:14,720 –> 00:19:16,640
Modernization is not moved to past end.
591
00:19:16,640 –> 00:19:18,240
Modernization is reduced unit cost
592
00:19:18,240 –> 00:19:19,840
while increasing capability.
593
00:19:19,840 –> 00:19:20,880
Sometimes past does that.
594
00:19:20,880 –> 00:19:22,080
Sometimes it doesn’t.
595
00:19:22,080 –> 00:19:25,200
Sometimes the cheapest move is deleting the workload entirely.
596
00:19:25,200 –> 00:19:27,280
The cloud is brutally honest about that option
597
00:19:27,280 –> 00:19:29,760
because it stops billing you when the thing no longer exists.
598
00:19:29,760 –> 00:19:32,240
And yes, that means deletion is a financial feature.
599
00:19:32,240 –> 00:19:33,600
So if you want a diagnostic
600
00:19:33,600 –> 00:19:35,360
that cuts through all the optimism
601
00:19:35,360 –> 00:19:37,120
and all the excuses, here it is.
602
00:19:37,120 –> 00:19:38,720
But do you know your cost per customer?
603
00:19:38,720 –> 00:19:40,720
Or only your total bill?
604
00:19:40,720 –> 00:19:44,400
Hybrid cloud reframed, distributed compute centralized control.
605
00:19:44,400 –> 00:19:45,600
So now the pivot.
606
00:19:45,600 –> 00:19:48,400
Hybrid cloud is not cloud plus leftovers.
607
00:19:48,400 –> 00:19:51,760
That framing is how organizations justify drifting into it
608
00:19:51,760 –> 00:19:53,600
without taking responsibility for it.
609
00:19:53,600 –> 00:19:55,760
Hybrid, done intentionally, is the opposite.
610
00:19:55,760 –> 00:19:57,760
It’s deliberate placement under constraint
611
00:19:57,760 –> 00:19:59,920
with a control plane that stays consistent enough
612
00:19:59,920 –> 00:20:01,520
to keep governance from decaying.
613
00:20:01,520 –> 00:20:02,720
That’s the core reframe.
614
00:20:02,720 –> 00:20:06,960
Hybrid is distributed compute with centralized control.
615
00:20:06,960 –> 00:20:09,040
Computing data live where they must.
616
00:20:09,040 –> 00:20:12,560
In plants, hospitals, branch sites, sovereign regions,
617
00:20:12,560 –> 00:20:15,360
legacy data centers, or specialized hosting environments.
618
00:20:15,360 –> 00:20:18,400
But identity policy, inventory, security posture,
619
00:20:18,400 –> 00:20:20,400
and lifecycle management stay centralized
620
00:20:20,400 –> 00:20:22,880
or as centralized as your architecture can make them
621
00:20:22,880 –> 00:20:24,000
without lying.
622
00:20:24,000 –> 00:20:27,680
Because the real goal of hybrid is not location, it’s coherence.
623
00:20:27,680 –> 00:20:30,080
The system problem hybrid solves is this.
624
00:20:30,080 –> 00:20:32,000
Enterprises can’t standardize reality
625
00:20:32,000 –> 00:20:34,400
but they can standardize how reality is managed.
626
00:20:34,400 –> 00:20:37,680
And that difference is the only way to survive a decade of constraints
627
00:20:37,680 –> 00:20:40,960
without turning the platform team into a help desk for exceptions.
628
00:20:40,960 –> 00:20:43,760
This is where the control plane versus data plane distinction
629
00:20:43,760 –> 00:20:45,120
stops being academic.
630
00:20:45,120 –> 00:20:46,560
Your data plane is messy.
631
00:20:46,560 –> 00:20:47,200
It always is.
632
00:20:47,200 –> 00:20:50,000
It contains the physical world, legacy dependencies,
633
00:20:50,000 –> 00:20:53,200
and the things that didn’t get a budget line item for modernization.
634
00:20:53,200 –> 00:20:56,720
Your control plane is where you decide whether that mess is visible,
635
00:20:56,720 –> 00:20:58,320
governable, and auditable,
636
00:20:58,320 –> 00:21:01,680
or whether it becomes a blind spot that slowly turns into risk.
637
00:21:01,680 –> 00:21:04,240
Hybrid succeeds when the control plane stays deterministic
638
00:21:04,240 –> 00:21:06,400
even while the data plane stays diverse.
639
00:21:06,400 –> 00:21:08,640
And the drivers that create real hybrid requirements
640
00:21:08,640 –> 00:21:09,840
are not negotiable.
641
00:21:09,840 –> 00:21:11,920
First, sovereignty and locality.
642
00:21:11,920 –> 00:21:13,520
If you operate in regulated markets,
643
00:21:13,520 –> 00:21:16,160
you will eventually be forced to make location explicit.
644
00:21:16,160 –> 00:21:18,160
Not because a provider can’t meet compliance,
645
00:21:18,160 –> 00:21:20,960
but because regulators increasingly demand evidence
646
00:21:20,960 –> 00:21:24,000
where data lives, who can access it, and how you prove it.
647
00:21:24,000 –> 00:21:25,760
Hybrid gives you a placement model
648
00:21:25,760 –> 00:21:27,680
where locality is a design input,
649
00:21:27,680 –> 00:21:29,280
not an after-the-fact exception.
650
00:21:29,280 –> 00:21:31,600
Second, edge and OTA-T convergence.
651
00:21:31,600 –> 00:21:33,440
The closer you get to physical systems,
652
00:21:33,440 –> 00:21:37,120
manufacturing lines, clinical devices, logistics, retail, point of sale,
653
00:21:37,120 –> 00:21:39,760
the more cloud-only becomes a fantasy.
654
00:21:39,760 –> 00:21:42,640
Those environments require local compute for latency,
655
00:21:42,640 –> 00:21:44,320
resilience during one failures,
656
00:21:44,320 –> 00:21:46,720
and integration with networks that were never designed
657
00:21:46,720 –> 00:21:49,920
for constant dependency on a hyperscaler control plane.
658
00:21:49,920 –> 00:21:52,400
Third, data gravity.
659
00:21:52,400 –> 00:21:54,400
Not the buzzword version, the operational version.
660
00:21:54,400 –> 00:21:56,080
Data accumulates where it’s created,
661
00:21:56,080 –> 00:21:58,320
once it accumulates, it drags compute toward it.
662
00:21:58,320 –> 00:22:00,160
Hybrid isn’t a compromise in that world,
663
00:22:00,160 –> 00:22:03,360
that’s simply admitting that movement has cost, risk, and time.
664
00:22:03,360 –> 00:22:05,520
There’s a composite scenario that makes this real,
665
00:22:05,520 –> 00:22:08,320
a manufacturing enterprise once predictive maintenance.
666
00:22:08,320 –> 00:22:11,440
The models and analytics tooling live comfortably in Azure.
667
00:22:11,440 –> 00:22:13,840
But the inference needs to happen close to the machines,
668
00:22:13,840 –> 00:22:16,160
and the raw sensor data can’t be streamed constantly
669
00:22:16,160 –> 00:22:18,960
to the cloud without creating both cost and failure modes.
670
00:22:18,960 –> 00:22:22,640
So they place inference locally, keep critical operations local,
671
00:22:22,640 –> 00:22:24,480
and still use a cloud control plane
672
00:22:24,480 –> 00:22:26,880
to manage identity, policy baselines,
673
00:22:26,880 –> 00:22:28,640
and security posture across sites.
674
00:22:28,640 –> 00:22:32,640
That is hybrid by design local execution centralised intent.
675
00:22:32,640 –> 00:22:35,920
Now, Azure’s posture here is pretty clear, and it’s not subtle.
676
00:22:35,920 –> 00:22:37,920
Azure is not trying to convince you
677
00:22:37,920 –> 00:22:39,600
that everything belongs in Azure.
678
00:22:39,600 –> 00:22:42,560
Azure is trying to convince you that Azure resource manager
679
00:22:42,560 –> 00:22:45,440
and the Azure governance stack should remain the control plane
680
00:22:45,440 –> 00:22:46,960
even when the workloads don’t move.
681
00:22:46,960 –> 00:22:49,680
That’s what hybrid actually means in Microsoft’s world,
682
00:22:49,680 –> 00:22:51,600
consistency of management surfaces.
683
00:22:51,600 –> 00:22:53,280
Not a forklift of workloads,
684
00:22:53,280 –> 00:22:56,320
and this is why the right mental model isn’t on-prem versus cloud.
685
00:22:56,320 –> 00:22:58,240
It’s where does the control plane live,
686
00:22:58,240 –> 00:22:59,680
and how far does it reach?
687
00:22:59,680 –> 00:23:02,320
Because centralised control gives you a few things
688
00:23:02,320 –> 00:23:04,000
that matter more than raw compute.
689
00:23:04,000 –> 00:23:06,320
It gives you uniform identity and access patterns.
690
00:23:06,320 –> 00:23:07,840
It gives you policy enforcement
691
00:23:07,840 –> 00:23:10,560
that doesn’t depend on hero engineers remembering
692
00:23:10,560 –> 00:23:11,600
what the standard was.
693
00:23:11,600 –> 00:23:14,960
It gives you audit evidence that doesn’t require manual archaeology.
694
00:23:14,960 –> 00:23:16,240
It gives you life cycle management,
695
00:23:16,240 –> 00:23:18,800
patching, configuration baselines, and inventory
696
00:23:18,800 –> 00:23:21,760
at a scale where humans stop being the integration layer.
697
00:23:21,760 –> 00:23:23,520
But here’s the anchor that makes hybrid work
698
00:23:23,520 –> 00:23:25,440
and also exposes why it fails.
699
00:23:25,440 –> 00:23:28,480
Hybrid succeeds when cloud stops pretending it’s the centre.
700
00:23:28,480 –> 00:23:30,960
The cloud is a control plane, not a location.
701
00:23:30,960 –> 00:23:33,440
If leadership keeps treating as you are like the destination
702
00:23:33,440 –> 00:23:35,600
and everything else like temporary baggage,
703
00:23:35,600 –> 00:23:37,760
the organization will never fund the hard work,
704
00:23:37,760 –> 00:23:40,880
standardising governance, making locality decisions explicit,
705
00:23:40,880 –> 00:23:44,560
and designing for long-term operations across sites and providers.
706
00:23:44,560 –> 00:23:46,880
So hybrid isn’t the failure of a cloud strategy.
707
00:23:46,880 –> 00:23:48,320
Hybrid is the real strategy.
708
00:23:48,320 –> 00:23:50,400
If you admit what the enterprise actually is,
709
00:23:50,400 –> 00:23:52,320
distributed, regulated latency bound,
710
00:23:52,320 –> 00:23:54,640
and constantly inheriting complexity.
711
00:23:54,640 –> 00:23:56,080
And that leads to the next failure mode,
712
00:23:56,080 –> 00:23:58,320
because hybrid doesn’t collapse from compute.
713
00:23:58,320 –> 00:24:00,640
It collapses from governance erosion.
714
00:24:00,640 –> 00:24:03,440
The real hybrid failure mode, tooling fragmentation.
715
00:24:03,440 –> 00:24:06,320
Hybrid doesn’t fail because the workloads are split.
716
00:24:06,320 –> 00:24:08,320
Hybrid fails because the truth is split.
717
00:24:08,320 –> 00:24:11,840
Tooling fragmentation is what turns a manageable, distributed estate
718
00:24:11,840 –> 00:24:14,240
into competing realities that drift away from each other
719
00:24:14,240 –> 00:24:16,800
until nobody can confidently answer basic questions.
720
00:24:16,800 –> 00:24:18,800
What exists? Who owns it? Is it compliant?
