AWS Enterprise Control Plane Insights

Mirko PetersPodcasts1 hour ago34 Views


1
00:00:00,000 –> 00:00:03,600
Most organizations believe AWS is winning the cloud war,

2
00:00:03,600 –> 00:00:06,000
but they are looking at the wrong battlefield.

3
00:00:06,000 –> 00:00:08,400
While AWS still runs more global workloads

4
00:00:08,400 –> 00:00:10,400
than any other competitor enterprise control

5
00:00:10,400 –> 00:00:12,680
has shifted to a different arena entirely.

6
00:00:12,680 –> 00:00:15,000
The original cloud war focused on infrastructure,

7
00:00:15,000 –> 00:00:17,160
specifically who could provision compute fastest,

8
00:00:17,160 –> 00:00:19,880
scale storage cheapest and offer the broader service catalog.

9
00:00:19,880 –> 00:00:21,760
AWS won that war decisively,

10
00:00:21,760 –> 00:00:24,440
yet the new conflict centers on something else,

11
00:00:24,440 –> 00:00:28,520
identity, policy, and governance across the entire organization.

12
00:00:28,520 –> 00:00:30,800
In this environment, Microsoft has positioned itself

13
00:00:30,800 –> 00:00:33,280
as the control plane, while AWS continues

14
00:00:33,280 –> 00:00:34,840
to build the infrastructure underneath.

15
00:00:34,840 –> 00:00:37,480
Over 80% of enterprises are currently hybrid

16
00:00:37,480 –> 00:00:39,520
and will remain so through 2027,

17
00:00:39,520 –> 00:00:41,480
which is not a failure of cloud migration

18
00:00:41,480 –> 00:00:42,480
or a lack of commitment.

19
00:00:42,480 –> 00:00:44,400
Hybrid is the architectural end state.

20
00:00:44,400 –> 00:00:46,680
In these environments, the winner is not the provider

21
00:00:46,680 –> 00:00:47,720
with the most compute,

22
00:00:47,720 –> 00:00:50,240
but the one controlling identity, policy,

23
00:00:50,240 –> 00:00:53,280
and workflow across the entire organization.

24
00:00:53,280 –> 00:00:54,440
That is Microsoft.

25
00:00:54,440 –> 00:00:56,160
The infrastructure war is over.

26
00:00:56,160 –> 00:00:57,560
AWS won.

27
00:00:57,560 –> 00:01:00,160
We should be clear about what AWS actually accomplished.

28
00:01:00,160 –> 00:01:01,840
AWS dominates raw market share

29
00:01:01,840 –> 00:01:04,480
with 32% of global cloud infrastructure spending

30
00:01:04,480 –> 00:01:08,200
and offers 230 services across compute, storage, networking,

31
00:01:08,200 –> 00:01:09,200
and AI.

32
00:01:09,200 –> 00:01:12,760
With 33 regions and 105 availability zones,

33
00:01:12,760 –> 00:01:16,360
they built a mature ecosystem with deep DevOps automation

34
00:01:16,360 –> 00:01:20,840
and cost optimization tools that competitors still cannot match.

35
00:01:20,840 –> 00:01:24,240
The victory AWS achieved in infrastructure is not in question

36
00:01:24,240 –> 00:01:25,920
as it is a historical fact.

37
00:01:25,920 –> 00:01:27,560
However, here is the uncomfortable part

38
00:01:27,560 –> 00:01:30,080
that dominance does not translate to dominance in governance

39
00:01:30,080 –> 00:01:31,920
because the battleground has simply moved.

40
00:01:31,920 –> 00:01:34,760
Enterprises have stopped asking which cloud they should build on.

41
00:01:34,760 –> 00:01:37,520
As that question was settled years ago for most organizations,

42
00:01:37,520 –> 00:01:39,160
they asked it, received an answer,

43
00:01:39,160 –> 00:01:41,200
and moved on to a completely different problem.

44
00:01:41,200 –> 00:01:44,320
How to govern identity and policy across multiple clouds?

45
00:01:44,320 –> 00:01:45,680
That question has a different answer.

46
00:01:45,680 –> 00:01:48,280
This shift happened gradually, but around 2020,

47
00:01:48,280 –> 00:01:50,600
enterprises started noticing a significant problem

48
00:01:50,600 –> 00:01:51,880
with their architectural sprawl.

49
00:01:51,880 –> 00:01:55,560
They had workloads on AWS, Azure, and Google Cloud.

50
00:01:55,560 –> 00:01:58,720
Along with on-premises infrastructure, they could not decommission.

51
00:01:58,720 –> 00:02:01,640
Managing five different identity systems became untenable

52
00:02:01,640 –> 00:02:04,480
because it meant maintaining five different audit trails,

53
00:02:04,480 –> 00:02:06,080
five compliance frameworks,

54
00:02:06,080 –> 00:02:08,400
and five different places to revoke access

55
00:02:08,400 –> 00:02:10,640
when an employee left the company.

56
00:02:10,640 –> 00:02:14,000
The result was a new demand, unified identity.

57
00:02:14,000 –> 00:02:17,480
AWS responded to this need with IAM Identity Center,

58
00:02:17,480 –> 00:02:20,680
which is a solid product for providing SSO and MFA

59
00:02:20,680 –> 00:02:21,920
across AWS accounts.

60
00:02:21,920 –> 00:02:24,520
But the architectural truth is that IAM Identity Center

61
00:02:24,520 –> 00:02:27,640
originates in AWS and is built specifically for AWS.

62
00:02:27,640 –> 00:02:29,600
When you federated to other platforms,

63
00:02:29,600 –> 00:02:32,600
you are extending AWS Identity outward

64
00:02:32,600 –> 00:02:35,120
and claiming that AWS is the source of truth.

65
00:02:35,120 –> 00:02:37,960
Microsoft EntraID approaches the problem from a different angle.

66
00:02:37,960 –> 00:02:39,880
EntraID originates in the workforce

67
00:02:39,880 –> 00:02:42,160
and is built for humans and their applications,

68
00:02:42,160 –> 00:02:43,360
rather than just servers.

69
00:02:43,360 –> 00:02:45,600
When EntraID federates with AWS,

70
00:02:45,600 –> 00:02:47,880
the Microsoft Identity Engine issues the tokens

71
00:02:47,880 –> 00:02:51,240
that grant AWS access, which is not a state of coexistence.

72
00:02:51,240 –> 00:02:53,120
It is subordination, the enterprise no longer

73
00:02:53,120 –> 00:02:54,880
sees two identity systems,

74
00:02:54,880 –> 00:02:57,200
but rather one Microsoft system managing access

75
00:02:57,200 –> 00:03:00,520
to multiple platforms that difference in origin matters at scale.

76
00:03:00,520 –> 00:03:03,240
When identity originates in one place and governs everywhere,

77
00:03:03,240 –> 00:03:06,160
you create control plane gravity that compounds over time.

78
00:03:06,160 –> 00:03:09,000
AWS built a cloud for developers and infrastructure teams

79
00:03:09,000 –> 00:03:11,560
by optimizing for rapid provisioning, cost flexibility

80
00:03:11,560 –> 00:03:13,000
and regional distribution.

81
00:03:13,000 –> 00:03:14,960
All of those features are valuable,

82
00:03:14,960 –> 00:03:17,800
but enterprises do not actually run on infrastructure.

83
00:03:17,800 –> 00:03:19,920
They run on identity policy and workflow.

84
00:03:19,920 –> 00:03:23,480
AWS either did not anticipate that shift or decided

85
00:03:23,480 –> 00:03:25,720
it was not a battle they wanted to fight.

86
00:03:25,720 –> 00:03:28,720
By 2023, the pattern was clear as enterprises standardized

87
00:03:28,720 –> 00:03:31,280
on Microsoft 365 for workforce collaboration

88
00:03:31,280 –> 00:03:33,160
through teams, SharePoint and Outlook.

89
00:03:33,160 –> 00:03:37,080
Over 95% of Fortune 500 companies use Microsoft 365,

90
00:03:37,080 –> 00:03:39,560
which is not a cloud choice so much as an identity choice

91
00:03:39,560 –> 00:03:41,880
because governance sits where the work happens.

92
00:03:41,880 –> 00:03:45,080
Microsoft owns the enterprise by owning the employee surface area.

93
00:03:45,080 –> 00:03:48,400
AWS owns the compute, but Microsoft owns the people.

94
00:03:48,400 –> 00:03:50,440
This is the inversion that nobody talks about.

95
00:03:50,440 –> 00:03:52,840
The infrastructure war is over and AWS won,

96
00:03:52,840 –> 00:03:55,040
but the enterprise war that determines how organizations

97
00:03:55,040 –> 00:03:58,040
actually operate is being decided on different terms.

98
00:03:58,040 –> 00:04:00,680
Those terms favor the company that controls identity,

99
00:04:00,680 –> 00:04:03,240
not the company that controls instances.

100
00:04:03,240 –> 00:04:05,080
What a control plane actually is,

101
00:04:05,080 –> 00:04:06,720
we need to define this term precisely

102
00:04:06,720 –> 00:04:09,480
because it gets thrown around until it loses all meaning.

103
00:04:09,480 –> 00:04:11,560
A control plane is not infrastructure

104
00:04:11,560 –> 00:04:13,840
and it is certainly not a collection of servers.

105
00:04:13,840 –> 00:04:15,880
It is the underlying system that governs

106
00:04:15,880 –> 00:04:17,800
who accesses what when they do it.

107
00:04:17,800 –> 00:04:20,160
And the specific conditions required for that access

108
00:04:20,160 –> 00:04:21,320
to be granted.

109
00:04:21,320 –> 00:04:23,400
In the era of traditional enterprise IT,

110
00:04:23,400 –> 00:04:26,520
Active Directory functioned as the primary control plane.

111
00:04:26,520 –> 00:04:28,480
It sat physically in the data center

112
00:04:28,480 –> 00:04:31,200
and controlled which users could log into which machines

113
00:04:31,200 –> 00:04:32,880
while managing group memberships

114
00:04:32,880 –> 00:04:34,560
and enforcing password policies.

115
00:04:34,560 –> 00:04:36,280
Everything in the environment flowed through it

116
00:04:36,280 –> 00:04:38,560
because it represented the single authoritative source

117
00:04:38,560 –> 00:04:39,880
of truth for identity.

118
00:04:39,880 –> 00:04:41,760
In the cloud, the control plane has shifted

119
00:04:41,760 –> 00:04:43,400
into something more complex.

120
00:04:43,400 –> 00:04:45,320
It is no longer just about managing machines

121
00:04:45,320 –> 00:04:48,000
but rather about identity, policy enforcement

122
00:04:48,000 –> 00:04:50,880
and compliance across every fragmented environment you own.

123
00:04:50,880 –> 00:04:52,280
This includes your cloud footprint,

124
00:04:52,280 –> 00:04:53,840
your remaining on-premises hardware,

125
00:04:53,840 –> 00:04:57,000
the edge and every SAS application your employees touch.

126
00:04:57,000 –> 00:04:58,600
A modern control plane is defined

127
00:04:58,600 –> 00:05:01,200
by three specific architectural components.

128
00:05:01,200 –> 00:05:03,160
First identity must be the origin point.

129
00:05:03,160 –> 00:05:05,520
I’m not talking about federation or synchronization

130
00:05:05,520 –> 00:05:07,400
but the actual origin where user accounts

131
00:05:07,400 –> 00:05:09,720
are created, managed and eventually revoked.

132
00:05:09,720 –> 00:05:12,320
This is the authoritative source where a person exists first

133
00:05:12,320 –> 00:05:13,400
when they join the company

134
00:05:13,400 –> 00:05:15,680
and where they are deleted first when they leave.