721
00:24:18,800 –> 00:24:20,480
Can we patch it? Can we recover it?
722
00:24:20,480 –> 00:24:23,200
And if we had an incident right now, which logs would we trust?
723
00:24:23,200 –> 00:24:26,560
In a pure public Azure world, at least the control plane is singular.
724
00:24:26,560 –> 00:24:29,520
You have one primary policy engine, one RBIAC model,
725
00:24:29,520 –> 00:24:31,920
one inventory surface, one posture story.
726
00:24:31,920 –> 00:24:34,320
It can still be misused, but it’s one set of levers.
727
00:24:34,320 –> 00:24:35,760
Hybrid multiplies levers.
728
00:24:35,760 –> 00:24:37,680
The first fracture is console multiplication.
729
00:24:37,680 –> 00:24:39,760
One team uses Azure portal and Azure policy.
730
00:24:39,760 –> 00:24:42,640
Another team uses VMware tooling or some legacy CMDB.
731
00:24:42,640 –> 00:24:45,600
Another team uses a vendor console for edge devices.
732
00:24:45,600 –> 00:24:49,360
Another team uses whatever the managed service provider exposes.
733
00:24:49,360 –> 00:24:52,480
Each tool has its own vocabulary, its own access model,
734
00:24:52,480 –> 00:24:55,600
its own definition of healthy and its own blind spots.
735
00:24:55,600 –> 00:24:58,480
Over time, those tools don’t converge. They diverge.
736
00:24:58,480 –> 00:25:01,920
And when tools diverge, you stop having a single operational reality.
737
00:25:01,920 –> 00:25:03,200
You have narratives.
738
00:25:03,200 –> 00:25:07,040
The security team thinks the estate is controlled because Azure policy shows compliance
739
00:25:07,040 –> 00:25:08,160
for what it can see.
740
00:25:08,160 –> 00:25:11,120
Operations thinks the estate is stable because they are monitoring
741
00:25:11,120 –> 00:25:12,400
covers what they manage.
742
00:25:12,400 –> 00:25:14,800
The platform team thinks governance is working
743
00:25:14,800 –> 00:25:16,560
because landing zones are standard.
744
00:25:16,560 –> 00:25:21,120
Meanwhile, a chunk of the environment sits in the gaps between those views,
745
00:25:21,120 –> 00:25:24,080
unpatched, unmonetored and effectively unordated.
746
00:25:24,080 –> 00:25:25,520
This is the uncomfortable truth.
747
00:25:25,520 –> 00:25:28,640
Every additional management surface is an entropy generator.
748
00:25:28,640 –> 00:25:32,400
It creates new pathways for drift, new exceptions, new role assignments,
749
00:25:32,400 –> 00:25:35,920
new logging gaps and new places where temporary becomes permanent
750
00:25:35,920 –> 00:25:38,800
because nobody owns the cleanup across boundaries.
751
00:25:38,800 –> 00:25:41,040
The second fracture is policy and consistency.
752
00:25:41,040 –> 00:25:43,760
Hybrid organizations often start with good intentions.
753
00:25:43,760 –> 00:25:45,680
We’ll standardize, we’ll enforce baselines,
754
00:25:45,680 –> 00:25:48,240
we’ll treat identity and policy as first class.
755
00:25:48,240 –> 00:25:49,440
And then reality arrives.
756
00:25:49,440 –> 00:25:51,280
The factory network can’t support the agent.
757
00:25:51,280 –> 00:25:53,200
The legacy OS can’t run the extension.
758
00:25:53,200 –> 00:25:54,960
The vendor appliance doesn’t integrate.
759
00:25:54,960 –> 00:25:56,880
The region has sovereignty restrictions.
760
00:25:56,880 –> 00:25:57,920
So you create exceptions.
761
00:25:57,920 –> 00:25:59,520
One exception becomes a pattern.
762
00:25:59,520 –> 00:26:00,800
Then the patterns conflict.
763
00:26:00,800 –> 00:26:03,840
This is how deterministic security models turn probabilistic.
764
00:26:03,840 –> 00:26:06,080
The policy says deny public endpoints,
765
00:26:06,080 –> 00:26:08,560
but an exception exists just for this one integration.
766
00:26:08,560 –> 00:26:11,520
The policy says MFA for admins,
767
00:26:11,520 –> 00:26:14,480
but break-class accounts live in a different identity boundary.
768
00:26:14,480 –> 00:26:16,240
The policy says log everything,
769
00:26:16,240 –> 00:26:18,560
but some locations can’t forward logs consistently,
770
00:26:18,560 –> 00:26:20,320
so you accept partial telemetry.
771
00:26:20,320 –> 00:26:22,160
At first, those are conscious trade-offs.
772
00:26:22,160 –> 00:26:23,120
Then staff changes.
773
00:26:23,120 –> 00:26:24,720
The exception becomes institutionalized.
774
00:26:24,960 –> 00:26:26,400
Nobody remembers why it exists,
775
00:26:26,400 –> 00:26:29,280
but removing it feels risky, therefore it stays.
776
00:26:29,280 –> 00:26:30,720
That is how compliance erodes,
777
00:26:30,720 –> 00:26:32,960
without anyone making a bad decision.
778
00:26:32,960 –> 00:26:35,120
Compliance doesn’t disappear, it becomes conditional.
779
00:26:35,120 –> 00:26:37,280
That’s conditional chaos.
780
00:26:37,280 –> 00:26:40,080
A system where security and governance
781
00:26:40,080 –> 00:26:41,920
depend on context, tribal knowledge,
782
00:26:41,920 –> 00:26:43,680
and the right people being awake.
783
00:26:43,680 –> 00:26:46,800
The third fracture is split-brain operations,
784
00:26:46,800 –> 00:26:50,400
patching, logging, incident response, change control,
785
00:26:50,400 –> 00:26:52,240
back-up, key management.
786
00:26:52,240 –> 00:26:55,440
Each of those functions starts to differ by location and vendor,
787
00:26:55,440 –> 00:26:57,040
not because teams want it,
788
00:26:57,040 –> 00:27:00,640
because each platform nudges you toward its own default operating model.
789
00:27:00,640 –> 00:27:02,320
Azure Update Manager here,
790
00:27:02,320 –> 00:27:04,160
some legacy patch tool there.
791
00:27:04,160 –> 00:27:06,720
Azure Monitor here, a third-party APM there,
792
00:27:06,720 –> 00:27:08,080
Defender for CloudPoster here,
793
00:27:08,080 –> 00:27:09,600
a different CSPM elsewhere,
794
00:27:09,600 –> 00:27:10,800
different alert formats,
795
00:27:10,800 –> 00:27:13,120
different escalation parts, different runbooks.
796
00:27:13,120 –> 00:27:14,560
When incidents happen in that world,
797
00:27:14,560 –> 00:27:17,600
engineers spend the first hour negotiating reality.
798
00:27:17,600 –> 00:27:19,440
Is this an Azure issue, a network issue,
799
00:27:19,440 –> 00:27:20,960
an on-prem issue, a vendor issue,
800
00:27:20,960 –> 00:27:22,320
or an identity issue?
801
00:27:22,320 –> 00:27:24,320
The system doesn’t answer “humans do”
802
00:27:24,320 –> 00:27:25,680
and “humans are slow”,
803
00:27:25,680 –> 00:27:27,600
especially when they’re busy arguing about
804
00:27:27,600 –> 00:27:29,600
whose dashboard is authoritative.
805
00:27:29,600 –> 00:27:31,680
This is why hybrid often produces
806
00:27:31,680 –> 00:27:33,440
a specific organizational smell.
807
00:27:33,440 –> 00:27:36,240
Platform teams become human middleware.
808
00:27:36,240 –> 00:27:37,600
They translate between consoles,
809
00:27:37,600 –> 00:27:38,960
they chase exceptions,
810
00:27:38,960 –> 00:27:40,320
they reconcile inventories,
811
00:27:40,320 –> 00:27:42,800
they explain to auditors why one environment
812
00:27:42,800 –> 00:27:44,960
has evidence and another has screenshots.
813
00:27:44,960 –> 00:27:46,560
They are the glue holding together
814
00:27:46,560 –> 00:27:48,320
incompatible control planes
815
00:27:48,320 –> 00:27:49,520
that should never have been allowed
816
00:27:49,520 –> 00:27:50,880
to fragment in the first place.
817
00:27:50,880 –> 00:27:52,960
Then once platform teams become middleware,
818
00:27:52,960 –> 00:27:54,480
delivery slows, burn out climbs,
819
00:27:54,480 –> 00:27:55,760
and shadow IT returns,
820
00:27:55,760 –> 00:27:57,760
because teams will route around friction
821
00:27:57,760 –> 00:27:59,760
long before they route around risk.
822
00:27:59,760 –> 00:28:01,440
So if you want the practical definition
823
00:28:01,440 –> 00:28:03,200
of a failed hybrid model,
824
00:28:03,200 –> 00:28:03,680
it’s simple.
825
00:28:03,680 –> 00:28:06,720
It’s not, we have workloads on-prem and in Azure.
826
00:28:06,720 –> 00:28:08,720
It’s, we can’t enforce intent consistently
827
00:28:08,720 –> 00:28:10,080
across where we run.
828
00:28:10,080 –> 00:28:11,680
And the only sustainable response
829
00:28:11,680 –> 00:28:13,200
is to collapse management surfaces,
830
00:28:13,200 –> 00:28:14,080
not multiply them.
831
00:28:14,080 –> 00:28:16,320
You need a control plane that projects outward,
832
00:28:16,320 –> 00:28:18,800
standardizes inventory, standardizes policy,
833
00:28:18,800 –> 00:28:21,280
and gives you one set of levers to express intent,
834
00:28:21,280 –> 00:28:23,200
because hybrid compute is survivable.
835
00:28:23,200 –> 00:28:25,760
Hybrid governance without enforcement is not.
836
00:28:25,760 –> 00:28:27,520
Azure Arc explained like an adult,
837
00:28:27,520 –> 00:28:29,040
a control plane projection.
838
00:28:29,040 –> 00:28:30,960
So this is the point where most conversations
839
00:28:30,960 –> 00:28:33,200
collapse into product names and screenshots.
840
00:28:33,200 –> 00:28:35,200
Don’t as your arc is not interesting as a product,
841
00:28:35,200 –> 00:28:36,800
it’s interesting as an architectural move.
842
00:28:36,800 –> 00:28:38,560
Azure Arc is Microsoft projecting
843
00:28:38,560 –> 00:28:40,480
as your resource manager outward,
844
00:28:40,480 –> 00:28:41,600
past the Azure boundary,
845
00:28:41,600 –> 00:28:42,800
so the control plane can see
846
00:28:42,800 –> 00:28:45,520
and govern things you didn’t or can’t move.
847
00:28:45,520 –> 00:28:46,960
Service in your data center.
848
00:28:46,960 –> 00:28:47,840
Kubernetes clusters,
849
00:28:47,840 –> 00:28:50,560
you run yourself, machines in other clouds,
850
00:28:50,560 –> 00:28:52,960
sometimes data services, sometimes edge.
851
00:28:52,960 –> 00:28:55,120
In plain terms,
852
00:28:55,120 –> 00:28:57,120
arc turns some random machine over there
853
00:28:57,120 –> 00:28:58,560
into an Azure managed resource
854
00:28:58,560 –> 00:29:01,200
with an identity tags, policy evaluation,
855
00:29:01,200 –> 00:29:02,960
and a place in your inventory graph.
856
00:29:02,960 –> 00:29:04,960
That distinction matters,
857
00:29:04,960 –> 00:29:06,560
because the core problem in hybrid
858
00:29:06,560 –> 00:29:08,400
isn’t that compute is distributed.
859
00:29:08,400 –> 00:29:10,960
The core problem is that management is fragmented.
860
00:29:10,960 –> 00:29:12,880
Arc is Microsoft’s attempt to collapse
861
00:29:12,880 –> 00:29:14,960
those fragmented management surfaces
862
00:29:14,960 –> 00:29:16,880
back into a single control plane posture.
863
00:29:16,880 –> 00:29:18,720
And yes, that is a strategic dependency.
864
00:29:18,720 –> 00:29:20,320
Arc doesn’t make you cloud agnostic.
865
00:29:20,320 –> 00:29:21,760
It makes you governance consistent
866
00:29:21,760 –> 00:29:23,840
by anchoring governance in Azure.
867
00:29:23,840 –> 00:29:25,280
If you accept that trade,
868
00:29:25,280 –> 00:29:26,320
the payoff is obvious.
869
00:29:26,320 –> 00:29:28,640
One RBIAC model to express who can do what?
870
00:29:28,640 –> 00:29:31,200
One policy engine to express what is allowed,
871
00:29:31,200 –> 00:29:33,360
and one inventory surface to answer
872
00:29:33,360 –> 00:29:36,320
what exists without begging 10 teams for spreadsheets.
873
00:29:36,320 –> 00:29:39,120
Now let’s get precise about what arc actually is.
874
00:29:39,120 –> 00:29:41,840
At the center of Azure governance is Azure resource manager.
875
00:29:41,840 –> 00:29:44,080
Arm is the control plane API layer
876
00:29:44,080 –> 00:29:45,360
that sits behind the portal.
877
00:29:45,360 –> 00:29:47,600
The CLI templates policy evaluation
878
00:29:47,600 –> 00:29:49,760
RBIAC enforcement, the whole thing.
879
00:29:49,760 –> 00:29:51,120
Per Microsoft’s own architecture,
880
00:29:51,120 –> 00:29:53,520
when you create or configure resources in Azure,
881
00:29:53,520 –> 00:29:54,720
you are interacting with arm.
882
00:29:54,720 –> 00:29:56,640
Arc extends that management layer
883
00:29:56,640 –> 00:29:58,560
to resources outside Azure.
884
00:29:58,560 –> 00:30:02,160
That’s why the right mental model isn’t arc is a hybrid product.
885
00:30:02,160 –> 00:30:05,680
The right mental model is arc is an onboarding mechanism into RM.
886
00:30:05,680 –> 00:30:07,200
Once something is onboarded,
887
00:30:07,200 –> 00:30:09,200
you can apply the same governance constructs
888
00:30:09,200 –> 00:30:10,800
you already use in Azure.
889
00:30:10,800 –> 00:30:12,800
Tags, policy assignments,
890
00:30:12,800 –> 00:30:14,160
role assignments,
891
00:30:14,160 –> 00:30:15,600
monitoring integrations,
892
00:30:15,600 –> 00:30:18,000
post-gear management, update management,
893
00:30:18,000 –> 00:30:19,760
and in some scenarios,
894
00:30:19,760 –> 00:30:21,520
configuration baselines.
895
00:30:21,520 –> 00:30:23,760
And arc is explicit about what it governs.
896
00:30:23,760 –> 00:30:25,040
First, servers,
897
00:30:25,040 –> 00:30:26,640
windows and Linux machines,
898
00:30:26,640 –> 00:30:28,160
physical or virtual,
899
00:30:28,160 –> 00:30:30,560
running in your data center or in other clouds.
900
00:30:30,560 –> 00:30:32,320
Those become arc enabled servers
901
00:30:32,320 –> 00:30:34,480
represented as resources in Azure.
902
00:30:34,480 –> 00:30:35,840
Second, Kubernetes clusters.
903
00:30:35,840 –> 00:30:37,920
If you’ve got a CNCF conformant cluster
904
00:30:37,920 –> 00:30:39,280
on prem or in another cloud,
905
00:30:39,280 –> 00:30:41,360
arc can connect it and let you apply governance
906
00:30:41,360 –> 00:30:43,360
and GitHub’s style configuration patterns
907
00:30:43,360 –> 00:30:45,120
through Azure’s management surface.
908
00:30:45,120 –> 00:30:46,960
Third, in some cases, data services
909
00:30:46,960 –> 00:30:49,600
Azure Arc enabled data services exist to run
910
00:30:49,600 –> 00:30:51,520
certain Azure managed data offerings
911
00:30:51,520 –> 00:30:53,040
on Kubernetes outside Azure.
912
00:30:53,040 –> 00:30:54,080
That’s not a free lunch.
913
00:30:54,080 –> 00:30:55,680
It’s Azure’s operating model
914
00:30:55,680 –> 00:30:57,840
running on your hardware with your constraints.
915
00:30:57,840 –> 00:30:59,040
Now, what arc is not?
916
00:30:59,040 –> 00:31:00,160
Arc is not Azure Stack.
917
00:31:00,160 –> 00:31:01,440
It is not a hardware appliance.
918
00:31:01,440 –> 00:31:04,320
It is not, we brought Azure into your data center.
919
00:31:04,320 –> 00:31:07,360
Azure Stack is about bringing Azure services locally.
920
00:31:07,360 –> 00:31:08,800
Arc is about bringing Azure governance
921
00:31:08,800 –> 00:31:10,000
and management locally.
922
00:31:10,000 –> 00:31:12,400
Arc is also not multi-cloud neutrality theater.
923
00:31:12,400 –> 00:31:14,080
It does not erase provider differences.
924
00:31:14,080 –> 00:31:17,200
It does not make AWS policies equal Azure policies.
925
00:31:17,200 –> 00:31:18,880
It doesn’t eliminate network design.
926
00:31:18,880 –> 00:31:20,000
It doesn’t remove latency.
927
00:31:20,000 –> 00:31:22,000
It doesn’t delete regulatory constraints.
928
00:31:22,000 –> 00:31:23,840
It does not make your estate portable.
929
00:31:23,840 –> 00:31:25,760
It makes your estate visible and governable
930
00:31:25,760 –> 00:31:26,480
through Azure.
931
00:31:26,480 –> 00:31:28,080
That’s the whole bet.
932
00:31:28,080 –> 00:31:29,600
Which leads to why this matters.
933
00:31:29,600 –> 00:31:31,840
Arc’s value is governance, not compute.
934
00:31:31,840 –> 00:31:34,080
When an auditor asks,
935
00:31:34,080 –> 00:31:36,160
show me what systems exist who can access them
936
00:31:36,160 –> 00:31:37,920
and whether they meet baseline controls.
937
00:31:37,920 –> 00:31:40,320
The problem is not that the workloads are scattered.
938
00:31:40,320 –> 00:31:43,040
The problem is that the evidence is scattered.
939
00:31:43,040 –> 00:31:44,480
Arc tries to consolidate evidence
940
00:31:44,480 –> 00:31:45,840
because it consolidates inventory
941
00:31:45,840 –> 00:31:47,600
and policy evaluation into one place.
942
00:31:47,600 –> 00:31:50,080
When security asks where are our unpatched servers,
943
00:31:50,080 –> 00:31:52,160
the problem is not that patching is hard.
944
00:31:52,160 –> 00:31:54,000
The problem is that the patching responsibility
945
00:31:54,000 –> 00:31:56,160
is fragmented across tools and teams.
946
00:31:56,160 –> 00:31:58,400
Arc tries to unify that lifecycle capability.
947
00:31:58,400 –> 00:32:01,040
When platform teams get tired of being human middleware,
948
00:32:01,040 –> 00:32:02,560
Arc is the architectural attempt
949
00:32:02,560 –> 00:32:04,960
to stop requiring translation between consoles.
950
00:32:04,960 –> 00:32:06,240
Now, the credibility sentence
951
00:32:06,240 –> 00:32:08,240
because adults acknowledge trade-offs.
952
00:32:08,240 –> 00:32:10,320
Arc adds dependency on Azure’s control plane.
953
00:32:10,320 –> 00:32:12,400
It requires skills to operate correctly.
954
00:32:12,400 –> 00:32:14,160
And it does not fix bad operating models.
955
00:32:14,160 –> 00:32:16,960
If your organization can’t own identity cleanly,
956
00:32:16,960 –> 00:32:18,320
Arc won’t save you.
957
00:32:18,320 –> 00:32:19,920
If you can’t define policy intent,
958
00:32:19,920 –> 00:32:22,080
Arc will enforce confusion faster.
959
00:32:22,080 –> 00:32:24,080
And if you treat onboarding as we connected it,
960
00:32:24,080 –> 00:32:24,880
we’re done.
961
00:32:24,880 –> 00:32:27,680
Drift will return because Arc is a control plane projection,
962
00:32:27,680 –> 00:32:29,360
not a discipline replacement.
963
00:32:29,360 –> 00:32:32,080
But if you actually want hybrid to be governable,
964
00:32:32,080 –> 00:32:35,200
Arc is the most honest move Microsoft has made in years,
965
00:32:35,200 –> 00:32:36,160
not more clouds.
966
00:32:36,160 –> 00:32:38,000
One control plane extended outward.
967
00:32:38,000 –> 00:32:41,280
Arc and practice governance, security, and life cycle at scale.
968
00:32:41,280 –> 00:32:44,240
Once Arc is onboarded, the interesting part starts.
969
00:32:44,240 –> 00:32:46,480
You no longer managing a bunch of machines.
970
00:32:46,480 –> 00:32:48,720
You’re managing in a state as a governed graph.
971
00:32:48,720 –> 00:32:51,360
That changes how leaders should think about hybrid operations
972
00:32:51,360 –> 00:32:52,560
because the question stops being,
973
00:32:52,560 –> 00:32:53,920
where do we run it and becomes,
974
00:32:53,920 –> 00:32:57,040
can we enforce intent consistently across where we run it?
975
00:32:57,040 –> 00:32:59,840
The first practical win is unified governance patterns.
976
00:32:59,840 –> 00:33:02,480
Arc gives you one place to express standards,
977
00:33:02,480 –> 00:33:05,440
tags, our back, and policy assignments
978
00:33:05,440 –> 00:33:08,560
that apply to resources that used to live outside your line of sight.
979
00:33:08,560 –> 00:33:11,200
That doesn’t magically solve cross-cloud identity differences,
980
00:33:11,200 –> 00:33:13,600
but it does give you a consistent governance surface
981
00:33:13,600 –> 00:33:15,040
where you can at least say,
982
00:33:15,040 –> 00:33:17,600
these classes of machines must meet these baselines
983
00:33:17,600 –> 00:33:19,360
and here is the evidence.
984
00:33:19,360 –> 00:33:22,400
In other words, governance becomes an engine, not a committee.
985
00:33:22,400 –> 00:33:25,760
The second win is posture management becoming the default expectation,
986
00:33:25,760 –> 00:33:27,600
not an annual audit scramble.
987
00:33:27,600 –> 00:33:30,000
Enterprises often treat compliance as an event,
988
00:33:30,000 –> 00:33:30,800
a deadline.
989
00:33:30,800 –> 00:33:34,880
A point in time story, they tell auditors with screenshots and heroic effort.
990
00:33:34,880 –> 00:33:37,920
That model dies in hybrid because the estate is too distributed
991
00:33:37,920 –> 00:33:39,760
and the drift is too constant.
992
00:33:39,760 –> 00:33:41,840
Arc pushes you toward continuous posture,
993
00:33:41,840 –> 00:33:43,920
policy evaluations, inventory queries,
994
00:33:43,920 –> 00:33:47,120
and security signals that update as the environment changes.