135
00:05:15,680 –> 00:05:16,920
In a functional architecture,

136
00:05:16,920 –> 00:05:19,760
every other system is merely downstream from this point.

137
00:05:19,760 –> 00:05:22,280
Second, policy must travel with the identity

138
00:05:22,280 –> 00:05:24,760
rather than sitting as a static rule in a database.

139
00:05:24,760 –> 00:05:27,440
These are dynamic policies that evaluate context

140
00:05:27,440 –> 00:05:30,880
in real time to determine if a login should be allowed.

141
00:05:30,880 –> 00:05:33,400
The system asks where the user is signing in from,

142
00:05:33,400 –> 00:05:34,880
whether their device is compliant

143
00:05:34,880 –> 00:05:36,920
and if their risk profile has suddenly spiked.

144
00:05:36,920 –> 00:05:38,360
Based on those shifting signals,

145
00:05:38,360 –> 00:05:41,560
the engine can enforce MFA, block access entirely

146
00:05:41,560 –> 00:05:43,360
or demand full device management.

147
00:05:43,360 –> 00:05:45,280
This is the reality of conditional access

148
00:05:45,280 –> 00:05:46,800
and continuous verification,

149
00:05:46,800 –> 00:05:48,560
which stands as the direct opposite

150
00:05:48,560 –> 00:05:50,280
of the old model where authentication

151
00:05:50,280 –> 00:05:52,040
equaled permanent trust.

152
00:05:52,040 –> 00:05:54,520
Third, governance must span every environment

153
00:05:54,520 –> 00:05:56,960
instead of being isolated to a single platform.

154
00:05:56,960 –> 00:05:59,880
You need one audit trail, one compliance dashboard

155
00:05:59,880 –> 00:06:01,800
and one centralized place to review

156
00:06:01,800 –> 00:06:04,600
who has access to what across the entire enterprise.

157
00:06:04,600 –> 00:06:07,960
This provides a single location to enforce data residency rules

158
00:06:07,960 –> 00:06:10,160
and prove to regulators that you are managing access

159
00:06:10,160 –> 00:06:13,360
correctly without jumping between a dozen different consoles.

160
00:06:13,360 –> 00:06:16,680
Now let’s look at how AWS IAM compares to this model.

161
00:06:16,680 –> 00:06:20,520
AWS IAM is a resource-centric system designed specifically

162
00:06:20,520 –> 00:06:23,320
to control access to AWS resources.

163
00:06:23,320 –> 00:06:25,920
You define roles and attach policies to those roles

164
00:06:25,920 –> 00:06:28,360
to specify exactly which actions can be performed

165
00:06:28,360 –> 00:06:29,880
on which buckets or instances.

166
00:06:29,880 –> 00:06:33,240
An IAM user might assume a role to read from an S3 bucket

167
00:06:33,240 –> 00:06:36,280
while another role allows them to launch EC2 instances.

168
00:06:36,280 –> 00:06:39,000
While this is granular and undeniably powerful,

169
00:06:39,000 –> 00:06:42,280
the system is fundamentally built around resources, not people.

170
00:06:42,280 –> 00:06:45,280
The critical distinction is that AWS IAM does not

171
00:06:45,280 –> 00:06:47,320
originate identity for the enterprise.

172
00:06:47,320 –> 00:06:50,080
It originates identity specifically for AWS.

173
00:06:50,080 –> 00:06:54,440
When you create an IAM user, that user exists within an AWS account

174
00:06:54,440 –> 00:06:56,560
rather than within your actual organization.

175
00:06:56,560 –> 00:06:59,200
If your company operates multiple AWS accounts,

176
00:06:59,200 –> 00:07:01,280
you end up with multiple identity silos

177
00:07:01,280 –> 00:07:04,680
that require federation or AWS organizations to manage.

178
00:07:04,680 –> 00:07:08,680
Even then, the origin of that identity remains tethered to AWS.

179
00:07:08,680 –> 00:07:11,000
Microsoft Enter ID is an identity-centric system

180
00:07:11,000 –> 00:07:13,080
that attempts to control access to everything.

181
00:07:13,080 –> 00:07:14,960
It starts by asking who the person is,

182
00:07:14,960 –> 00:07:16,520
which applications they should access,

183
00:07:16,520 –> 00:07:18,080
what data they are allowed to see,

184
00:07:18,080 –> 00:07:19,560
and which devices they are using.

185
00:07:19,560 –> 00:07:20,880
It originates in the workforce.

186
00:07:20,880 –> 00:07:22,920
When you create a user in Enter ID,

187
00:07:22,920 –> 00:07:25,120
they are a person in your organizational directory

188
00:07:25,120 –> 00:07:29,560
who can access Azure, Microsoft 365, and thousands of SAS apps.

189
00:07:29,560 –> 00:07:33,000
They can even access AWS via SAML or OIDC trust.

190
00:07:33,000 –> 00:07:35,120
When Enter ID federates AWS,

191
00:07:35,120 –> 00:07:37,440
the Microsoft Identity Engine is the one issuing

192
00:07:37,440 –> 00:07:39,920
the tokens that grant access to the Amazon Cloud.

193
00:07:39,920 –> 00:07:43,600
The enterprise sees one identity system managing multiple platforms,

194
00:07:43,600 –> 00:07:47,080
which effectively turns AWS into just another resource

195
00:07:47,080 –> 00:07:49,320
that enter authenticated users can access.

196
00:07:49,320 –> 00:07:50,920
This is not a state of coexistence,

197
00:07:50,920 –> 00:07:53,800
but rather a form of architectural subordination.

198
00:07:53,800 –> 00:07:55,720
This distinction matters because of scale

199
00:07:55,720 –> 00:07:57,880
and what I call control plane gravity.

200
00:07:57,880 –> 00:08:01,000
When identity originates in one place and governs everywhere,

201
00:08:01,000 –> 00:08:03,400
that gravity begins to compound over time.

202
00:08:03,400 –> 00:08:05,920
Every new application that needs to authenticate users

203
00:08:05,920 –> 00:08:08,160
naturally gravitates toward that origin point,

204
00:08:08,160 –> 00:08:10,120
and every new policy requiring enforcement

205
00:08:10,120 –> 00:08:11,640
moves toward the governance layer.

206
00:08:11,640 –> 00:08:14,640
Eventually, that gravity becomes inescapable for the organization.

207
00:08:14,640 –> 00:08:18,040
AWS IAM provides roles and policies that are largely static,

208
00:08:18,040 –> 00:08:20,360
meaning a user either has permission to access a resource

209
00:08:20,360 –> 00:08:21,400
or they do not.

210
00:08:21,400 –> 00:08:23,120
Conditional access changes that equation

211
00:08:23,120 –> 00:08:25,640
by ensuring permission is evaluated continuously based

212
00:08:25,640 –> 00:08:27,280
on context, risk, and location.

213
00:08:27,280 –> 00:08:30,080
The same user might have access to sensitive data

214
00:08:30,080 –> 00:08:31,520
while sitting in the corporate office,

215
00:08:31,520 –> 00:08:33,520
but find themselves blocked from that same data

216
00:08:33,520 –> 00:08:36,160
while working from a coffee shop in a high-risk country.

217
00:08:36,160 –> 00:08:37,920
This is not a simple feature comparison,

218
00:08:37,920 –> 00:08:39,760
but a fundamental architectural difference.

219
00:08:39,760 –> 00:08:42,440
One system is built around the resources being accessed

220
00:08:42,440 –> 00:08:45,240
while the other is built around the people doing the accessing.

221
00:08:45,240 –> 00:08:47,720
In the modern enterprise, people are the control plane

222
00:08:47,720 –> 00:08:49,880
and the resources are always downstream.

223
00:08:49,880 –> 00:08:54,160
Entra ID is gravitational pull, one billion active users.

224
00:08:54,160 –> 00:08:55,880
To understand the weight of this system,

225
00:08:55,880 –> 00:08:58,760
you have to look at the sheer scale of the numbers involved.

226
00:08:58,760 –> 00:09:03,480
Microsoft Entra ID currently has one billion monthly active users

227
00:09:03,480 –> 00:09:05,800
which is not a traditional achievement for Microsoft

228
00:09:05,800 –> 00:09:08,560
as much as it is an unavoidable enterprise reality.

229
00:09:08,560 –> 00:09:12,400
Entra ID serves as the identity backbone for Microsoft 365,

230
00:09:12,400 –> 00:09:16,000
Azure Cloud Services, and thousands of federated SaaS applications.

231
00:09:16,000 –> 00:09:17,400
Increasingly, it is also becoming

232
00:09:17,400 –> 00:09:20,920
the primary identity backbone for accessing AWS.

233
00:09:20,920 –> 00:09:23,400
Reaching one billion active users means Entra ID

234
00:09:23,400 –> 00:09:25,640
is now the largest identity platform on the planet.

235
00:09:25,640 –> 00:09:26,800
This did not happen by design,

236
00:09:26,800 –> 00:09:29,560
but through the sheer force of architectural gravity.

237
00:09:29,560 –> 00:09:32,520
When Entra ID federates AWS, the workflow reveals

238
00:09:32,520 –> 00:09:34,280
who is actually in charge of the gate.

239
00:09:34,280 –> 00:09:36,880
An employee signs into Microsoft Teams using their

240
00:09:36,880 –> 00:09:39,680
enter credentials and then decides they need to access

241
00:09:39,680 –> 00:09:41,280
an AWS resource.

242
00:09:41,280 –> 00:09:44,520
When they click that link, Entra ID evaluates their identity,

243
00:09:44,520 –> 00:09:46,840
their device health, and their current risk profile

244
00:09:46,840 –> 00:09:48,400
before issuing a SAML assertion.

245
00:09:48,400 –> 00:09:50,720
That assertion is what grants them temporary credentials

246
00:09:50,720 –> 00:09:52,080
to enter AWS.

247
00:09:52,080 –> 00:09:55,240
Even though AWS logs the access and manages the resource,

248
00:09:55,240 –> 00:09:57,200
Microsoft is the one controlling the gate.

249
00:09:57,200 –> 00:09:58,960
That is not a partnership between equals

250
00:09:58,960 –> 00:10:01,040
but a clear architectural hierarchy.

251
00:10:01,040 –> 00:10:04,440
This gravitational pull extends far beyond simple identity

252
00:10:04,440 –> 00:10:07,400
and into the realm of policy and conditional access.

253
00:10:07,400 –> 00:10:09,200
When Entra ID federates AWS,

254
00:10:09,200 –> 00:10:11,000
it does not just handle the login,

255
00:10:11,000 –> 00:10:13,680
it enforces the organization’s rules across the board.

256
00:10:13,680 –> 00:10:16,920
A company can set a single rule to block all AWS access

257
00:10:16,920 –> 00:10:19,440
from unapproved countries, and that rule applies

258
00:10:19,440 –> 00:10:23,560
to every federated user regardless of which AWS account

259
00:10:23,560 –> 00:10:24,720
they are trying to reach.

260
00:10:24,720 –> 00:10:27,280
You end up with one policy and one control plane

261
00:10:27,280 –> 00:10:29,080
governing multiple platforms.

262
00:10:29,080 –> 00:10:32,000
AWS IAM Identity Center is simply not built to do this

263
00:10:32,000 –> 00:10:34,040
because it was designed for AWS accounts.

264
00:10:34,040 –> 00:10:36,040
It can provide SSO across those accounts

265
00:10:36,040 –> 00:10:37,760
and federate external providers,

266
00:10:37,760 –> 00:10:40,200
but it does not originate identity for the enterprise.

267
00:10:40,200 –> 00:10:41,960
It originates in AWS.