995
00:33:47,120 –> 00:33:49,440
That distinction matters because continuous posture
996
00:33:49,440 –> 00:33:52,160
is the only thing that scales in regulated environments.
997
00:33:52,160 –> 00:33:54,160
If you can’t prove controls continuously,
998
00:33:54,160 –> 00:33:56,880
you’re not compliant, you’re just lucky between audits.
999
00:33:56,880 –> 00:33:58,880
Third, drift control.
1000
00:33:58,880 –> 00:34:01,440
This is where arc becomes either transformative or useless,
1001
00:34:01,440 –> 00:34:03,840
depending on whether you treat desired state as real.
1002
00:34:03,840 –> 00:34:05,760
Arc doesn’t stop drift by existing.
1003
00:34:05,760 –> 00:34:07,520
It gives you the machinery to measure drift
1004
00:34:07,520 –> 00:34:09,680
and in some cases enforce correction.
1005
00:34:09,680 –> 00:34:12,560
Policies can audit, some policies can remediate,
1006
00:34:12,560 –> 00:34:15,600
machine configuration can evaluate OS-level baselines,
1007
00:34:15,600 –> 00:34:16,800
and for Kubernetes,
1008
00:34:16,800 –> 00:34:20,080
Github becomes the most rational way to reduce entropy.
1009
00:34:20,080 –> 00:34:22,000
Declare the desired configuration once
1010
00:34:22,000 –> 00:34:24,720
then let the cluster reconcile itself back to that state.
1011
00:34:24,720 –> 00:34:26,000
That’s the adult trade.
1012
00:34:26,000 –> 00:34:28,320
You replace, did someone remember to do the thing
1013
00:34:28,320 –> 00:34:31,120
with the system pulls itself back into compliance?
1014
00:34:31,120 –> 00:34:33,680
The fourth capability is observability as governance,
1015
00:34:33,680 –> 00:34:35,040
not just operations.
1016
00:34:35,040 –> 00:34:37,920
Most enterprises still treat monitoring as, is it up?
1017
00:34:37,920 –> 00:34:41,120
That’s a low bar and it’s irrelevant during an audit or an incident.
1018
00:34:41,120 –> 00:34:43,920
What matters is, can you trace a change to an outcome
1019
00:34:43,920 –> 00:34:46,560
and can you prove the system behaved within its controls?
1020
00:34:46,560 –> 00:34:49,200
Our connected resources can feed into centralized monitoring
1021
00:34:49,200 –> 00:34:50,560
and logging patterns.
1022
00:34:50,560 –> 00:34:53,760
Not because logs are exciting, but because logs are evidence.
1023
00:34:53,760 –> 00:34:56,000
Without unified telemetry, your security model
1024
00:34:56,000 –> 00:34:57,120
becomes probabilistic.
1025
00:34:57,120 –> 00:34:58,720
You cannot secure what you cannot see
1026
00:34:58,720 –> 00:35:01,040
and you cannot prove what you cannot query.
1027
00:35:01,040 –> 00:35:04,160
And yes, this is where people discover that their logging strategy
1028
00:35:04,160 –> 00:35:06,240
is actually a handful of agents installed
1029
00:35:06,240 –> 00:35:08,480
inconsistently over the last five years.
1030
00:35:08,480 –> 00:35:11,200
Arc turns that inconsistency into a visible defect,
1031
00:35:11,200 –> 00:35:14,000
which is exactly what you want, even if it’s embarrassing.
1032
00:35:14,000 –> 00:35:16,800
Now, the life cycle part that executives underestimate,
1033
00:35:16,800 –> 00:35:18,640
patching and configuration at scale,
1034
00:35:18,640 –> 00:35:20,800
hybrid estates fail slowly.
1035
00:35:20,800 –> 00:35:22,560
They fail through unpatched servers,
1036
00:35:22,560 –> 00:35:25,040
forgotten images, unsupported runtimes,
1037
00:35:25,040 –> 00:35:27,360
and exceptions that never got revisited.
1038
00:35:27,360 –> 00:35:29,200
Arc doesn’t magically patch everything,
1039
00:35:29,200 –> 00:35:32,320
but it gives you a unified inventory of what needs patching
1040
00:35:32,320 –> 00:35:35,040
and a governance pathway to make patch compliance measurable.
1041
00:35:35,040 –> 00:35:37,600
Once patching is measurable, it can be operationalized.
1042
00:35:37,600 –> 00:35:40,080
Once it’s operationalized, it stops being hero work.
1043
00:35:40,080 –> 00:35:42,000
That’s the whole point, reduce the number of problems
1044
00:35:42,000 –> 00:35:43,360
that require heroics.
1045
00:35:43,360 –> 00:35:46,320
Here’s the composite scenario where Arc actually pays for itself.
1046
00:35:46,320 –> 00:35:48,960
A regulated enterprise runs workloads in Azure,
1047
00:35:48,960 –> 00:35:50,240
in a private data center,
1048
00:35:50,240 –> 00:35:52,640
and in another cloud inherited via acquisition.
1049
00:35:52,640 –> 00:35:56,560
Prior to Arc, the audit process is basically a reconciliation exercise.
1050
00:35:56,560 –> 00:35:59,680
Pull exports from three consoles, normalize them manually,
1051
00:35:59,680 –> 00:36:01,680
argue about which one is correct,
1052
00:36:01,680 –> 00:36:03,440
then hope the auditor accepts the narrative.
1053
00:36:03,440 –> 00:36:07,120
After Arc, at least the inventory and governance posture
1054
00:36:07,120 –> 00:36:09,360
can be expressed from one control plane.
1055
00:36:09,360 –> 00:36:12,080
You can query what exists, assign baselines by scope,
1056
00:36:12,080 –> 00:36:14,160
and demonstrate compliance drift over time
1057
00:36:14,160 –> 00:36:15,920
with evidence that isn’t handcrafted.
1058
00:36:15,920 –> 00:36:17,600
It won’t eliminate all audit pain,
1059
00:36:17,600 –> 00:36:21,600
but it converts audit as archaeology into audit as reporting.
1060
00:36:21,600 –> 00:36:23,680
And this is the critical operational payoff.
1061
00:36:23,680 –> 00:36:25,680
Platform teams stop being translators.
1062
00:36:25,680 –> 00:36:28,400
They stop spending their lives mapping AWS terminology
1063
00:36:28,400 –> 00:36:31,840
to Azure terminology to on-prem terminology while incidents burn.
1064
00:36:31,840 –> 00:36:34,320
They get a single place to express governance intent
1065
00:36:34,320 –> 00:36:36,560
and a single place to retrieve reality,
1066
00:36:36,560 –> 00:36:38,480
but keep the credibility intact.
1067
00:36:38,480 –> 00:36:39,360
Arc has limits.
1068
00:36:39,360 –> 00:36:41,600
It doesn’t remove latency, it doesn’t unify
1069
00:36:41,600 –> 00:36:44,160
every operational feature across every environment.
1070
00:36:44,160 –> 00:36:46,800
It introduces a dependency on Azure’s control plane.
1071
00:36:46,800 –> 00:36:50,080
It requires disciplined identity design and policy hygiene,
1072
00:36:50,080 –> 00:36:52,480
and it will absolutely expose your operating model dead
1073
00:36:52,480 –> 00:36:54,000
because the moment everything is visible,
1074
00:36:54,000 –> 00:36:56,640
everyone can see how inconsistent the estate really is.
1075
00:36:56,640 –> 00:36:58,720
That’s not a downside. That’s the bill coming due.
1076
00:36:58,720 –> 00:37:01,280
The practical outcome, if you do this right, is simple.
1077
00:37:01,280 –> 00:37:03,920
You reduce hybrid entropy by collapsing management surfaces
1078
00:37:03,920 –> 00:37:05,280
and making drift measurable,
1079
00:37:05,280 –> 00:37:08,000
and once drift is measurable, it becomes governable.
1080
00:37:08,000 –> 00:37:10,240
Now, here’s the part nobody likes hearing.
1081
00:37:10,240 –> 00:37:13,520
If Arc reduces hybrid entropy, multi-cloud multiplies it.
1082
00:37:13,520 –> 00:37:17,120
Multi-cloud, strategy, insurance policy, or inherited damage.
1083
00:37:17,120 –> 00:37:19,360
So now we get to the architecture everyone wants to talk about
1084
00:37:19,360 –> 00:37:22,000
because it sounds sophisticated, multi-cloud.
1085
00:37:22,000 –> 00:37:24,640
Most organizations describe it as strategy,
1086
00:37:24,640 –> 00:37:28,000
some describe it as resilience, procurement describes it as leverage.
1087
00:37:28,000 –> 00:37:31,840
Engineers describe it as pain. All of those can be true,
1088
00:37:31,840 –> 00:37:34,080
but the first question is the only one that matters.
1089
00:37:34,080 –> 00:37:37,280
Are you choosing multi-cloud or are you inheriting it?
1090
00:37:37,280 –> 00:37:39,600
Because the honest version of enterprise reality is this.
1091
00:37:39,600 –> 00:37:42,800
Multi-cloud usually arrives the same way hybrid does.
1092
00:37:42,800 –> 00:37:44,960
One constraint at a time, one acquisition at a time,
1093
00:37:44,960 –> 00:37:48,320
one SaaS decision at a time, one we needed it yesterday decision
1094
00:37:48,320 –> 00:37:49,920
that never gets revisited,
1095
00:37:49,920 –> 00:37:52,080
and the organization calls the result architecture
1096
00:37:52,080 –> 00:37:55,040
because calling it accumulated decisions sounds less impressive.
1097
00:37:55,040 –> 00:37:56,480
This is the uncomfortable truth.
1098
00:37:56,480 –> 00:37:58,640
Most multi-cloud is not a design system.
1099
00:37:58,640 –> 00:37:59,920
It’s a stitched ecosystem.
1100
00:37:59,920 –> 00:38:01,520
Now, there are legitimate reasons to do it.
1101
00:38:01,520 –> 00:38:03,360
Regulatory separation is one.
1102
00:38:03,360 –> 00:38:06,000
Sometimes you need a hard boundary between jurisdictions,
1103
00:38:06,000 –> 00:38:08,160
business units, or data classifications,
1104
00:38:08,160 –> 00:38:11,760
and the cleanest boundary you can buy is a provider boundary.
1105
00:38:11,760 –> 00:38:13,680
Not because the provider is magically more secure,
1106
00:38:13,680 –> 00:38:17,360
but because the control plane and the operational blast radius are different.
1107
00:38:17,360 –> 00:38:18,960
Risk isolation is another.
1108
00:38:18,960 –> 00:38:21,760
Some leaders want a second provider as an insurance policy
1109
00:38:21,760 –> 00:38:24,800
against outages, geopolitical risk, contract disputes,
1110
00:38:24,800 –> 00:38:27,600
or a provider making a platform change you can’t absorb quickly.
1111
00:38:27,600 –> 00:38:30,400
That’s not irrational, but insurance policies have premiums,
1112
00:38:30,400 –> 00:38:33,360
and the premium in multi-cloud is always paid in operations.
1113
00:38:33,360 –> 00:38:35,120
Then there’s specialized capability.
1114
00:38:35,120 –> 00:38:38,160
One provider has the service you need in the region you need
1115
00:38:38,160 –> 00:38:39,680
with the certifications you need.
1116
00:38:39,680 –> 00:38:40,240
That’s normal.
1117
00:38:40,240 –> 00:38:43,040
The myth is thinking you can take that one workload,
1118
00:38:43,040 –> 00:38:45,840
place it in another cloud, and keep everything else unchanged.
1119
00:38:45,840 –> 00:38:46,640
You never do.