268
00:10:41,960 –> 00:10:45,080
When you connect an external provider to IAM Identity Center,

269
00:10:45,080 –> 00:10:47,760
you are just extending the AWS framework outward

270
00:10:47,760 –> 00:10:49,800
rather than establishing an external system

271
00:10:49,800 –> 00:10:51,480
as the true source of truth.

272
00:10:51,480 –> 00:10:54,240
The distinction is subtle, but the architectural consequences

273
00:10:54,240 –> 00:10:55,160
are massive.

274
00:10:55,160 –> 00:10:57,080
Entra ID’s pull is amplified by the fact

275
00:10:57,080 –> 00:11:00,480
that Microsoft 365 is ubiquitous with over 95%

276
00:11:00,480 –> 00:11:02,520
of Fortune 500 companies relying on it.

277
00:11:02,520 –> 00:11:04,480
This means the identity, the workflow,

278
00:11:04,480 –> 00:11:06,520
and the data for the world’s largest companies

279
00:11:06,520 –> 00:11:08,000
all flow through Microsoft.

280
00:11:08,000 –> 00:11:09,400
Teams is where the decisions happen,

281
00:11:09,400 –> 00:11:11,360
SharePoint is where the documents live,

282
00:11:11,360 –> 00:11:13,320
and Outlook is where the priorities are set.

283
00:11:13,320 –> 00:11:15,600
This isn’t a commentary on the quality of the software,

284
00:11:15,600 –> 00:11:18,160
but a recognition that the actual work of the enterprise

285
00:11:18,160 –> 00:11:19,960
happens inside the Microsoft ecosystem.

286
00:11:19,960 –> 00:11:21,560
When the work happens in Microsoft,

287
00:11:21,560 –> 00:11:24,000
the governance inevitably happens there as well.

288
00:11:24,000 –> 00:11:26,080
Approvals move through Power Automate workflows

289
00:11:26,080 –> 00:11:28,040
built in Power Apps and compliance boundaries

290
00:11:28,040 –> 00:11:29,240
are defined in PerView.

291
00:11:29,240 –> 00:11:31,200
An enterprise could choose to run every single bit

292
00:11:31,200 –> 00:11:33,440
of its compute on AWS, but the control plane

293
00:11:33,440 –> 00:11:34,800
would still belong to Microsoft.

294
00:11:34,800 –> 00:11:36,720
AWS owns the infrastructure underneath,

295
00:11:36,720 –> 00:11:39,480
but Microsoft owns the employee surface area

296
00:11:39,480 –> 00:11:41,160
where the business actually functions.

297
00:11:41,160 –> 00:11:43,720
The gravity compounds because it integrates identity

298
00:11:43,720 –> 00:11:47,120
with workflow, data, and compliance into a single engine.

299
00:11:47,120 –> 00:11:48,760
When Entra ID authenticates a user,

300
00:11:48,760 –> 00:11:50,800
it knows exactly who they are while teams

301
00:11:50,800 –> 00:11:53,160
sees what they are communicating and SharePoint sees

302
00:11:53,160 –> 00:11:54,280
what they are creating.

303
00:11:54,280 –> 00:11:56,880
PerView then classifies that data for protection

304
00:11:56,880 –> 00:11:59,680
while defender monitors the device risk profile.

305
00:11:59,680 –> 00:12:02,200
All of these signals flow into a single governance engine

306
00:12:02,200 –> 00:12:04,680
that AWS has no way to replicate.

307
00:12:04,680 –> 00:12:08,280
AWS has identity management and infrastructure security tools,

308
00:12:08,280 –> 00:12:10,680
but it does not own the space where the work is performed

309
00:12:10,680 –> 00:12:13,320
because it doesn’t own the employee surface area.

310
00:12:13,320 –> 00:12:15,520
It cannot build this kind of unified governance

311
00:12:15,520 –> 00:12:17,880
or create this level of control plane gravity.

312
00:12:17,880 –> 00:12:20,480
This is why that 1 billion user figure actually matters.

313
00:12:20,480 –> 00:12:23,400
It is a statement about where the enterprise control plane lives

314
00:12:23,400 –> 00:12:25,360
and which identity engine is responsible

315
00:12:25,360 –> 00:12:28,040
for issuing the tokens that grant access to everything else.

316
00:12:28,040 –> 00:12:30,800
It tells you exactly who is defining the governance layer

317
00:12:30,800 –> 00:12:32,960
that sits on top of all your infrastructure.

318
00:12:32,960 –> 00:12:35,720
And that is Microsoft conditional access

319
00:12:35,720 –> 00:12:37,520
where policy follows identity.

320
00:12:37,520 –> 00:12:39,880
Conditional access is a Microsoft Entra ID feature

321
00:12:39,880 –> 00:12:41,840
that evaluates context in real time

322
00:12:41,840 –> 00:12:43,120
and understanding how this works

323
00:12:43,120 –> 00:12:45,040
is where the architectural difference between Azure

324
00:12:45,040 –> 00:12:47,080
and AWS becomes visceral.

325
00:12:47,080 –> 00:12:49,760
Imagine an employee signs in from the corporate office.

326
00:12:49,760 –> 00:12:52,680
Conditional access asks if the user is in a trusted location

327
00:12:52,680 –> 00:12:56,160
if their device is compliant and if their risk profile is elevated.

328
00:12:56,160 –> 00:12:57,760
When all signals are green,

329
00:12:57,760 –> 00:13:00,240
the system grants access without any friction.

330
00:13:00,240 –> 00:13:03,520
Everything changes when that same employee travels to a conference

331
00:13:03,520 –> 00:13:06,040
in another country and tries to access the same resource

332
00:13:06,040 –> 00:13:07,400
from a hotel.

333
00:13:07,400 –> 00:13:09,480
Conditional access asks the same questions,

334
00:13:09,480 –> 00:13:11,160
but now the location is untrusted

335
00:13:11,160 –> 00:13:14,120
and the risk profile is elevated due to impossible travel.

336
00:13:14,120 –> 00:13:15,880
The system does not just grant access,

337
00:13:15,880 –> 00:13:20,280
but instead enforces MFA or requires device management verification

338
00:13:20,280 –> 00:13:22,640
and it might even block access entirely depending

339
00:13:22,640 –> 00:13:24,560
on the sensitivity of the resource.

340
00:13:24,560 –> 00:13:26,720
This is not static role-based access control.

341
00:13:26,720 –> 00:13:29,440
In reality, it is dynamic, context-aware governance

342
00:13:29,440 –> 00:13:32,040
where the same user might have access to sensitive data

343
00:13:32,040 –> 00:13:34,000
from one location but find themselves blocked

344
00:13:34,000 –> 00:13:35,720
from that same data in another.

345
00:13:35,720 –> 00:13:38,000
The same device might be trusted in one scenario

346
00:13:38,000 –> 00:13:40,280
but flagged in another based on the risk profile

347
00:13:40,280 –> 00:13:42,560
and the same application might require MFA

348
00:13:42,560 –> 00:13:45,080
for one user while letting another pass through.

349
00:13:45,080 –> 00:13:47,240
AWS IAM provides roles and policies

350
00:13:47,240 –> 00:13:48,880
that are fundamentally static,

351
00:13:48,880 –> 00:13:52,120
meaning a user either has permission to access an S3 bucket

352
00:13:52,120 –> 00:13:53,240
or they do not.

353
00:13:53,240 –> 00:13:56,040
You can attach a policy that says a user can read objects

354
00:13:56,040 –> 00:13:57,880
but that policy applies everywhere

355
00:13:57,880 –> 00:14:00,080
and always without any context evaluation

356
00:14:00,080 –> 00:14:01,480
or continuous verification.

357
00:14:01,480 –> 00:14:04,240
There is no mechanism to say that access is allowed from here

358
00:14:04,240 –> 00:14:05,120
but not from there.

359
00:14:05,120 –> 00:14:07,320
AWS uses guard duty for threat detection

360
00:14:07,320 –> 00:14:09,160
and security hub for aggregation

361
00:14:09,160 –> 00:14:10,520
but these are detective controls

362
00:14:10,520 –> 00:14:12,360
that tell you what went wrong after the fact.

363
00:14:12,360 –> 00:14:14,840
They do not prevent access before a breach occurs

364
00:14:14,840 –> 00:14:17,280
whereas conditional access is a preventive mechanism

365
00:14:17,280 –> 00:14:20,280
that stops unauthorized access from happening in the first place.

366
00:14:20,280 –> 00:14:23,000
This distinction matters enormously in hybrid environments

367
00:14:23,000 –> 00:14:25,400
where an employee at a coffee shop gets different treatment

368
00:14:25,400 –> 00:14:27,280
than they would at the corporate office.

369
00:14:27,280 –> 00:14:29,720
Accessing a cloud application from a compliant device

370
00:14:29,720 –> 00:14:32,360
results in a different outcome than using a personal device

371
00:14:32,360 –> 00:14:35,320
and signing in from an approved country is treated differently

372
00:14:35,320 –> 00:14:37,720
than signing in from a high-risk region.

373
00:14:37,720 –> 00:14:41,080
AWS has no native equivalent to this architectural pattern

374
00:14:41,080 –> 00:14:43,920
while AWS can log the access alert on anomalies

375
00:14:43,920 –> 00:14:45,800
or revoke credentials after the fact

376
00:14:45,800 –> 00:14:48,320
it cannot prevent the access before it happens

377
00:14:48,320 –> 00:14:49,840
based on real-time context.

378
00:14:49,840 –> 00:14:51,480
This becomes critical for the control plane

379
00:14:51,480 –> 00:14:54,520
because when enter ID federates AWS conditional access

380
00:14:54,520 –> 00:14:55,800
travels with the identity

381
00:14:55,800 –> 00:14:58,480
an organization can set a rule requiring MFA

382
00:14:58,480 –> 00:15:01,400
for all AWS access from outside the network

383
00:15:01,400 –> 00:15:03,480
and that rule applies to every federated user

384
00:15:03,480 –> 00:15:06,960
regardless of which AWS account or service they are using.

385
00:15:06,960 –> 00:15:09,320
This creates one policy for multiple platforms

386
00:15:09,320 –> 00:15:10,640
under one control plane.

387
00:15:10,640 –> 00:15:12,840
Microsoft Defender for Cloud amplifies this

388
00:15:12,840 –> 00:15:16,680
by monitoring as your resources and connecting to AWS workloads

389
00:15:16,680 –> 00:15:17,520
at the same time.

390
00:15:17,520 –> 00:15:19,640
When a security incident occurs in AWS

391
00:15:19,640 –> 00:15:22,640
the response flows through Microsoft’s compliance engine

392
00:15:22,640 –> 00:15:25,920
which evaluates the incident against organizational policies

393
00:15:25,920 –> 00:15:27,520
and enforces remediation.

394
00:15:27,520 –> 00:15:29,760
AWS remains the infrastructure provider

395
00:15:29,760 –> 00:15:31,520
but Microsoft controls the response.

396
00:15:31,520 –> 00:15:33,800
The control plane finally becomes visible here.

397
00:15:33,800 –> 00:15:35,400
It is not just about authentication

398
00:15:35,400 –> 00:15:37,800
but about authorization that adapts to context

399
00:15:37,800 –> 00:15:40,480
and policy that travels with identity across environments.

400
00:15:40,480 –> 00:15:41,920
This is continuous verification

401
00:15:41,920 –> 00:15:43,600
instead of one time authentication.

402
00:15:43,600 –> 00:15:46,720
AWS Security Hub attempts to aggregate security signals

403
00:15:46,720 –> 00:15:48,880
into a dashboard to show you what is happening

404
00:15:48,880 –> 00:15:51,000
but it does not govern identity across platforms

405
00:15:51,000 –> 00:15:53,640
or enforce policy or non-AWS infrastructure.

406
00:15:53,640 –> 00:15:55,200
Security Hub is a security tool

407
00:15:55,200 –> 00:15:57,800
while the combination of conditional access and defender

408
00:15:57,800 –> 00:15:58,880
is a governance layer.

409
00:15:58,880 –> 00:16:01,240
One is a service, one is a control mechanism.

410
00:16:01,240 –> 00:16:03,000
In the enterprise the control mechanism

411
00:16:03,000 –> 00:16:06,600
is what determines who actually has access to what.

412
00:16:06,600 –> 00:16:09,400
Defender for Cloud, the multi-cloud control plane.

413
00:16:09,400 –> 00:16:12,640
Microsoft Defender for Cloud acts as a single pane of glass

414
00:16:12,640 –> 00:16:15,360
for security across multiple environments

415
00:16:15,360 –> 00:16:18,800
covering Azure infrastructure, AWS workloads,

416
00:16:18,800 –> 00:16:23,280
Google Cloud resources and on-premises servers via Azure Arc.

417
00:16:23,280 –> 00:16:26,360
It also integrates endpoints through Defender for Endpoint,

418
00:16:26,360 –> 00:16:31,040
identity through Entra ID and Data through Microsoft purview.

419
00:16:31,040 –> 00:16:32,680
This is not just a feature list

420
00:16:32,680 –> 00:16:34,320
but an architectural inversion.

421
00:16:34,320 –> 00:16:37,040
AWS Security Hub attempts something similar

422
00:16:37,040 –> 00:16:39,680
by aggregating AWS Security signals

423
00:16:39,680 –> 00:16:41,760
to show you what is happening in your environment

424
00:16:41,760 –> 00:16:43,040
which is certainly useful.

425
00:16:43,040 –> 00:16:45,120
However, Security Hub does not govern identity

426
00:16:45,120 –> 00:16:48,400
across platforms or enforce policy on non-AWS infrastructure

427
00:16:48,400 –> 00:16:50,040
making it a dashboard that tells you

428
00:16:50,040 –> 00:16:53,000
what went wrong rather than a system that prevents it.

429
00:16:53,000 –> 00:16:55,600
The foundational mistake is thinking these are equivalent.

430
00:16:55,600 –> 00:16:57,800
When a security incident occurs in AWS,

431
00:16:57,800 –> 00:17:00,240
the response flows through Microsoft’s compliance engine

432
00:17:00,240 –> 00:17:02,360
instead of the AWS engine allowing Defender

433
00:17:02,360 –> 00:17:05,120
to evaluate the incident against organizational policies

434
00:17:05,120 –> 00:17:06,760
and enforce remediation.

435
00:17:06,760 –> 00:17:10,000
AWS provides the platform but Microsoft provides the governance

436
00:17:10,000 –> 00:17:11,920
and that is control plane dominance.

437
00:17:11,920 –> 00:17:14,240
Consider what this means for daily operations.

438
00:17:14,240 –> 00:17:17,400
An organization with workloads on AWS, Azure,

439
00:17:17,400 –> 00:17:20,040
on-premises servers and edge devices

440
00:17:20,040 –> 00:17:22,600
would traditionally need five different security tools

441
00:17:22,600 –> 00:17:24,120
and five different alert systems.

442
00:17:24,120 –> 00:17:26,160
That creates chaos and security debt

443
00:17:26,160 –> 00:17:28,600
and it is the primary reason most organizations fail

444
00:17:28,600 –> 00:17:30,240
to respond to incidents quickly.

445
00:17:30,240 –> 00:17:33,200
Defender for Cloud centralizes the signal into one dashboard

446
00:17:33,200 –> 00:17:34,840
with one remediation workflow.

447
00:17:34,840 –> 00:17:37,280
So an unauthorized access attempt in AWS triggers

448
00:17:37,280 –> 00:17:39,400
the same response as one in Azure.

449
00:17:39,400 –> 00:17:42,800
The same policy applies and the same escalation process activates,

450
00:17:42,800 –> 00:17:44,760
creating one control plane that governs

451
00:17:44,760 –> 00:17:46,840
multiple platforms simultaneously.

452
00:17:46,840 –> 00:17:49,960
AWS lacks an equivalent because it does not own the identity

453
00:17:49,960 –> 00:17:52,040
layer whereas Defender for Cloud works

454
00:17:52,040 –> 00:17:54,720
because it sits directly on top of identity.

455
00:17:54,720 –> 00:17:57,120
When Enter ID authenticates a user, Defender

456
00:17:57,120 –> 00:17:59,720
knows exactly who they are and monitors their access

457
00:17:59,720 –> 00:18:01,880
to AWS resources in real time.

458
00:18:01,880 –> 00:18:04,520
When anomalies occur, Defender evaluates them

459
00:18:04,520 –> 00:18:07,720
against organizational policy and enforces remediation

460
00:18:07,720 –> 00:18:09,200
through a single governance engine.

461
00:18:09,200 –> 00:18:12,640
You can integrate AWS security hub with third party tools

462
00:18:12,640 –> 00:18:14,880
or automate responses via Lambda,

463
00:18:14,880 –> 00:18:17,400
but you are essentially building a governance layer

464
00:18:17,400 –> 00:18:19,480
on top of infrastructure from scratch.

465
00:18:19,480 –> 00:18:21,120
You are not inheriting a governance layer

466
00:18:21,120 –> 00:18:22,760
from a unified identity platform

467
00:18:22,760 –> 00:18:25,680
but rather constructing one from individual components.

468
00:18:25,680 –> 00:18:28,520
This matters at scale when you have hundreds of AWS accounts

469
00:18:28,520 –> 00:18:30,480
and millions of access events per day

470
00:18:30,480 –> 00:18:33,440
making a unified governance layer an operational necessity.

471
00:18:33,440 –> 00:18:37,440
You cannot manually review every alert or enforce every policy

472
00:18:37,440 –> 00:18:39,960
so you need a system that understands context

473
00:18:39,960 –> 00:18:42,240
and uses intelligence to manage the load.

474
00:18:42,240 –> 00:18:44,040
Defender for Cloud understands context

475
00:18:44,040 –> 00:18:45,800
because it is built on identity

476
00:18:45,800 –> 00:18:48,000
meaning it knows the user, their device,

477
00:18:48,000 –> 00:18:50,320
their location and their historical behavior.

478
00:18:50,320 –> 00:18:52,920
When anomalies occur, Defender does not just flag them

479
00:18:52,920 –> 00:18:54,600
but instead contextualizes them

480
00:18:54,600 –> 00:18:57,360
and enforces policy based on that specific context.

481
00:18:57,360 –> 00:18:59,760
AWS security hub does not have this context

482
00:18:59,760 –> 00:19:01,880
because it sees infrastructure events

483
00:19:01,880 –> 00:19:03,200
rather than identity events.

484
00:19:03,200 –> 00:19:05,120
It sees that an access event happened

485
00:19:05,120 –> 00:19:07,200
but it does not see the identity context,

486
00:19:07,200 –> 00:19:10,520
the device compliance or the risk profile of the user involved.

487
00:19:10,520 –> 00:19:12,240
This is why the control plane matters.

488
00:19:12,240 –> 00:19:13,440
Infrastructure is visible

489
00:19:13,440 –> 00:19:16,000
but identity remains invisible until something goes wrong

490
00:19:16,000 –> 00:19:18,920
and Defender for Cloud is what finally makes identity

491
00:19:18,920 –> 00:19:21,840
and policy enforcement visible across every platform.

492
00:19:21,840 –> 00:19:23,760
AWS will likely continue to dominate

493
00:19:23,760 –> 00:19:26,160
in raw infrastructure scale and offer more services

494
00:19:26,160 –> 00:19:27,560
than any other competitor.

495
00:19:27,560 –> 00:19:30,200
However, AWS will not control the governance layer

496
00:19:30,200 –> 00:19:31,880
that sits on top of that infrastructure

497
00:19:31,880 –> 00:19:33,560
as that layer belongs to Microsoft.

498
00:19:33,560 –> 00:19:36,400
That layer is where enterprise security actually lives

499
00:19:36,400 –> 00:19:38,920
where policy is enforced and where compliance is proven.

500
00:19:38,920 –> 00:19:40,200
That is the control plane

501
00:19:40,200 –> 00:19:42,920
and that is where the enterprise battle is being decided.

502
00:19:42,920 –> 00:19:45,520
Sentinel and PerView compliance as control.

503
00:19:45,520 –> 00:19:48,400
Microsoft Sentinel is often described as a SIEM,

504
00:19:48,400 –> 00:19:51,800
a tool that simply ingests logs from AWS, Azure

505
00:19:51,800 –> 00:19:53,640
and your on-premises SAS applications

506
00:19:53,640 –> 00:19:54,800
to centralize the signal.

507
00:19:54,800 –> 00:19:57,840
Most organizations believe it is just a high-end log aggregator

508
00:19:57,840 –> 00:20:00,600
where you can see everything happening across your infrastructure.

509
00:20:00,600 –> 00:20:01,480
They are wrong.

510
00:20:01,480 –> 00:20:03,880
Architecturally, Sentinel is the compliance backbone

511
00:20:03,880 –> 00:20:05,760
where policy enforcement becomes visible

512
00:20:05,760 –> 00:20:08,080
and governance finally becomes auditable.

513
00:20:08,080 –> 00:20:10,600
Microsoft PerView sits directly on top of that signal

514
00:20:10,600 –> 00:20:12,720
to add a layer of compliance governance

515
00:20:12,720 –> 00:20:15,000
that the underlying infrastructure cannot provide.

516
00:20:15,000 –> 00:20:18,040
PerView is the engine that enforces data classification,

517
00:20:18,040 –> 00:20:19,720
manages retention policies

518
00:20:19,720 –> 00:20:23,080
and handles the complexities of e-discovery and insider risk.

519
00:20:23,080 –> 00:20:26,040
Because it enforces data loss prevention across teams,

520
00:20:26,040 –> 00:20:27,720
sharepoint and exchange,

521
00:20:27,720 –> 00:20:29,680
you are looking at a single governance engine

522
00:20:29,680 –> 00:20:32,760
that dictates behavior across multiple platforms.

523
00:20:32,760 –> 00:20:35,800
Consider the operational reality of proving GDPR compliance

524
00:20:35,800 –> 00:20:39,080
to a regulator who demands to see how you manage sensitive data.

525
00:20:39,080 –> 00:20:41,640
You need to demonstrate exactly where that data lives,

526
00:20:41,640 –> 00:20:44,160
who touched it and what happened to that information

527
00:20:44,160 –> 00:20:46,280
the moment an employee left the company.

528
00:20:46,280 –> 00:20:48,160
The traditional approach involves auditing

529
00:20:48,160 –> 00:20:50,480
five different systems with five different frameworks

530
00:20:50,480 –> 00:20:52,760
resulting in months of work and thousands of dollars

531
00:20:52,760 –> 00:20:55,040
spent on a fragmented audit trail.

532
00:20:55,040 –> 00:20:57,920
The Sentinel and PerView approach replaces that chaos

533
00:20:57,920 –> 00:21:00,520
with a unified audit trail and a single dashboard

534
00:21:00,520 –> 00:21:02,880
to prove consistent policy enforcement.

535
00:21:02,880 –> 00:21:04,680
When a document is classified as sensitive,

536
00:21:04,680 –> 00:21:07,440
PerView recognizes the state, Sentinel logs the access

537
00:21:07,440 –> 00:21:10,120
and DLP blocks any attempt to share it externally.

538
00:21:10,120 –> 00:21:12,920
This is a deterministic model where the document owner’s departure

539
00:21:12,920 –> 00:21:14,760
triggers an automatic retention policy,

540
00:21:14,760 –> 00:21:17,600
providing one version of the truth for your compliance proof.