1120
00:38:46,640 –> 00:38:50,080
Identity, logging, key management, networking, monitoring,
1121
00:38:50,080 –> 00:38:53,280
deployment pipelines, those all have to reach across boundaries
1122
00:38:53,280 –> 00:38:54,960
or split into separate stacks,
1123
00:38:54,960 –> 00:38:57,440
which means every special case becomes a structural decision.
1124
00:38:57,440 –> 00:39:01,600
And then there’s the driver nobody wants to admit is dominant, M&A.
1125
00:39:01,600 –> 00:39:03,440
You buy a company, you inherit their cloud,
1126
00:39:03,440 –> 00:39:04,560
you don’t get to vote.
1127
00:39:04,560 –> 00:39:07,040
You get a new identity boundary, a new logging stack,
1128
00:39:07,040 –> 00:39:09,280
a new network model, and a pile of operational debt
1129
00:39:09,280 –> 00:39:10,880
that already works well enough
1130
00:39:10,880 –> 00:39:13,600
that nobody will let you touch it in the first 12 months.
1131
00:39:13,600 –> 00:39:16,320
So multi-cloud becomes the price of growth.
1132
00:39:16,320 –> 00:39:18,080
And the platform team becomes the thing
1133
00:39:18,080 –> 00:39:19,760
that makes growth survivable.
1134
00:39:19,760 –> 00:39:22,080
This is where executives usually ask the wrong question.
1135
00:39:22,080 –> 00:39:23,920
They ask, can we standardize providers?
1136
00:39:23,920 –> 00:39:26,240
The right question is, can we standardize governance?
1137
00:39:26,240 –> 00:39:28,640
Because procurement leverage is not operational leverage.
1138
00:39:28,640 –> 00:39:29,760
That distinction matters.
1139
00:39:29,760 –> 00:39:33,040
Procurement leverage is negotiating discounts,
1140
00:39:33,040 –> 00:39:35,280
contract terms, and renewal options.
1141
00:39:35,280 –> 00:39:37,760
Operational leverage is being able to run the system
1142
00:39:37,760 –> 00:39:39,520
with predictable outcomes.
1143
00:39:39,520 –> 00:39:41,760
Consistent access control, consistent visibility,
1144
00:39:41,760 –> 00:39:44,720
consistent incident response, consistent compliance evidence,
1145
00:39:44,720 –> 00:39:45,760
those are not the same lever.
1146
00:39:45,760 –> 00:39:47,360
One reduces invoice risk,
1147
00:39:47,360 –> 00:39:49,120
the other reduces existential risk,
1148
00:39:49,120 –> 00:39:50,960
and multi-cloud increases existential risk
1149
00:39:50,960 –> 00:39:54,080
unless you deliberately invest in a unifying operating model.
1150
00:39:54,080 –> 00:39:55,920
Here’s the hidden tax that shows up every time.
1151
00:39:55,920 –> 00:39:58,400
Skills don’t generalize cleanly across clouds.
1152
00:39:58,400 –> 00:40:01,520
Identity models are similar in concept and different in execution.
1153
00:40:01,520 –> 00:40:03,600
Logging and telemetry are never identical.
1154
00:40:03,600 –> 00:40:05,840
Network primitives differ, policy engines differ.
1155
00:40:05,840 –> 00:40:07,680
Even when you standardize on Kubernetes,
1156
00:40:07,680 –> 00:40:10,320
you still have two or three ways to do load balancing,
1157
00:40:10,320 –> 00:40:12,640
ingress, secrets and upgrades.
1158
00:40:12,640 –> 00:40:15,440
Plus the provider’s specific edges you end up needing anyway.
1159
00:40:15,920 –> 00:40:17,440
So the organization pays twice,
1160
00:40:17,440 –> 00:40:20,240
once in toolsprall and again in cognitive load.
1161
00:40:20,240 –> 00:40:22,880
Then come the real costs that don’t show up on an Azure invoice
1162
00:40:22,880 –> 00:40:26,080
coordination tax, incident tax, audit tax, and burnout.
1163
00:40:26,080 –> 00:40:27,920
Multi-cloud often creates a platform team
1164
00:40:27,920 –> 00:40:29,760
that becomes a survival function,
1165
00:40:29,760 –> 00:40:31,120
not a center of excellence,
1166
00:40:31,120 –> 00:40:32,080
a survival function.
1167
00:40:32,080 –> 00:40:34,480
They build the cross-cloud identity patterns,
1168
00:40:34,480 –> 00:40:35,440
they normalize logs,
1169
00:40:35,440 –> 00:40:37,360
they create shared deployment practices,
1170
00:40:37,360 –> 00:40:38,480
they arbitrate exceptions,
1171
00:40:38,480 –> 00:40:40,000
they become the people everyone calls
1172
00:40:40,000 –> 00:40:41,280
when something crosses a boundary
1173
00:40:41,280 –> 00:40:43,280
and stops behaving like a single system.
1174
00:40:43,280 –> 00:40:46,720
And this is where the multi-cloud for leverage narrative usually collapses.
1175
00:40:46,720 –> 00:40:49,280
If you need to run two clouds to threaten one cloud,
1176
00:40:49,280 –> 00:40:52,400
but the operational overhead of two clouds costs you more than the discount
1177
00:40:52,400 –> 00:40:54,480
you might negotiate, you didn’t gain leverage.
1178
00:40:54,480 –> 00:40:55,920
You bought complexity.
1179
00:40:55,920 –> 00:40:58,240
So the mature executive posture is not,
1180
00:40:58,240 –> 00:41:00,880
multi-cloud is good or multi-cloud is bad.
1181
00:41:00,880 –> 00:41:02,560
It’s asking what you are actually buying.
1182
00:41:02,560 –> 00:41:05,200
Are you buying capability that can’t exist in the other way?
1183
00:41:05,200 –> 00:41:06,480
Are you buying risk isolation?
1184
00:41:06,480 –> 00:41:08,480
You can operate during a real incident
1185
00:41:08,480 –> 00:41:11,200
or are you buying inherited damage and calling it choice?
1186
00:41:11,200 –> 00:41:13,760
Because if it’s inherited, the goal is not to celebrate it.
1187
00:41:13,760 –> 00:41:15,760
The goal is to contain it with governance, inventory,
1188
00:41:15,760 –> 00:41:17,840
and consistent control planes, otherwise it spreads.
1189
00:41:17,840 –> 00:41:19,920
And once multi-cloud spreads, the failure mode isn’t,
1190
00:41:19,920 –> 00:41:21,120
we have two providers.
1191
00:41:21,120 –> 00:41:23,760
The failure mode is distributed systems reality,
1192
00:41:23,760 –> 00:41:27,920
latency, resilience, event chaos, observability gaps.
1193
00:41:27,920 –> 00:41:28,800
That’s next.
1194
00:41:28,800 –> 00:41:30,640
Multi-cloud engineering realities,
1195
00:41:30,640 –> 00:41:33,200
latency, resilience, event chaos.
1196
00:41:33,200 –> 00:41:34,720
Multi-cloud becomes real,
1197
00:41:34,720 –> 00:41:37,040
the moment your architecture crosses a boundary
1198
00:41:37,040 –> 00:41:39,040
and still has to behave like one system,
1199
00:41:39,040 –> 00:41:40,480
not connected behave.
1200
00:41:40,480 –> 00:41:42,240
And the first thing you pay is latency,
1201
00:41:42,240 –> 00:41:43,920
not theoretical latency.
1202
00:41:43,920 –> 00:41:45,440
The kind that shows up is timeouts,
1203
00:41:45,440 –> 00:41:47,680
queue backlogs, and users saying it’s slow
1204
00:41:47,680 –> 00:41:49,440
while every dashboard claims green.
1205
00:41:49,440 –> 00:41:52,240
Cross-cloud latency is not solved by optimism.
1206
00:41:52,240 –> 00:41:54,160
Private connectivity helps express route,
1207
00:41:54,160 –> 00:41:56,480
direct connect, interconnects, all of that,
1208
00:41:56,480 –> 00:41:57,920
but the link is only the beginning.
1209
00:41:57,920 –> 00:42:00,240
Your code still has assumptions baked into it.
1210
00:42:00,240 –> 00:42:02,640
Default timeouts, synchronous calls,
1211
00:42:02,640 –> 00:42:04,400
where nobody measured round trip time,
1212
00:42:04,400 –> 00:42:06,800
ritrees that were safe in one environment
1213
00:42:06,800 –> 00:42:08,720
and catastrophic across the boundary.
1214
00:42:08,720 –> 00:42:10,800
This is where the uncomfortable rule shows up.
1215
00:42:10,800 –> 00:42:12,480
Once you cross-cloud boundaries,
1216
00:42:12,480 –> 00:42:14,640
you are no longer engineering a cloud app.
1217
00:42:14,640 –> 00:42:16,320
You are engineering a distributed system.
1218
00:42:16,320 –> 00:42:18,640
That distinction matters because distributed systems
1219
00:42:18,640 –> 00:42:20,080
don’t fail politely.
1220
00:42:20,080 –> 00:42:21,360
They fail with partial truth.
1221
00:42:21,360 –> 00:42:22,560
One side sees the request.
1222
00:42:22,560 –> 00:42:23,760
The other side didn’t.
1223
00:42:23,760 –> 00:42:24,720
Your client retries.
1224
00:42:24,720 –> 00:42:26,160
Now you have duplicates.
1225
00:42:26,160 –> 00:42:27,680
Or worse, you have state changes.
1226
00:42:27,680 –> 00:42:29,200
You can’t easily reason about
1227
00:42:29,200 –> 00:42:31,840
because you lost a clean, single timeline,
1228
00:42:31,840 –> 00:42:33,600
which leads directly to resilience.
1229
00:42:33,600 –> 00:42:36,000
Most teams confuse resilience with uptime.
1230
00:42:36,000 –> 00:42:37,920
They build active active diagrams,
1231
00:42:37,920 –> 00:42:39,280
talk about multi-region,
1232
00:42:39,280 –> 00:42:41,760
and assume the system is highly available.
1233
00:42:41,760 –> 00:42:44,080
But resilience is not just surviving the outage.
1234
00:42:44,080 –> 00:42:47,040
Resilience is recovering correctly after the outage.
1235
00:42:47,040 –> 00:42:50,560
In multi-cloud, that means you need replay, reconciliation,
1236
00:42:50,560 –> 00:42:52,880
and identity, by design.
1237
00:42:52,880 –> 00:42:54,880
If an event stream crosses boundaries
1238
00:42:54,880 –> 00:42:56,480
and one provider has a brownout,
1239
00:42:56,480 –> 00:42:58,160
you need the system to hold the events,
1240
00:42:58,160 –> 00:42:59,040
replay them,
1241
00:42:59,040 –> 00:43:01,680
and converge to the correct state when things return.
1242
00:43:01,680 –> 00:43:03,440
Without that, you don’t just get downtime.
1243
00:43:03,440 –> 00:43:04,960
You get data inconsistency
1244
00:43:04,960 –> 00:43:06,160
and in financial services,
1245
00:43:06,160 –> 00:43:08,560
healthcare, and regulated operations.
1246
00:43:08,560 –> 00:43:11,520
Inconsistent data is an incident even when everything is up.
1247
00:43:11,520 –> 00:43:12,880
Here’s the weird part.
1248
00:43:12,880 –> 00:43:15,360
The more you add retries to increase reliability,
1249
00:43:15,360 –> 00:43:17,360
the more likely you are to amplify failure.
1250
00:43:17,360 –> 00:43:20,480
Retry storms are how small network issues become full outages,
1251
00:43:20,480 –> 00:43:22,880
especially when two clouds disagree about what’s failing.
1252
00:43:22,880 –> 00:43:24,400
One side sees slow responses,
1253
00:43:24,400 –> 00:43:25,360
retries harder,
1254
00:43:25,360 –> 00:43:26,640
the other side sees loads spike,
1255
00:43:26,640 –> 00:43:27,600
slows further,
1256
00:43:27,600 –> 00:43:28,400
congratulations,
1257
00:43:28,400 –> 00:43:30,960
you invented cascading failure with extra steps.
1258
00:43:30,960 –> 00:43:32,240
So you need circuit breakers,
1259
00:43:32,240 –> 00:43:33,360
you need back pressure,
1260
00:43:33,360 –> 00:43:35,440
you need cues that can absorb shock
1261
00:43:35,440 –> 00:43:38,000
and you need your system to degrade intentionally
1262
00:43:38,000 –> 00:43:40,160
when cross-cloud dependencies misbehave
1263
00:43:40,160 –> 00:43:43,360
instead of pretending everything is fine until it collapses.
1264
00:43:43,360 –> 00:43:46,080
Now the part most multi-cloud programs stumble over,
1265
00:43:46,080 –> 00:43:48,160
event ordering and consistency.
1266
00:43:48,160 –> 00:43:49,360
In a single environment,
1267
00:43:49,360 –> 00:43:51,600
people assume a nice linear timeline.
1268
00:43:51,600 –> 00:43:53,760
It’s already a lie, but it’s an easy lie.
1269
00:43:53,760 –> 00:43:55,920
In multi-cloud, the lie breaks immediately.
1270
00:43:55,920 –> 00:43:57,280
Events arrive out of order,
1271
00:43:57,280 –> 00:43:58,320
clocks drift,
1272
00:43:58,320 –> 00:43:59,840
network paths vary,
1273
00:43:59,840 –> 00:44:01,520
consumers process at different speeds.
1274
00:44:01,520 –> 00:44:04,880
The same transaction can be approved in one place,
1275
00:44:04,880 –> 00:44:08,000
while another place still thinks the fraud check hasn’t happened yet.
1276
00:44:08,000 –> 00:44:09,840
So you have to choose your consistency models.
1277
00:44:09,840 –> 00:44:11,920
Strong consistency across clouds is expensive
1278
00:44:11,920 –> 00:44:13,200
and often impractical.
1279
00:44:13,200 –> 00:44:14,960
Eventually consistency is survivable,
1280
00:44:14,960 –> 00:44:18,080
but only if you design the business process around it.
1281
00:44:18,080 –> 00:44:19,120
Sequence numbers,
1282
00:44:19,120 –> 00:44:20,480
idempotent handlers,
1283
00:44:20,480 –> 00:44:21,680
deferred processing,
1284
00:44:21,680 –> 00:44:22,880
reconciliation jobs,
1285
00:44:22,880 –> 00:44:24,080
and explicit,
1286
00:44:24,080 –> 00:44:25,360
this may take a moment,
1287
00:44:25,360 –> 00:44:27,200
behavior in user flows.
1288
00:44:27,200 –> 00:44:28,880
If you don’t make that explicit,
1289
00:44:28,880 –> 00:44:30,880
your system will still be eventually consistent.
1290
00:44:30,880 –> 00:44:32,400
It will just be eventually wrong.
1291
00:44:32,400 –> 00:44:33,840
And that takes us to observability,
1292
00:44:33,840 –> 00:44:37,360
which is where multi-cloud becomes either manageable or unfixable.
1293
00:44:37,360 –> 00:44:38,640
In a multi-cloud incident,
1294
00:44:38,640 –> 00:44:39,760
local logs are not enough.
1295
00:44:39,760 –> 00:44:42,160
You need N to N traces across boundaries.
1296
00:44:42,160 –> 00:44:44,560
You need correlated IDs that survive hops.
1297
00:44:44,560 –> 00:44:47,280
You need to see one transactions journey through multiple services,
1298
00:44:47,280 –> 00:44:48,080
multiple cues,
1299
00:44:48,080 –> 00:44:48,960
multiple providers,
1300
00:44:48,960 –> 00:44:50,560
and multiple identity decisions.
1301
00:44:50,560 –> 00:44:51,760
Without that, you are blind.
1302
00:44:51,760 –> 00:44:53,760
And blind systems don’t get debugged,
1303
00:44:53,760 –> 00:44:55,920
and they get rebooted until the symptoms stop,
1304
00:44:55,920 –> 00:44:57,920
and the root cause becomes folklore.
1305
00:44:57,920 –> 00:45:00,720
This is why multi-cloud turns incidents into systems behavior.
1306
00:45:00,720 –> 00:45:03,760
The system is behaving exactly as design.
1307
00:45:03,760 –> 00:45:05,760
Independently, asyncranously,
1308
00:45:05,760 –> 00:45:08,720
and without your human desire for linear explanations.
1309
00:45:08,720 –> 00:45:10,560
So if leadership wants multi-cloud,
1310
00:45:10,560 –> 00:45:13,520
they are also choosing to fund distributed systems engineering,
1311
00:45:13,520 –> 00:45:15,120
explicit latency budgets,
1312
00:45:15,120 –> 00:45:16,720
deliberate resilience patterns,
1313
00:45:16,720 –> 00:45:18,320
event replay, idempotency,
1314
00:45:18,320 –> 00:45:20,000
and unified observability.
1315
00:45:20,000 –> 00:45:21,920
Otherwise, they’re not building redundancies,
1316
00:45:21,920 –> 00:45:24,560
they’re building conditional chaos across providers.
1317
00:45:24,560 –> 00:45:25,760
When multi-cloud works,
1318
00:45:25,760 –> 00:45:27,920
versus when it becomes self-inflicted pain,
1319
00:45:27,920 –> 00:45:29,600
so when does multi-cloud actually work?
1320
00:45:29,600 –> 00:45:31,360
Not survive, work.
1321
00:45:31,360 –> 00:45:35,120
Delivering a real advantage that justifies the tax you’re choosing to pay.
1322
00:45:35,120 –> 00:45:37,200
It works when the reason is explicit, durable,
1323
00:45:37,200 –> 00:45:39,760
and tied to constraints you can’t negotiate away.
1324
00:45:39,760 –> 00:45:41,920
Regulatory separation is the cleanest example.
1325
00:45:41,920 –> 00:45:44,560
If one dataset must stay in one jurisdiction,
1326
00:45:44,560 –> 00:45:46,720
and another must not share control planes,
1327
00:45:46,720 –> 00:45:49,920
you can either build a complicated internal segmentation model
1328
00:45:49,920 –> 00:45:53,120
or you can use a provider boundary as an enforcement mechanism.
1329
00:45:53,120 –> 00:45:54,160
That can be rational,
1330
00:45:54,160 –> 00:45:55,280
but you still have to operate it.
1331
00:45:55,280 –> 00:45:56,640
The boundary gives you isolation,
1332
00:45:56,640 –> 00:45:58,400
it does not give you coherence.
1333
00:45:58,400 –> 00:46:00,320
Risk isolation can also be valid,
1334
00:46:00,320 –> 00:46:03,440
but only if you treat it like an insurance policy with drills.
1335
00:46:03,440 –> 00:46:05,680
If leadership says we’re multi-cloud for resilience,
1336
00:46:05,680 –> 00:46:07,280
then leadership is also saying,
1337
00:46:07,280 –> 00:46:09,920
we will fund multi-region and cross-cloud failover testing,
1338
00:46:09,920 –> 00:46:12,640
and we will accept that some architectures will be duplicated.
1339
00:46:12,640 –> 00:46:14,800
If you don’t test failover, you don’t have resilience.
1340
00:46:14,800 –> 00:46:16,000
You have two builds.
1341
00:46:16,000 –> 00:46:17,280
Best of breed can work too,
1342
00:46:17,280 –> 00:46:18,800
but only when you constrain it.
1343
00:46:18,800 –> 00:46:21,040
One cloud for a specific workload class.
1344
00:46:21,040 –> 00:46:22,560
A defined integration surface,
1345
00:46:22,560 –> 00:46:23,840
a defined identity model,
1346
00:46:23,840 –> 00:46:25,040
a defined logging model,
1347
00:46:25,040 –> 00:46:26,240
and a platform team
1348
00:46:26,240 –> 00:46:28,000
that can enforce those definitions
1349
00:46:28,000 –> 00:46:30,000
without exceptions becoming the default.
1350
00:46:30,240 –> 00:46:31,120
That’s the meta rule,
1351
00:46:31,120 –> 00:46:32,880
multi-cloud works when it is bounded.
1352
00:46:32,880 –> 00:46:34,640
Now let’s talk about the scenarios that fail,
1353
00:46:34,640 –> 00:46:38,000
because they fail far more predictably than the success cases.
1354
00:46:38,000 –> 00:46:40,640
The first failure mode is portability theater.
1355
00:46:40,640 –> 00:46:42,160
This is where executives say,
1356
00:46:42,160 –> 00:46:43,840
we want to avoid lock-in,
1357
00:46:43,840 –> 00:46:45,680
and engineers interpret that as,
1358
00:46:45,680 –> 00:46:48,000
never use any managed service deeply.
1359
00:46:48,000 –> 00:46:50,480
So you end up rebuilding cloud services yourself,
1360
00:46:50,480 –> 00:46:52,320
databases behind Kubernetes,
1361
00:46:52,320 –> 00:46:53,840
DIY messaging layers,
1362
00:46:53,840 –> 00:46:55,600
bespoke observability pipelines,
1363
00:46:55,600 –> 00:46:58,320
a homegrown platform that resembles a hyperscaler,
1364
00:46:58,320 –> 00:47:00,080
but without hyperscaler staffing.
1365
00:47:00,080 –> 00:47:01,200
You didn’t avoid lock-in,
1366
00:47:01,200 –> 00:47:04,160
you just locked yourself into your own mediocre implementation,
1367
00:47:04,160 –> 00:47:06,080
and you paid for it with delivery speed.
1368
00:47:06,080 –> 00:47:08,320
The second failure mode is duplicated toolchains.
1369
00:47:08,320 –> 00:47:11,280
Teams run one CICD model in Azure DevOps,
1370
00:47:11,280 –> 00:47:12,560
another in GitHub,
1371
00:47:12,560 –> 00:47:14,720
another in a third-party system,
1372
00:47:14,720 –> 00:47:16,240
one logging stack in one cloud,
1373
00:47:16,240 –> 00:47:17,520
another in the other cloud,
1374
00:47:17,520 –> 00:47:18,640
different secret stores,
1375
00:47:18,640 –> 00:47:19,840
different network patterns,
1376
00:47:19,840 –> 00:47:21,200
different identity assumptions,
1377
00:47:21,200 –> 00:47:22,480
different incident processes,
1378
00:47:22,480 –> 00:47:23,760
different audit evidence.
1379
00:47:23,760 –> 00:47:24,800
At that point,
1380
00:47:24,800 –> 00:47:26,480
multi-cloud isn’t an architecture.
1381
00:47:26,480 –> 00:47:28,720
It’s parallel companies sharing a logo,
1382
00:47:28,720 –> 00:47:31,680
and the third failure mode is fractured identity and policy.
1383
00:47:31,680 –> 00:47:33,360
Identity is the backbone of control.
1384
00:47:33,360 –> 00:47:35,440
Policy is the expression of intent.
1385
00:47:35,440 –> 00:47:38,080
In multi-cloud, identity fractures faster than anything else,
1386
00:47:38,080 –> 00:47:39,840
because each provider has a different grammar
1387
00:47:39,840 –> 00:47:41,520
for roles, scopes, and enforcement.
1388
00:47:41,520 –> 00:47:42,480
So what happens?