541
00:21:17,600 –> 00:21:19,600
AWS has no functionally equivalent to this

542
00:21:19,600 –> 00:21:23,040
because AWS config is limited to infrastructure compliance

543
00:21:23,040 –> 00:21:24,400
rather than data governance.

544
00:21:24,400 –> 00:21:27,680
While AWS config can tell you if an estri bucket is encrypted

545
00:21:27,680 –> 00:21:30,040
or if an EC2 instance is configured correctly,

546
00:21:30,040 –> 00:21:32,880
it cannot manage a retention policy or enforce DLP.

547
00:21:32,880 –> 00:21:34,720
AWS provides the virtual hardware

548
00:21:34,720 –> 00:21:36,960
but Microsoft provides the compliance layer

549
00:21:36,960 –> 00:21:39,880
and in regulated industries like finance or healthcare,

550
00:21:39,880 –> 00:21:42,240
that layer is the only thing that matters.

551
00:21:42,240 –> 00:21:44,400
When an enterprise needs to prove hyper compliance,

552
00:21:44,400 –> 00:21:45,960
they don’t look to their cloud provider,

553
00:21:45,960 –> 00:21:47,480
they look to their compliance officer.

554
00:21:47,480 –> 00:21:50,960
That officer uses PerView to classify data and enter ID

555
00:21:50,960 –> 00:21:53,920
to manage identity because that is where the control plane

556
00:21:53,920 –> 00:21:54,960
actually lives.

557
00:21:54,960 –> 00:21:57,120
The infrastructure has become a commodity

558
00:21:57,120 –> 00:21:59,720
but the ability to prove that a policy was enforced

559
00:21:59,720 –> 00:22:01,360
is the ultimate differentiator.

560
00:22:01,360 –> 00:22:04,160
This is why enterprises standardize on Microsoft

561
00:22:04,160 –> 00:22:06,800
for their most sensitive regulated workloads.

562
00:22:06,800 –> 00:22:09,680
It is not because Azure Infrastructure is inherently superior

563
00:22:09,680 –> 00:22:12,520
to AWS or because the services have more features,

564
00:22:12,520 –> 00:22:15,080
it is because Microsoft owns the audit trail

565
00:22:15,080 –> 00:22:16,360
and the proof of enforcement.

566
00:22:16,360 –> 00:22:18,880
Even when an organization runs a workload on AWS,

567
00:22:18,880 –> 00:22:20,880
they still extend PerView and Sentinel

568
00:22:20,880 –> 00:22:22,880
across that environment to maintain control.

569
00:22:22,880 –> 00:22:24,360
That is the control plane at work.

570
00:22:24,360 –> 00:22:27,400
AWS provides the workload but Microsoft provides the governance

571
00:22:27,400 –> 00:22:29,400
that makes that workload legal to operate.

572
00:22:29,400 –> 00:22:31,240
In the world of enterprise IT,

573
00:22:31,240 –> 00:22:33,080
control is what the regulators demand

574
00:22:33,080 –> 00:22:34,640
and what the organization pays for.

575
00:22:34,640 –> 00:22:36,680
The battle for the enterprise is not being decided

576
00:22:36,680 –> 00:22:38,200
by cost per compute hour

577
00:22:38,200 –> 00:22:39,880
but by the ability to enforce policy

578
00:22:39,880 –> 00:22:41,960
consistently across every platform.

579
00:22:41,960 –> 00:22:44,080
AWS will never win this specific battle

580
00:22:44,080 –> 00:22:46,880
because they do not own the identity foundation.

581
00:22:46,880 –> 00:22:49,000
Without identity you can build security tools

582
00:22:49,000 –> 00:22:50,360
and monitoring systems

583
00:22:50,360 –> 00:22:52,320
but you cannot build a true governance layer.

584
00:22:52,320 –> 00:22:54,880
Governance requires a deterministic identity model

585
00:22:54,880 –> 00:22:55,920
as its starting point

586
00:22:55,920 –> 00:22:58,240
and that identity belongs to Microsoft.

587
00:22:58,240 –> 00:23:02,120
The M365 Gravity Well, where enterprise work happens.

588
00:23:02,120 –> 00:23:05,760
Over 95% of Fortune 500 companies use Microsoft 365

589
00:23:05,760 –> 00:23:08,240
a number that represents where the actual work

590
00:23:08,240 –> 00:23:09,920
of the enterprise occurs.

591
00:23:09,920 –> 00:23:12,640
This isn’t just about IT mandates or licensing bundles,

592
00:23:12,640 –> 00:23:15,240
it’s about where the organizational memory is stored

593
00:23:15,240 –> 00:23:17,080
and where decisions are documented.

594
00:23:17,080 –> 00:23:18,960
Teams is no longer just a chat app.

595
00:23:18,960 –> 00:23:20,480
It is the virtual conference room

596
00:23:20,480 –> 00:23:22,000
where executives make the choices

597
00:23:22,000 –> 00:23:23,760
that shape the company’s future.

598
00:23:23,760 –> 00:23:25,680
SharePoint has replaced the file server

599
00:23:25,680 –> 00:23:27,600
as the place where every governed document

600
00:23:27,600 –> 00:23:29,320
lives stays or eventually dies.

601
00:23:29,320 –> 00:23:30,480
When a file needs to be discovered

602
00:23:30,480 –> 00:23:33,120
during litigation or deleted according to a legal hold

603
00:23:33,120 –> 00:23:35,120
it happens within the SharePoint architecture.

604
00:23:35,120 –> 00:23:37,840
Exchange serves a similar role for communication,

605
00:23:37,840 –> 00:23:40,640
acting as the permanent archive that regulators check

606
00:23:40,640 –> 00:23:43,400
when they need to see who knew what and when they knew it.

607
00:23:43,400 –> 00:23:45,400
We are not discussing the subjective quality

608
00:23:45,400 –> 00:23:47,640
of these products or whether teams is better

609
00:23:47,640 –> 00:23:48,880
than slack in a vacuum.

610
00:23:48,880 –> 00:23:50,640
The reality is one of ubiquity

611
00:23:50,640 –> 00:23:52,400
where the actual work of the enterprise happens

612
00:23:52,400 –> 00:23:54,480
inside the Microsoft 365 ecosystem.

613
00:23:54,480 –> 00:23:55,800
Because the work happens there,

614
00:23:55,800 –> 00:23:57,440
the governance must happen there as well

615
00:23:57,440 –> 00:24:00,040
making the two concepts architecturally inseparable.

616
00:24:00,040 –> 00:24:01,400
Every approval that flows through power

617
00:24:01,400 –> 00:24:04,040
automate relies on EntraID to know who the approver is

618
00:24:04,040 –> 00:24:06,200
and conditional access to check their context.

619
00:24:06,200 –> 00:24:08,040
Sentinel watches the entire process,

620
00:24:08,040 –> 00:24:10,440
logging the approval to ensure the workflow remains

621
00:24:10,440 –> 00:24:12,920
compliant with the organization’s stated intent.

622
00:24:12,920 –> 00:24:14,280
You are not just using a tool,

623
00:24:14,280 –> 00:24:16,120
you are operating within a policy layer

624
00:24:16,120 –> 00:24:19,040
that governs the entire lifecycle of an action.

625
00:24:19,040 –> 00:24:21,080
Custom applications built in PowerApps

626
00:24:21,080 –> 00:24:23,280
follow the same logic by authenticating users

627
00:24:23,280 –> 00:24:26,040
through EntraID and enforcing roles defined

628
00:24:26,040 –> 00:24:27,600
in the identity platform.

629
00:24:27,600 –> 00:24:28,760
When a document is created,

630
00:24:28,760 –> 00:24:30,280
Perview classifies it immediately

631
00:24:30,280 –> 00:24:32,320
and DLP prevents it from leaving the boundaries

632
00:24:32,320 –> 00:24:33,440
of the organization.

633
00:24:33,440 –> 00:24:36,440
This integrated governance means that even if your compute

634
00:24:36,440 –> 00:24:39,800
lives on AWS, your control plane is still firmly rooted

635
00:24:39,800 –> 00:24:40,920
in Microsoft.

636
00:24:40,920 –> 00:24:43,720
AWS does not own the employee surface area

637
00:24:43,720 –> 00:24:46,760
which means they cannot build this type of integrated governance.

638
00:24:46,760 –> 00:24:48,080
This is the gravity well.

639
00:24:48,080 –> 00:24:51,120
Work happens in M365 identity flows through Entra

640
00:24:51,120 –> 00:24:53,520
and policies enforced by conditional access.

641
00:24:53,520 –> 00:24:55,360
All of these signals flow into Sentinel

642
00:24:55,360 –> 00:24:56,880
creating a unified control plane

643
00:24:56,880 –> 00:25:00,240
that AWS simply cannot replicate from the infrastructure layer.

644
00:25:00,240 –> 00:25:04,600
An enterprise might choose AWS for 80% of its raw compute power

645
00:25:04,600 –> 00:25:07,760
but they remain 100% Microsoft by governance and control.

646
00:25:07,760 –> 00:25:09,600
They rely on Microsoft for the place

647
00:25:09,600 –> 00:25:12,720
where decisions are made, archived and eventually audited.

648
00:25:12,720 –> 00:25:15,560
AWS can provide the storage and the AI infrastructure

649
00:25:15,560 –> 00:25:18,560
but they cannot provide the layer that makes that work auditable.

650
00:25:18,560 –> 00:25:20,400
That distinction matters because it defines

651
00:25:20,400 –> 00:25:22,680
who actually owns the enterprise relationship.

652
00:25:22,680 –> 00:25:25,280
The gravity well ensures that as long as work happens

653
00:25:25,280 –> 00:25:27,960
in the Microsoft suite, the governance will follow.

654
00:25:27,960 –> 00:25:30,480
Microsoft owns the place where work happens

655
00:25:30,480 –> 00:25:32,280
and that is why the control plane belongs to them

656
00:25:32,280 –> 00:25:34,840
regardless of where the servers are located.

657
00:25:34,840 –> 00:25:36,960
Co-pilot is control plane acceleration.

658
00:25:36,960 –> 00:25:40,760
Microsoft co-pilot for Microsoft 365 is not merely an AI feature

659
00:25:40,760 –> 00:25:42,520
but rather a governance accelerator

660
00:25:42,520 –> 00:25:45,480
that makes the control plane narrative impossible to ignore.

661
00:25:45,480 –> 00:25:47,600
To function safely within an enterprise environment,

662
00:25:47,600 –> 00:25:50,280
co-pilot requires specific architectural foundations

663
00:25:50,280 –> 00:25:53,160
like data classification, identity scoping

664
00:25:53,160 –> 00:25:55,200
and rigid compliance boundaries.

665
00:25:55,200 –> 00:25:58,320
Without these guardrails, the system cannot operate reliably

666
00:25:58,320 –> 00:26:01,160
and the tool quickly transforms from a productivity asset

667
00:26:01,160 –> 00:26:02,800
into a massive liability.

668
00:26:02,800 –> 00:26:04,800
Consider the actual behavior of the system

669
00:26:04,800 –> 00:26:07,120
as it reads your emails, scans your documents

670
00:26:07,120 –> 00:26:09,080
and synthesizes your entire chat history

671
00:26:09,080 –> 00:26:10,800
into automated insights.

672
00:26:10,800 –> 00:26:12,960
This process becomes a data breach

673
00:26:12,960 –> 00:26:15,360
waiting to happen if the engine lacks the context

674
00:26:15,360 –> 00:26:17,400
to know which documents are sensitive

675
00:26:17,400 –> 00:26:20,280
or which regulated data must remain siloed.

676
00:26:20,280 –> 00:26:22,600
Because the system lacks inherent intent,

677
00:26:22,600 –> 00:26:24,680
it will process whatever it can reach,

678
00:26:24,680 –> 00:26:26,760
making the underlying authorization graph

679
00:26:26,760 –> 00:26:29,360
the only thing standing between utility and catastrophe.

680
00:26:29,360 –> 00:26:31,760
This reality forces organizations to strengthen

681
00:26:31,760 –> 00:26:34,400
their control plane before they can even begin a deployment.

682
00:26:34,400 –> 00:26:35,720
You find yourself needing purview

683
00:26:35,720 –> 00:26:38,640
to classify the data and DLP to enforce boundaries

684
00:26:38,640 –> 00:26:40,320
while enter ID scopes access,

685
00:26:40,320 –> 00:26:43,200
based on the specific role and context of the user.

686
00:26:43,200 –> 00:26:46,040
To maintain oversight, you then need Sentinel to audit

687
00:26:46,040 –> 00:26:48,560
what the engine is reading alongside conditional access

688
00:26:48,560 –> 00:26:51,080
to ensure that only authorized actors can trigger

689
00:26:51,080 –> 00:26:52,040
these features.

690
00:26:52,040 –> 00:26:53,560
Enterprises are moving toward co-pilot

691
00:26:53,560 –> 00:26:55,120
because the productivity gains are real,

692
00:26:55,120 –> 00:26:57,840
but they are finding that adoption is not governance optional.

693
00:26:57,840 –> 00:26:59,240
You cannot deploy this technology

694
00:26:59,240 –> 00:27:01,040
without first hardening your governance layer

695
00:27:01,040 –> 00:27:02,360
which creates a functional lock-in

696
00:27:02,360 –> 00:27:04,920
that is rarely discussed in marketing materials.

697
00:27:04,920 –> 00:27:07,560
While AWS offers bedrock as a service for hosting

698
00:27:07,560 –> 00:27:09,000
and fine-tuning models,

699
00:27:09,000 –> 00:27:10,840
it remains a piece of infrastructure

700
00:27:10,840 –> 00:27:12,320
rather than a control mechanism.

701
00:27:12,320 –> 00:27:14,640
Bedrock is a substrate that allows you to run models

702
00:27:14,640 –> 00:27:15,480
however you like,

703
00:27:15,480 –> 00:27:18,280
but it does not mandate that you classify your data

704
00:27:18,280 –> 00:27:20,480
or implement identity governance to function.

705
00:27:20,480 –> 00:27:22,760
Co-pilot is different because it is architecturally

706
00:27:22,760 –> 00:27:24,400
inseparable from governance.

707
00:27:24,400 –> 00:27:26,720
It forces you to confront your access management

708
00:27:26,720 –> 00:27:30,120
and audit trails because the alternative is conditional chaos

709
00:27:30,120 –> 00:27:32,600
within your most sensitive data sets.

710
00:27:32,600 –> 00:27:34,520
As organizations adopt these tools,

711
00:27:34,520 –> 00:27:36,160
they aren’t just buying AI.

712
00:27:36,160 –> 00:27:38,120
They are deepening their structural dependence

713
00:27:38,120 –> 00:27:39,640
on Microsoft’s governance stack.

714
00:27:39,640 –> 00:27:41,800
Every query and every recommendation makes

715
00:27:41,800 –> 00:27:45,320
Entra ID and purview more essential to daily operations,

716
00:27:45,320 –> 00:27:48,000
turning these security tools into the literal heartbeat

717
00:27:48,000 –> 00:27:49,040
of the business.

718
00:27:49,040 –> 00:27:50,960
AWS cannot replicate this dynamic

719
00:27:50,960 –> 00:27:53,400
because they do not own the employee surface area

720
00:27:53,400 –> 00:27:54,760
where work actually happens.

721
00:27:54,760 –> 00:27:57,200
Co-pilot succeeds because it lives inside teams outlook

722
00:27:57,200 –> 00:27:58,160
and SharePoint,

723
00:27:58,160 –> 00:28:00,720
whereas AWS lacks the hooks into the daily workflow

724
00:28:00,720 –> 00:28:02,800
to force this kind of governance hardening.

725
00:28:02,800 –> 00:28:05,920
They can host the models and provide the raw inference power,

726
00:28:05,920 –> 00:28:08,640
but they cannot create a feature that accelerates the control

727
00:28:08,640 –> 00:28:10,520
plane because they do not own the interface.

728
00:28:10,520 –> 00:28:13,680
This isn’t a coercive tactic, but a functional reality

729
00:28:13,680 –> 00:28:16,440
where the Microsoft control plane becomes more valuable

730
00:28:16,440 –> 00:28:17,480
the more you use it.

731
00:28:17,480 –> 00:28:20,560
Once this layer becomes critical to your operations,

732
00:28:20,560 –> 00:28:23,800
the cost of switching to another provider becomes astronomical.

733
00:28:23,800 –> 00:28:26,800
Removing Entra ID or purview would mean dismantling

734
00:28:26,800 –> 00:28:29,320
your entire identity and data governance framework,

735
00:28:29,320 –> 00:28:30,840
leaving you with a security vacuum

736
00:28:30,840 –> 00:28:32,600
that is nearly impossible to fill.

737
00:28:32,600 –> 00:28:34,640
Choosing Co-pilot is a strategic decision

738
00:28:34,640 –> 00:28:37,560
to prioritize the governance layer over the infrastructure layer

739
00:28:37,560 –> 00:28:40,960
eventually making the underlying hardware irrelevant.

740
00:28:40,960 –> 00:28:43,840
Azure Arc, managing everything everywhere.

741
00:28:43,840 –> 00:28:46,800
Azure Arc represents the software-defined control plane

742
00:28:46,800 –> 00:28:48,080
for hybrid infrastructure,

743
00:28:48,080 –> 00:28:50,040
serving as the most tangible example

744
00:28:50,040 –> 00:28:52,960
of the architectural inversion I’ve been describing.

745
00:28:52,960 –> 00:28:55,920
It allows you to project a Azure policy and defender

746
00:28:55,920 –> 00:28:58,320
onto infrastructure you don’t even own,

747
00:28:58,320 –> 00:29:01,880
including on-premises servers and AWS EC2 instances.

748
00:29:01,880 –> 00:29:03,360
By installing a lightweight agent,

749
00:29:03,360 –> 00:29:06,240
these external resources appear in your Azure portal

750
00:29:06,240 –> 00:29:09,400
as managed objects, effectively pulling your competitors hardware

751
00:29:09,400 –> 00:29:10,800
into your own governance model.

752
00:29:10,800 –> 00:29:12,360
This is not an extension of infrastructure,

753
00:29:12,360 –> 00:29:14,000
but a projection of policy.

754
00:29:14,000 –> 00:29:16,680
While AWS Outpost tries to solve the hybrid problem

755
00:29:16,680 –> 00:29:19,600
by putting AWS Managed Hardware in your data center,

756
00:29:19,600 –> 00:29:22,400
it keeps you trapped inside their specific APIs

757
00:29:22,400 –> 00:29:23,680
and hardware lifecycle.

758
00:29:23,680 –> 00:29:25,960
Outposts is a hardware play that locks you

759
00:29:25,960 –> 00:29:27,680
into a specific vendor’s metal,

760
00:29:27,680 –> 00:29:31,960
whereas Arc is a software play that abstracts the hardware entirely.

761
00:29:31,960 –> 00:29:33,640
In the enterprise software, always wins

762
00:29:33,640 –> 00:29:36,360
because that is where the actual control of the system lives.

763
00:29:36,360 –> 00:29:39,840
When you install the Arc agent on a legacy on-premises server,

764
00:29:39,840 –> 00:29:42,720
that machine suddenly behaves like a native Azure resource.

765
00:29:42,720 –> 00:29:44,320
You can enforce security baselines,

766
00:29:44,320 –> 00:29:46,080
require specific encryption standards

767
00:29:46,080 –> 00:29:48,800
and manage firewall rules through the same policy engine

768
00:29:48,800 –> 00:29:50,560
that governs your cloud footprint.

769
00:29:50,560 –> 00:29:53,320
The same logic applies to your AWS instances,

770
00:29:53,320 –> 00:29:55,480
allowing you to monitor them with Azure Monitor

771
00:29:55,480 –> 00:29:58,760
and protect them with Defender under a single unified framework.

772
00:29:58,760 –> 00:30:01,080
This is the definition of control plane abstraction.

773
00:30:01,080 –> 00:30:04,040
You are essentially stating that the location of the infrastructure

774
00:30:04,040 –> 00:30:06,400
is irrelevant as long as the policy is enforced

775
00:30:06,400 –> 00:30:08,760
consistently across the entire environment.

776
00:30:08,760 –> 00:30:10,720
AWS cannot offer a true equivalent

777
00:30:10,720 –> 00:30:13,840
because their DNA is fundamentally infrastructure focused,

778
00:30:13,840 –> 00:30:16,160
meaning they excel at managing their own hardware,

779
00:30:16,160 –> 00:30:18,320
but struggle to provide a unified governance layer

780
00:30:18,320 –> 00:30:20,320
for their competitors platforms.

781
00:30:20,320 –> 00:30:22,640
Arc treats infrastructure as a mere substrate,

782
00:30:22,640 –> 00:30:24,720
allowing the governance layer to remain constant

783
00:30:24,720 –> 00:30:26,760
while the hardware becomes interchangeable.

784
00:30:26,760 –> 00:30:29,440
For an enterprise with a messy mix of on-premises workloads

785
00:30:29,440 –> 00:30:31,680
and multi-cloud deployments, this solves the problem

786
00:30:31,680 –> 00:30:32,800
of operational chaos.

787
00:30:32,800 –> 00:30:35,360
Instead of juggling three different management frameworks

788
00:30:35,360 –> 00:30:36,840
and three different sets of dashboards,

789
00:30:36,840 –> 00:30:38,600
you move toward a single compliance engine

790
00:30:38,600 –> 00:30:41,240
where Azure Policy applies everywhere.

791
00:30:41,240 –> 00:30:43,120
This shift represents a fundamental change

792
00:30:43,120 –> 00:30:44,800
in how we design systems.

793
00:30:44,800 –> 00:30:46,640
You no longer choose a hardware provider

794
00:30:46,640 –> 00:30:48,640
and then try to figure out how to secure it.

795
00:30:48,640 –> 00:30:50,440
Instead, you choose a governance framework

796
00:30:50,440 –> 00:30:52,080
and then decide which infrastructure

797
00:30:52,080 –> 00:30:53,520
fits within those rules.

798
00:30:53,520 –> 00:30:55,400
Microsoft built this abstraction layer

799
00:30:55,400 –> 00:30:57,120
while AWS was still focused

800
00:30:57,120 –> 00:30:58,960
on building better virtual machines.

801
00:30:58,960 –> 00:31:01,400
And that distinction in architectural philosophy

802
00:31:01,400 –> 00:31:04,200
is now becoming a major competitive advantage.

803
00:31:04,200 –> 00:31:06,200
Arc also enables a policy as code model

804
00:31:06,200 –> 00:31:08,120
that is truly platform agnostic.

805
00:31:08,120 –> 00:31:10,760
While tools like cloud formation are powerful,

806
00:31:10,760 –> 00:31:13,440
they are generally confined to the AWS ecosystem

807
00:31:13,440 –> 00:31:16,600
and do not help you manage your data center or other clouds.

808
00:31:16,600 –> 00:31:18,120
Arc policy applies everywhere

809
00:31:18,120 –> 00:31:20,880
because it is focused on the intent of the configuration

810
00:31:20,880 –> 00:31:23,600
rather than the specifics of the underlying provider.