1389
00:47:42,480 –> 00:47:43,520
People take shortcuts.
1390
00:47:43,520 –> 00:47:45,920
They create broad roles temporarily.
1391
00:47:45,920 –> 00:47:47,920
They reuse service principles for convenience.
1392
00:47:47,920 –> 00:47:49,920
They store credentials where they shouldn’t.
1393
00:47:49,920 –> 00:47:51,680
They accept gaps in conditional access
1394
00:47:51,680 –> 00:47:53,520
because that’s only for Azure.
1395
00:47:53,520 –> 00:47:56,240
They run separate brake-class patterns in each environment.
1396
00:47:56,240 –> 00:47:57,920
They end up with three different definitions
1397
00:47:57,920 –> 00:47:59,040
of privileged access.
1398
00:47:59,040 –> 00:48:01,200
Then they tell themselves the system is secure
1399
00:48:01,200 –> 00:48:03,280
because each environment has security tooling.
1400
00:48:03,280 –> 00:48:05,040
That’s not security.
1401
00:48:05,040 –> 00:48:06,960
That’s distributed hope.
1402
00:48:06,960 –> 00:48:08,160
So here’s the hard rule,
1403
00:48:08,160 –> 00:48:09,440
and it’s not negotiable.
1404
00:48:09,440 –> 00:48:11,280
Multi-cloud succeeds operationally
1405
00:48:11,280 –> 00:48:13,520
only when governance precedes portability.
1406
00:48:13,520 –> 00:48:16,240
Governance first means identity model first,
1407
00:48:16,240 –> 00:48:17,520
logging and telemetry first,
1408
00:48:17,520 –> 00:48:18,960
policy enforcement first,
1409
00:48:18,960 –> 00:48:20,960
inventory first, incident response first.
1410
00:48:20,960 –> 00:48:22,560
The control plane posture is designed
1411
00:48:22,560 –> 00:48:24,640
before the portability story is sold,
1412
00:48:24,640 –> 00:48:26,160
because portability without governance
1413
00:48:26,160 –> 00:48:28,160
is just moving problems faster.
1414
00:48:28,160 –> 00:48:30,880
This is also why procurement leverage is a distraction.
1415
00:48:30,880 –> 00:48:32,960
Procurement cares about replacing vendors.
1416
00:48:32,960 –> 00:48:35,440
Operations cares about surviving complexity.
1417
00:48:35,440 –> 00:48:36,800
If you can’t operate the system,
1418
00:48:36,800 –> 00:48:38,640
you can’t exploit your options.
1419
00:48:38,640 –> 00:48:40,160
You become dependent on the very thing
1420
00:48:40,160 –> 00:48:41,680
you claimed you were avoiding.
1421
00:48:41,680 –> 00:48:44,320
The specific people who understand the cross-cloud mess,
1422
00:48:44,320 –> 00:48:45,280
that is not resilience,
1423
00:48:45,280 –> 00:48:47,440
that is key person risk at cloud scale.
1424
00:48:47,440 –> 00:48:48,960
Here’s the composite failure archetype
1425
00:48:48,960 –> 00:48:51,520
that shows up in tech-forward enterprises.
1426
00:48:51,520 –> 00:48:53,360
They decide multi-cloud is their identity,
1427
00:48:53,360 –> 00:48:55,600
they invest in cloud agnostic everything.
1428
00:48:55,600 –> 00:48:57,920
They create platforms to abstract providers,
1429
00:48:57,920 –> 00:49:00,800
they distribute workloads for theoretical flexibility,
1430
00:49:00,800 –> 00:49:03,840
and then delivery slows, security gets inconsistent.
1431
00:49:03,840 –> 00:49:06,320
Incidents take longer because nobody can see end-to-end.
1432
00:49:06,320 –> 00:49:08,160
The platform team becomes the bottleneck
1433
00:49:08,160 –> 00:49:10,480
because every decision crosses boundaries.
1434
00:49:10,480 –> 00:49:13,200
Eventually leadership asks why velocity dropped?
1435
00:49:13,200 –> 00:49:14,080
And the answer is simple,
1436
00:49:14,080 –> 00:49:15,440
they optimised for optionality,
1437
00:49:15,440 –> 00:49:18,160
then forgot that optionality has operating costs.
1438
00:49:18,160 –> 00:49:19,120
Now to be clear,
1439
00:49:19,120 –> 00:49:21,040
none of this says multi-cloud is wrong.
1440
00:49:21,040 –> 00:49:23,440
What it says is unmanaged operating models are wrong.
1441
00:49:23,440 –> 00:49:26,000
Multi-cloud can be a rational response to constraints,
1442
00:49:26,000 –> 00:49:27,840
but if you treat it as an aesthetic preference
1443
00:49:27,840 –> 00:49:29,280
or a procurement tactic,
1444
00:49:29,280 –> 00:49:31,040
it becomes self-inflicted pain.
1445
00:49:31,040 –> 00:49:33,600
So the decision isn’t how many clouds do we want.
1446
00:49:33,600 –> 00:49:36,000
The decision is how much complexity can we operate
1447
00:49:36,000 –> 00:49:37,040
without losing control,
1448
00:49:37,040 –> 00:49:38,400
and how much governance discipline
1449
00:49:38,400 –> 00:49:39,440
are we willing to enforce
1450
00:49:39,440 –> 00:49:41,200
to keep that complexity from decaying?
1451
00:49:41,200 –> 00:49:44,400
The five access decision framework leaders can actually use.
1452
00:49:44,400 –> 00:49:46,240
So at this point, the temptation is to say,
1453
00:49:46,240 –> 00:49:49,040
it depends and go back to arguing about providers.
1454
00:49:49,040 –> 00:49:50,640
That’s the comfortable failure mode.
1455
00:49:50,640 –> 00:49:53,280
Instead, this is the part where leaders take ownership
1456
00:49:53,280 –> 00:49:55,600
of the constraints they’ve been pretending are optional.
1457
00:49:55,600 –> 00:49:57,040
Architecture isn’t a vibe.
1458
00:49:57,040 –> 00:50:00,240
It’s a set of trade-offs you’ll pay for every day for years.
1459
00:50:00,240 –> 00:50:01,600
So here’s a decision framework
1460
00:50:01,600 –> 00:50:03,920
that’s blunt enough to survive an executive room
1461
00:50:03,920 –> 00:50:05,200
and simple enough to run
1462
00:50:05,200 –> 00:50:08,160
without turning it into a six-month analysis project.
1463
00:50:08,160 –> 00:50:11,600
Five access, score each one from one to five, low to high.
1464
00:50:11,600 –> 00:50:16,400
And yes, this is runnable in a single 90-minute session
1465
00:50:16,400 –> 00:50:18,640
if the right people are actually in the room.
1466
00:50:18,640 –> 00:50:21,520
The security lead, the platform or infrastructure lead,
1467
00:50:21,520 –> 00:50:24,560
the application lead, finance or procurement,
1468
00:50:24,560 –> 00:50:26,560
and one business owner who can say what
1469
00:50:26,560 –> 00:50:28,240
failure costs in real terms.
1470
00:50:28,240 –> 00:50:30,800
Access one, regulatory pressure.
1471
00:50:30,800 –> 00:50:33,040
A score of one means regulation is light
1472
00:50:33,040 –> 00:50:34,640
and mostly internal policy.
1473
00:50:34,640 –> 00:50:36,320
A score of five means you operate
1474
00:50:36,320 –> 00:50:37,520
under real external scrutiny.
1475
00:50:37,520 –> 00:50:40,080
Audits, evidence requirements,
1476
00:50:40,080 –> 00:50:41,120
residency constraints,
1477
00:50:41,120 –> 00:50:43,680
and consequences that involve more than embarrassment.
1478
00:50:43,680 –> 00:50:46,080
High regulatory pressure pushes you away from
1479
00:50:46,080 –> 00:50:47,840
public only by default,
1480
00:50:47,840 –> 00:50:49,920
not because public cloud can’t be compliant,
1481
00:50:49,920 –> 00:50:52,480
but because the operating model has to produce evidence
1482
00:50:52,480 –> 00:50:53,520
continuously.
1483
00:50:53,520 –> 00:50:55,840
If you can’t prove control, you don’t have control.
1484
00:50:55,840 –> 00:50:58,320
Access two, latency sensitivity.
1485
00:50:58,320 –> 00:51:01,680
A one means humans won’t notice if you add 50 milliseconds.
1486
00:51:01,680 –> 00:51:04,640
A five means latency is contractual or safety-related.
1487
00:51:04,640 –> 00:51:07,280
Clinical systems, industrial control, point of sale,
1488
00:51:07,280 –> 00:51:08,960
real-time fraud decisions,
1489
00:51:08,960 –> 00:51:11,760
anything where a bit slower turns into we are down.
1490
00:51:11,760 –> 00:51:13,600
High latency sensitivity pushes you
1491
00:51:13,600 –> 00:51:15,920
toward hybrid placement, edge execution
1492
00:51:15,920 –> 00:51:18,560
and architectures that don’t depend on cross-cloud round trips
1493
00:51:18,560 –> 00:51:19,680
for critical paths.
1494
00:51:19,680 –> 00:51:21,360
Physics will win, it always does.
1495
00:51:21,360 –> 00:51:25,120
Access three, cost predictability requirements.
1496
00:51:25,120 –> 00:51:27,440
A one means the business tolerates variance
1497
00:51:27,440 –> 00:51:30,240
because growth and speed matter more than precision.
1498
00:51:30,240 –> 00:51:33,120
A five means margins are tight, forecasting matters,
1499
00:51:33,120 –> 00:51:35,280
and leadership will punish unpredictability harder
1500
00:51:35,280 –> 00:51:36,720
than it punishes delay.
1501
00:51:36,720 –> 00:51:38,880
High predictability requirements don’t automatically
1502
00:51:38,880 –> 00:51:40,560
mean no public cloud.
1503
00:51:40,560 –> 00:51:42,560
They mean you need commitments, governance,
1504
00:51:42,560 –> 00:51:45,120
unit economics, and guardrails that are enforced
1505
00:51:45,120 –> 00:51:47,200
because optionality without discipline
1506
00:51:47,200 –> 00:51:48,880
turns into invoice volatility.
1507
00:51:48,880 –> 00:51:51,360
Access four, internal cloud maturity.
1508
00:51:51,360 –> 00:51:53,680
A one means you don’t have a real platform model.
1509
00:51:53,680 –> 00:51:55,840
Week tagging inconsistent identity controls
1510
00:51:55,840 –> 00:51:58,000
ad hoc networking, minimal policy enforcement,
1511
00:51:58,000 –> 00:51:59,600
limited observability.
1512
00:51:59,600 –> 00:52:03,760
A five means cloud is an operating model you actually run.
1513
00:52:03,760 –> 00:52:05,760
Infrastructure as code is normal,
1514
00:52:05,760 –> 00:52:09,360
policy and RBAC are consistent, cost allocation works,
1515
00:52:09,360 –> 00:52:12,080
and teams can ship without bypassing governance.
1516
00:52:12,080 –> 00:52:14,160
This access is the maturity mirror.
1517
00:52:14,160 –> 00:52:16,160
Low maturity doesn’t mean you can’t use cloud.
1518
00:52:16,160 –> 00:52:18,640
It means the architecture you choose will degrade fast.
1519
00:52:18,640 –> 00:52:21,440
Multi-cloud in a low maturity org isn’t advanced.
1520
00:52:21,440 –> 00:52:23,040
It’s self-harm with a roadmap.
1521
00:52:23,040 –> 00:52:25,040
Access five, change velocity.
1522
00:52:25,040 –> 00:52:26,960
A one means the business changes slowly,
1523
00:52:26,960 –> 00:52:29,280
releases are in frequent, the environment is stable.
1524
00:52:29,280 –> 00:52:32,480
A five means constant iteration, new features,
1525
00:52:32,480 –> 00:52:35,680
new markets, frequent deployments, rapid experimentation.
1526
00:52:35,680 –> 00:52:37,680
High change velocity favors public first
1527
00:52:37,680 –> 00:52:40,320
and manage services because the organization needs speed
1528
00:52:40,320 –> 00:52:43,600
and can justify paying for elasticity and platform capabilities.
1529
00:52:43,600 –> 00:52:47,280
Low change velocity favors predictability and deliberate placement
1530
00:52:47,280 –> 00:52:50,800
because always on and rarely changed behave like a steady state system.
1531
00:52:50,800 –> 00:52:53,440
Now, once you score these five access, you don’t get a single answer.
1532
00:52:53,440 –> 00:52:57,760
You get a gravity field, but the outputs tend to cluster into four categories.
1533
00:52:57,760 –> 00:53:00,080
Category one, public first, by design.
1534
00:53:00,080 –> 00:53:03,040
This is low to moderate regulatory pressure, low latency sensitivity,
1535
00:53:03,040 –> 00:53:06,160
high change velocity, and at least moderate cloud maturity.
1536
00:53:06,160 –> 00:53:09,280
Cost predictability can vary, but only if you build real FinOps governance.
1537
00:53:09,280 –> 00:53:12,640
Public first works here because the business is paying for speed
1538
00:53:12,640 –> 00:53:14,000
and can operate the platform.
1539
00:53:14,000 –> 00:53:16,080
Category two, hybrid first, by design.
1540
00:53:16,080 –> 00:53:19,360
This is high regulatory pressure and/or high latency sensitivity
1541
00:53:19,360 –> 00:53:22,000
with a real need to keep some data and compute local.
1542
00:53:22,000 –> 00:53:24,960
Hybrid first succeeds when you treat Azure as the control plane
1543
00:53:24,960 –> 00:53:27,840
and accept that locality is a constraint, not a failure.
1544
00:53:27,840 –> 00:53:29,920
This is also where arc stops being optional
1545
00:53:29,920 –> 00:53:32,560
because centralized governance is what prevents hybrid
1546
00:53:32,560 –> 00:53:34,160
from decaying into tools brawl.
1547
00:53:34,160 –> 00:53:37,200
Category three, multi-cloud, by accident.
1548
00:53:37,200 –> 00:53:39,200
This is the common enterprise pattern.
1549
00:53:39,200 –> 00:53:42,240
You already have multiple providers due to acquisitions.
1550
00:53:42,240 –> 00:53:45,520
Regional constraints, SaaS, SPOL, or historical decisions.
1551
00:53:45,520 –> 00:53:48,480
The goal here is not to celebrate it, the goal is to contain it.
1552
00:53:48,480 –> 00:53:52,160
Standardize identity posture, logging, and policy as much as possible
1553
00:53:52,160 –> 00:53:54,560
and stop pretending portability will save you.
1554
00:53:54,560 –> 00:53:56,480
Category four, multi-cloud, by design.
1555
00:53:56,480 –> 00:53:57,280
This is rare.
1556
00:53:57,280 –> 00:54:00,320
It requires high-cloud maturity and explicit reasons
1557
00:54:00,320 –> 00:54:03,520
that justify the tax, hard regulatory separation,
1558
00:54:03,520 –> 00:54:05,840
true risk isolation with tested failover,
1559
00:54:05,840 –> 00:54:07,760
or specialized workload requirements.
1560
00:54:07,760 –> 00:54:10,320
And it only works when governance precedes portability.
1561
00:54:10,320 –> 00:54:12,640
So here’s the worksheet prompt that makes this practical.
1562
00:54:12,640 –> 00:54:13,840
What must stay local?
1563
00:54:13,840 –> 00:54:15,520
What must scale globally?
1564
00:54:15,520 –> 00:54:17,360
Where does governance break today?
1565
00:54:17,360 –> 00:54:20,720
And what complexity are you already owning without admitting it?
1566
00:54:20,720 –> 00:54:22,880
If leadership can answer those honestly,
1567
00:54:22,880 –> 00:54:25,520
the right architecture usually becomes obvious.
1568
00:54:25,520 –> 00:54:28,480
The organizational cost nobody budgets for.
1569
00:54:28,480 –> 00:54:30,960
Once you pick a model, public first, hybrid first,
1570
00:54:30,960 –> 00:54:33,280
or multi-cloud, you don’t just pick technology.
1571
00:54:33,280 –> 00:54:35,280
You pick an organizational tax structure
1572
00:54:35,280 –> 00:54:36,640
and nobody budgets for it.
1573
00:54:36,640 –> 00:54:38,320
The first cost is talent burn
1574
00:54:38,320 –> 00:54:39,920
because complexity doesn’t disappear.
1575
00:54:39,920 –> 00:54:42,160
It relocates into the platform team.
1576
00:54:42,160 –> 00:54:44,000
When identity differs by environment,
1577
00:54:44,000 –> 00:54:45,680
policies drift by location,
1578
00:54:45,680 –> 00:54:47,120
and tooling multiplies,
1579
00:54:47,120 –> 00:54:49,440
platform engineers become human middleware,
1580
00:54:49,440 –> 00:54:51,840
translating intent into five different systems,
1581
00:54:51,840 –> 00:54:53,040
chasing exceptions,
1582
00:54:53,040 –> 00:54:55,680
and cleaning up after every justice once.
1583
00:54:55,680 –> 00:54:57,120
That job doesn’t scale.
1584
00:54:57,120 –> 00:54:58,320
It accumulates fatigue.
1585
00:54:58,320 –> 00:55:00,640
Then the best people leave
1586
00:55:00,640 –> 00:55:03,040
and the architecture becomes even more fragile
1587
00:55:03,040 –> 00:55:05,040
because now the only thing holding it together
1588
00:55:05,040 –> 00:55:06,800
was institutional memory.
1589
00:55:06,800 –> 00:55:09,040
Multi-cloud loves to create key person risk.
1590
00:55:09,040 –> 00:55:11,040
Hybrid loves to create exception handlers.
1591
00:55:11,040 –> 00:55:12,800
Public cloud loves to create sprawl.
1592
00:55:12,800 –> 00:55:13,760
Pick your poison.
1593
00:55:13,760 –> 00:55:15,920
The second cost is decision paralysis.
1594
00:55:15,920 –> 00:55:17,040
When governance is weak,
1595
00:55:17,040 –> 00:55:18,640
every decision becomes negotiable.
1596
00:55:18,640 –> 00:55:20,240
Standards turn into suggestions.
1597
00:55:20,240 –> 00:55:21,840
Suggestions turn into exceptions.
1598
00:55:21,840 –> 00:55:23,920
The exceptions turn into how we do it now.
1599
00:55:23,920 –> 00:55:26,480
Over time, the organization stops arguing about
1600
00:55:26,480 –> 00:55:28,640
what’s correct and starts arguing about
1601
00:55:28,640 –> 00:55:31,280
what’s allowed because policy isn’t enforced by design.
1602
00:55:31,280 –> 00:55:32,720
It’s enforced by meetings.
1603
00:55:32,720 –> 00:55:34,000
That is not an operating model.
1604
00:55:34,000 –> 00:55:35,520
That is slow motion entropy.
1605
00:55:35,520 –> 00:55:37,680
The third cost is shadow IT returning
1606
00:55:37,680 –> 00:55:40,240
because friction always creates bypass behavior.
1607
00:55:40,240 –> 00:55:42,320
If it takes weeks to get a resource approved,
1608
00:55:42,320 –> 00:55:44,080
teams will buy SaaS with a credit card.
1609
00:55:44,080 –> 00:55:45,680
If the platform team says no,
1610
00:55:45,680 –> 00:55:47,280
without offering a safe path,
1611
00:55:47,280 –> 00:55:48,800
teams will root around them.
1612
00:55:48,800 –> 00:55:50,320
Not because they’re malicious.
1613
00:55:50,320 –> 00:55:51,840
Because delivery pressure is real
1614
00:55:51,840 –> 00:55:53,440
and incentives beat policy.
1615
00:55:53,440 –> 00:55:54,880
And the moment you have shadow IT,
1616
00:55:54,880 –> 00:55:56,240
you don’t have a cloud strategy.
1617
00:55:56,240 –> 00:55:57,920
You have an audit problem waiting for a date.
1618
00:55:57,920 –> 00:55:59,520
The fourth cost is security drift.
1619
00:55:59,520 –> 00:56:01,280
Security doesn’t fail as a single event.
1620
00:56:01,280 –> 00:56:03,680
It erodes through accumulated exceptions,
1621
00:56:03,680 –> 00:56:06,000
unowned resources, inconsistent logging,
1622
00:56:06,000 –> 00:56:07,280
and identity sprawl.
1623
00:56:07,280 –> 00:56:08,720
The longer the environment exists,
1624
00:56:08,720 –> 00:56:10,800
the less deterministic your control becomes,
1625
00:56:10,800 –> 00:56:13,680
unless you actively fight drift with policy enforcement,
1626
00:56:13,680 –> 00:56:15,040
inventory discipline,
1627
00:56:15,040 –> 00:56:17,200
and consistent life cycle management.
1628
00:56:17,200 –> 00:56:19,280
This is why we’re secure is never a statement.
1629
00:56:19,280 –> 00:56:21,600
It’s a continuously re-earned condition.
1630
00:56:21,600 –> 00:56:23,120
And this is the quiet advantage Azure
1631
00:56:23,120 –> 00:56:24,480
often has in real enterprises.
1632
00:56:24,480 –> 00:56:27,280
Control plane consistency reduces coordination text.
1633
00:56:27,280 –> 00:56:28,480
Not because Azure is magic,
1634
00:56:28,480 –> 00:56:30,640
but because when one governance stack
1635
00:56:30,640 –> 00:56:32,160
can reach more of your estate,
1636
00:56:32,160 –> 00:56:35,120
you spend less time reconciling reality across silos.
1637
00:56:35,120 –> 00:56:36,880
But don’t confuse that with a vendor win.
1638
00:56:36,880 –> 00:56:38,320
It’s an operating model win.
1639
00:56:38,320 –> 00:56:40,240
Because the true cost of cloud isn’t the build.
1640
00:56:40,240 –> 00:56:42,400
It’s the complexity you didn’t assign an owner to,
1641
00:56:42,400 –> 00:56:43,840
the policies you didn’t enforce,
1642
00:56:43,840 –> 00:56:46,880
and the humans you burned out to keep the system coherent.
1643
00:56:46,880 –> 00:56:49,120
The question you should leave the room arguing about,
1644
00:56:49,120 –> 00:56:51,040
choosing public hybrid or multi-cloud
1645
00:56:51,040 –> 00:56:52,880
is choosing how much control and complexity
1646
00:56:52,880 –> 00:56:54,400
you’ll own for the next decade,
1647
00:56:54,400 –> 00:56:55,760
and who pays for it.
1648
00:56:55,760 –> 00:56:57,120
If you want the follow-up,
1649
00:56:57,120 –> 00:56:58,560
listen to the next episode
1650
00:56:58,560 –> 00:56:59,920
on building a control plane
1651
00:56:59,920 –> 00:57:02,960
that survives policy drift and organizational entropy.
1652
00:57:02,960 –> 00:57:05,440
Because the winners won’t be the ones with the best cloud,
1653
00:57:05,440 –> 00:57:09,440
There’ll be the ones who can operate complexity without losing control.