811
00:31:23,600 –> 00:31:25,040
Enterprises aren’t adopting Arc

812
00:31:25,040 –> 00:31:26,680
because Azure’s compute is better

813
00:31:26,680 –> 00:31:28,280
but because Microsoft’s governance model

814
00:31:28,280 –> 00:31:31,480
is more comprehensive and easier to enforce at scale.

815
00:31:31,480 –> 00:31:33,960
Entra-Curbos and Cloud-only identities.

816
00:31:33,960 –> 00:31:36,480
Entra-Curbos is a cloud-native authentication protocol

817
00:31:36,480 –> 00:31:39,600
that finally kills off a fundamental architectural requirement

818
00:31:39,600 –> 00:31:42,760
that has haunted enterprise environments for decades.

819
00:31:42,760 –> 00:31:45,280
Historically, if you wanted Kerberos authentication,

820
00:31:45,280 –> 00:31:47,360
you needed active directory domain controllers

821
00:31:47,360 –> 00:31:48,360
living on premises.

822
00:31:48,360 –> 00:31:51,160
That was a non-negotiable law of the data center.

823
00:31:51,160 –> 00:31:53,840
Accessing file shares or using Kerberos-based security

824
00:31:53,840 –> 00:31:55,880
meant you had to maintain a domain controller

825
00:31:55,880 –> 00:31:57,800
and show a constant line of side connectivity

826
00:31:57,800 –> 00:31:59,800
and swallow the massive infrastructure overhead

827
00:31:59,800 –> 00:32:00,920
that came with it.

828
00:32:00,920 –> 00:32:03,680
Entra-Curbos changes that equation completely.

829
00:32:03,680 –> 00:32:07,360
This shift makes Entra-ID the KDC, the key distribution center.

830
00:32:07,360 –> 00:32:09,800
Instead of relying on a physical box in a server room

831
00:32:09,800 –> 00:32:13,600
to issue Kerberos tickets, Entra-ID handles the heavy lifting

832
00:32:13,600 –> 00:32:14,440
from the cloud.

833
00:32:14,440 –> 00:32:17,920
An employee using an Entra-joint laptop can now authenticate

834
00:32:17,920 –> 00:32:19,760
to Azure files without ever talking

835
00:32:19,760 –> 00:32:21,840
to an on-premises domain controller.

836
00:32:21,840 –> 00:32:23,920
They can jump into an Azure virtual desktop session

837
00:32:23,920 –> 00:32:25,920
without a VPN tunnel back to the home office

838
00:32:25,920 –> 00:32:27,520
allowing them to work from anywhere

839
00:32:27,520 –> 00:32:29,720
while maintaining full Kerberos security.

840
00:32:29,720 –> 00:32:33,000
This is not just a new feature, it is a massive architectural shift.

841
00:32:33,000 –> 00:32:34,560
To understand the operational impact,

842
00:32:34,560 –> 00:32:36,800
you have to look at the old way of doing things.

843
00:32:36,800 –> 00:32:39,120
Traditionally, migrating file service to Azure

844
00:32:39,120 –> 00:32:41,560
created a specific kind of architectural friction

845
00:32:41,560 –> 00:32:43,920
because while Azure file supports SMB,

846
00:32:43,920 –> 00:32:47,680
and SMB supports Kerberos, Kerberos always required a KDC.

847
00:32:47,680 –> 00:32:50,080
You were trapped in a cycle where you either kept your aging

848
00:32:50,080 –> 00:32:51,800
on premises domain controllers running

849
00:32:51,800 –> 00:32:55,120
or you settled for weaker, less secure authentication methods.

850
00:32:55,120 –> 00:32:57,400
Entra Kerberos removes that trap by turning Entra-ID

851
00:32:57,400 –> 00:32:58,840
into the KDC itself.

852
00:32:58,840 –> 00:33:01,840
Cloud-only identities, users who exist solely in Entra-ID

853
00:33:01,840 –> 00:33:03,720
with no footprint in a local AD,

854
00:33:03,720 –> 00:33:06,920
can now authenticate to Azure files using pure Kerberos.

855
00:33:06,920 –> 00:33:08,560
The entire flow is cloud-native,

856
00:33:08,560 –> 00:33:11,160
which means you no longer need on-premises infrastructure,

857
00:33:11,160 –> 00:33:14,080
VPN tunnels, or fragile line-of-side dependencies

858
00:33:14,080 –> 00:33:15,160
to keep things running.

859
00:33:15,160 –> 00:33:17,680
The implications here are significant for any organization

860
00:33:17,680 –> 00:33:19,320
looking to decouple from Legacy Hardware.

861
00:33:19,320 –> 00:33:21,760
You can now decommission your domain controllers,

862
00:33:21,760 –> 00:33:23,800
shut down your local identity systems

863
00:33:23,800 –> 00:33:27,120
and operate entirely in the cloud with enterprise-grade encryption.

864
00:33:27,120 –> 00:33:30,600
Kerberos is no longer a legacy protocol tied to a server rack.

865
00:33:30,600 –> 00:33:33,040
It has been redefined as a cloud-native tool.

866
00:33:33,040 –> 00:33:34,680
AWS has no real answer to this

867
00:33:34,680 –> 00:33:36,760
because they don’t own the enterprise identity layer

868
00:33:36,760 –> 00:33:37,760
in the first place.

869
00:33:37,760 –> 00:33:40,760
Since AWS IM is built to manage resources,

870
00:33:40,760 –> 00:33:42,960
rather than identities, they cannot offer

871
00:33:42,960 –> 00:33:45,080
a cloud-only identity infrastructure

872
00:33:45,080 –> 00:33:47,000
or turn their platform into a KDC.

873
00:33:47,000 –> 00:33:49,960
They simply don’t own the foundational layer required

874
00:33:49,960 –> 00:33:52,480
to build this kind of authentication architecture.

875
00:33:52,480 –> 00:33:54,680
Enter Kerberos is the technical manifestation

876
00:33:54,680 –> 00:33:56,000
of control play and gravity.

877
00:33:56,000 –> 00:33:58,760
It strips away the last valid architectural reason

878
00:33:58,760 –> 00:34:01,200
to keep identity infrastructure on-premises

879
00:34:01,200 –> 00:34:03,800
as organizations no longer need local domain controllers

880
00:34:03,800 –> 00:34:05,200
for basic authentication.

881
00:34:05,200 –> 00:34:07,240
Enter ID handles the entire stack

882
00:34:07,240 –> 00:34:10,160
in a way that is scalable, governed, and entirely cloud-native.

883
00:34:10,160 –> 00:34:11,760
This matters because it accelerates

884
00:34:11,760 –> 00:34:14,440
the inevitable move toward cloud-only architectures.

885
00:34:14,440 –> 00:34:15,880
Organizations that used to struggle

886
00:34:15,880 –> 00:34:18,960
with hybrid identity setups and complex synchronization

887
00:34:18,960 –> 00:34:21,440
can now cut the cord and move everything to the cloud.

888
00:34:21,440 –> 00:34:24,480
They eliminate the mess of managing two separate identity systems

889
00:34:24,480 –> 00:34:27,680
and the administrative debt that comes with synchronization errors.

890
00:34:27,680 –> 00:34:30,440
When an organization moves to a cloud-only identity model,

891
00:34:30,440 –> 00:34:32,400
they aren’t just using a Microsoft service,

892
00:34:32,400 –> 00:34:35,520
they are embedding themselves deeper into the ecosystem.

893
00:34:35,520 –> 00:34:37,800
Enter ID becomes the sole source of truth

894
00:34:37,800 –> 00:34:40,480
and a non-negotiable part of daily operations.

895
00:34:40,480 –> 00:34:42,240
The control plane becomes more visible

896
00:34:42,240 –> 00:34:44,560
and more essential to the business than ever before.

897
00:34:44,560 –> 00:34:46,320
This is how gravity works in practice.

898
00:34:46,320 –> 00:34:49,000
Enter Kerberos doesn’t force you to use Azure through a contract,

899
00:34:49,000 –> 00:34:51,440
but you adopt it because it solves the very real problem

900
00:34:51,440 –> 00:34:53,600
of legacy infrastructure dependencies.

901
00:34:53,600 –> 00:34:56,600
However, that choice makes Enter ID strategically dominant,

902
00:34:56,600 –> 00:34:58,440
increasing the importance of the control plane

903
00:34:58,440 –> 00:35:01,960
and making the cost of switching nearly impossible to justify.

904
00:35:01,960 –> 00:35:03,880
Once your identity stack lives in Enter ID

905
00:35:03,880 –> 00:35:06,280
and your file servers rely on Enter Kerberos,

906
00:35:06,280 –> 00:35:08,720
you cannot easily migrate to a different provider.

907
00:35:08,720 –> 00:35:10,760
Moving to AWS identity infrastructure

908
00:35:10,760 –> 00:35:12,200
becomes a functional nightmare

909
00:35:12,200 –> 00:35:13,960
rather than a simple business decision.

910
00:35:13,960 –> 00:35:15,840
You are locked in, not by a salesperson,

911
00:35:15,840 –> 00:35:18,760
but by the functional necessity of your own architecture.

912
00:35:18,760 –> 00:35:20,720
That is the kind of architectural lock-in

913
00:35:20,720 –> 00:35:22,520
that actually matters in the enterprise.

914
00:35:22,520 –> 00:35:25,440
It isn’t about your licensing agreement or assigned commitment.

915
00:35:25,440 –> 00:35:28,440
It’s about the fact that Enter ID is now the foundation

916
00:35:28,440 –> 00:35:29,960
of your entire environment.

917
00:35:29,960 –> 00:35:32,840
If you remove that layer, everything else stops working immediately.

918
00:35:32,840 –> 00:35:34,560
AWS will likely never compete here

919
00:35:34,560 –> 00:35:37,720
because they focus on compute, storage, and databases

920
00:35:37,720 –> 00:35:39,080
rather than the identity layer.

921
00:35:39,080 –> 00:35:40,840
Microsoft owns the foundational piece

922
00:35:40,840 –> 00:35:43,360
that makes all those other services function.

923
00:35:43,360 –> 00:35:45,920
Enter Kerberos is just one more mechanism designed

924
00:35:45,920 –> 00:35:50,400
to deepen that control and ensure the center of gravity stays exactly where it is.

925
00:35:50,400 –> 00:35:54,200
The hybrid inevitability, 90% by 2027,

926
00:35:54,200 –> 00:35:56,480
Gardner predicts that 90% of organizations

927
00:35:56,480 –> 00:35:59,080
will adopt a hybrid cloud model by 2027.

928
00:35:59,080 –> 00:36:02,160
We should be very clear about what that number represents.

929
00:36:02,160 –> 00:36:04,880
This isn’t a guess that most companies will try hybrid

930
00:36:04,880 –> 00:36:06,560
and fail to reach the real cloud,

931
00:36:06,560 –> 00:36:09,360
nor is it a forecast of a temporary transition phase.

932
00:36:09,360 –> 00:36:11,120
This is a statement that hybrid cloud

933
00:36:11,120 –> 00:36:14,120
is the final architectural end state for the enterprise.

934
00:36:14,120 –> 00:36:16,480
This shift isn’t happening because organizations

935
00:36:16,480 –> 00:36:18,960
failed their cloud migrations or couldn’t afford the bill.

936
00:36:18,960 –> 00:36:22,160
It is happening because hybrid is the optimal way to run a business.

937
00:36:22,160 –> 00:36:24,360
It is the only architecture that actually aligns

938
00:36:24,360 –> 00:36:27,560
with how large-scale enterprises operate in the real world.

939
00:36:27,560 –> 00:36:30,760
Hybrid setups allow organizations to solve for data residency

940
00:36:30,760 –> 00:36:32,840
in a way that pure cloud cannot match.

941
00:36:32,840 –> 00:36:35,320
Sensitivity or regulated data stays on premises

942
00:36:35,320 –> 00:36:36,920
to satisfy legal requirements,

943
00:36:36,920 –> 00:36:39,000
while elastic workloads and AI training

944
00:36:39,000 –> 00:36:40,520
scale out to cloud GPUs.

945
00:36:40,520 –> 00:36:42,720
This isn’t a compromise made out of weakness.

946
00:36:42,720 –> 00:36:45,840
It is a deliberate optimization of resources and compliance.

947
00:36:45,840 –> 00:36:48,280
You also get cost benefits that a pure cloud model

948
00:36:48,280 –> 00:36:49,600
struggles to provide.

949
00:36:49,600 –> 00:36:52,400
Predictible steady state workloads run on premises

950
00:36:52,400 –> 00:36:54,920
where you can own the hardware and amortize the cost

951
00:36:54,920 –> 00:36:55,880
over several years.

952
00:36:55,880 –> 00:36:58,280
Meanwhile, your bursty or experimental workloads

953
00:36:58,280 –> 00:37:00,840
run in the cloud where you only pay for what you use.

954
00:37:00,840 –> 00:37:02,440
This isn’t a failure to migrate.

955
00:37:02,440 –> 00:37:04,680
It is a mature strategy that matches infrastructure

956
00:37:04,680 –> 00:37:06,600
to the specific needs of the workload.

957
00:37:06,600 –> 00:37:09,320
Latency is another area where hybrid wins.

958
00:37:09,320 –> 00:37:11,080
Real-time processing and edge inference

959
00:37:11,080 –> 00:37:13,640
happen on-site where every millisecond counts,

960
00:37:13,640 –> 00:37:15,360
while the heavy lifting of model training

961
00:37:15,360 –> 00:37:17,920
happens in the cloud where resources are plentiful.

962
00:37:17,920 –> 00:37:20,520
Keeping data close to the point of use means network latency

963
00:37:20,520 –> 00:37:23,440
stops being a bottleneck for your most critical applications.

964
00:37:23,440 –> 00:37:26,200
Finally, hybrid provides a level of security isolation

965
00:37:26,200 –> 00:37:28,560
that the pure cloud model lacks.

966
00:37:28,560 –> 00:37:31,160
Legacy systems that are too risky to modernize

967
00:37:31,160 –> 00:37:34,520
can stay on premises, completely air-gapped from the cloud,

968
00:37:34,520 –> 00:37:37,440
while your modern apps run with cloud-native security.

969
00:37:37,440 –> 00:37:40,720
You aren’t trying to force every single app into one rigid model,

970
00:37:40,720 –> 00:37:43,800
which shows architectural maturity rather than a lack of progress.

971
00:37:43,800 –> 00:37:46,640
The 90% forecast isn’t an aspirational goal.

972
00:37:46,640 –> 00:37:49,320
It is a description of where the market is already going.

973
00:37:49,320 –> 00:37:51,360
Hybrid is the most efficient architecture

974
00:37:51,360 –> 00:37:52,800
for practical operations.

975
00:37:52,800 –> 00:37:55,760
And that reality changes the entire competitive landscape.

976
00:37:55,760 –> 00:37:58,040
In a hybrid world, the most important question

977
00:37:58,040 –> 00:38:00,400
is no longer which cloud are we using.

978
00:38:00,400 –> 00:38:02,400
But who is governing the whole thing?

979
00:38:02,400 –> 00:38:05,360
The first era of the cloud wars was about where to build

980
00:38:05,360 –> 00:38:07,040
and that favored AWS.

981
00:38:07,040 –> 00:38:09,600
They had the most services, the most regions,

982
00:38:09,600 –> 00:38:11,960
and the most mature tools for developers.

983
00:38:11,960 –> 00:38:15,120
When organizations asked where they should put their new workloads,

984
00:38:15,120 –> 00:38:17,200
the answer was almost always AWS,

985
00:38:17,200 –> 00:38:20,560
and as a result, AWS won that initial round of the fight.

986
00:38:20,560 –> 00:38:22,960
But the new question is about who governs identity

987
00:38:22,960 –> 00:38:25,080
and policy across multiple environments,

988
00:38:25,080 –> 00:38:26,560
and that favors Microsoft.

989
00:38:26,560 –> 00:38:28,800
Because Microsoft owns the enterprise identity

990
00:38:28,800 –> 00:38:29,880
and the governance layer,

991
00:38:29,880 –> 00:38:32,280
they are the natural answer for any organization

992
00:38:32,280 –> 00:38:34,240
trying to manage a split environment.

993
00:38:34,240 –> 00:38:37,000
They extend their control plane across AWS workloads

994
00:38:37,000 –> 00:38:38,320
and on premises servers alike.

995
00:38:38,320 –> 00:38:40,320
And in that arena, Microsoft wins.

996
00:38:40,320 –> 00:38:42,120
This is a total architectural inversion.

997
00:38:42,120 –> 00:38:43,960
In a pure cloud world, the provider

998
00:38:43,960 –> 00:38:46,600
with the best infrastructure wins, but in a hybrid world,

999
00:38:46,600 –> 00:38:49,080
the provider with the best control plane takes the lead.

1000
00:38:49,080 –> 00:38:50,720
AWS was built for the first world

1001
00:38:50,720 –> 00:38:53,280
while Microsoft has spent decades preparing for the second.

1002
00:38:53,280 –> 00:38:56,000
By 2027, when nearly everyone is hybrid,

1003
00:38:56,000 –> 00:38:59,240
the original debate over which cloud is better will become irrelevant.

1004
00:38:59,240 –> 00:39:02,440
Most companies will already be using AWS as your

1005
00:39:02,440 –> 00:39:04,840
and Google cloud simultaneously.

1006
00:39:04,840 –> 00:39:07,520
The real battle will be over how to govern that complexity

1007
00:39:07,520 –> 00:39:10,360
and that is a conversation that Microsoft completely dominates.

1008
00:39:10,360 –> 00:39:12,640
This is why the hybrid forecast is so important.

1009
00:39:12,640 –> 00:39:14,640
It isn’t just a market stat, it’s a signal

1010
00:39:14,640 –> 00:39:17,280
of which architectural concerns are going to matter most

1011
00:39:17,280 –> 00:39:18,040
in the coming years.

1012
00:39:18,040 –> 00:39:19,560
It tells us that the control plane,

1013
00:39:19,560 –> 00:39:21,800
the identity, the policy and the governance

1014
00:39:21,800 –> 00:39:23,320
is the only thing that determines

1015
00:39:23,320 –> 00:39:26,400
a competitive advantage in a fragmented environment.

1016
00:39:26,400 –> 00:39:29,520
AWS will likely continue to lead in raw infrastructure

1017
00:39:29,520 –> 00:39:32,480
and run more total workloads than anyone else.

1018
00:39:32,480 –> 00:39:34,560
But Microsoft will be the one defining

1019
00:39:34,560 –> 00:39:36,040
how those workloads are governed

1020
00:39:36,040 –> 00:39:37,640
and who has access to them.

1021
00:39:37,640 –> 00:39:39,880
They will set the rules for policy and compliance

1022
00:39:39,880 –> 00:39:41,480
across the entire industry.

1023
00:39:41,480 –> 00:39:43,480
That is the inevitability of the hybrid model.

1024
00:39:43,480 –> 00:39:45,440
It is the reason why the control plane belongs

1025
00:39:45,440 –> 00:39:48,680
to Microsoft regardless of where the actual servers are located.

1026
00:39:48,680 –> 00:39:51,680
The licensing lock-in, enterprise agreements and bundling.

1027
00:39:51,680 –> 00:39:54,520
Microsoft enterprise agreements bundle services together

1028
00:39:54,520 –> 00:39:56,960
in a way that AWS fundamentally cannot replicate.

1029
00:39:56,960 –> 00:39:59,720
To understand why the control plane story is actually

1030
00:39:59,720 –> 00:40:03,400
a financial one, we have to look at what an EA actually contains.

1031
00:40:03,400 –> 00:40:07,680
An enterprise agreement typically bundles Microsoft 365 e5,

1032
00:40:07,680 –> 00:40:09,680
which covers the core of daily work

1033
00:40:09,680 –> 00:40:12,280
through Teams, Exchange, SharePoint and OneDrive.

1034
00:40:12,280 –> 00:40:15,560
It includes Microsoft Entry DP2 for identity governance

1035
00:40:15,560 –> 00:40:18,640
and privilege identity management alongside Microsoft Defender

1036
00:40:18,640 –> 00:40:22,080
for Cloud to monitor security across Azure, AWS

1037
00:40:22,080 –> 00:40:23,840
and on-premises environments.

1038
00:40:23,840 –> 00:40:25,760
The bundle also provides Microsoft Sentinel

1039
00:40:25,760 –> 00:40:27,200
for centralized security management,

1040
00:40:27,200 –> 00:40:30,120
Microsoft Perview for data classification and risk detection

1041
00:40:30,120 –> 00:40:33,200
and Microsoft co-pilot to integrate AI into every workflow.

1042
00:40:33,200 –> 00:40:34,960
This is not a simple feature list.

1043
00:40:34,960 –> 00:40:36,400
It is an architectural lock-in.

1044
00:40:36,400 –> 00:40:38,040
When an enterprise signs an EA,

1045
00:40:38,040 –> 00:40:40,640
they are doing more than just purchasing software licenses.

1046
00:40:40,640 –> 00:40:43,520
They are committing to Microsoft as their primary control plane.

1047
00:40:43,520 –> 00:40:45,920
By signing that contract, the organization is stating

1048
00:40:45,920 –> 00:40:48,280
that Microsoft will serve as the foundation

1049
00:40:48,280 –> 00:40:52,240
for how they govern identity, enforce policy and operate securely.

1050
00:40:52,240 –> 00:40:54,120
AWS cannot offer an equivalent bundle

1051
00:40:54,120 –> 00:40:56,680
because they do not own the workforce software layer.

1052
00:40:56,680 –> 00:41:01,560
While AWS can provide compute, storage, databases and AI infrastructure,

1053
00:41:01,560 –> 00:41:03,480
they cannot offer identity governance

1054
00:41:03,480 –> 00:41:06,000
that is natively integrated with your daily workflow.

1055
00:41:06,000 –> 00:41:07,720
They cannot provide compliance tools

1056
00:41:07,720 –> 00:41:09,840
that live inside your productivity applications

1057
00:41:09,840 –> 00:41:11,880
and they certainly cannot offer an AI assistant

1058
00:41:11,880 –> 00:41:13,080
that is baked into Teams.

1059
00:41:13,080 –> 00:41:15,640
Because of this, enterprises seeking unified governance

1060
00:41:15,640 –> 00:41:16,640
choose Microsoft.

1061
00:41:16,640 –> 00:41:17,720
Once that choice is made,

1062
00:41:17,720 –> 00:41:19,480
they naturally extend Microsoft’s reach

1063
00:41:19,480 –> 00:41:21,760
across their existing AWS workloads.

1064
00:41:21,760 –> 00:41:24,880
They use EntraID to authenticate their AWS users

1065
00:41:24,880 –> 00:41:28,000
and Defender for Cloud to monitor their AWS infrastructure.

1066
00:41:28,000 –> 00:41:30,520
They rely on Sentinel to log access and Perview

1067
00:41:30,520 –> 00:41:33,440
to classify data living in AWS buckets.

1068
00:41:33,440 –> 00:41:36,440
The result is that Microsoft’s governance is layer directly

1069
00:41:36,440 –> 00:41:38,400
on top of AWS infrastructure.

1070
00:41:38,400 –> 00:41:40,480
This is the inherent advantage of bundling.

1071
00:41:40,480 –> 00:41:43,240
It is not necessarily that Microsoft’s individual products

1072
00:41:43,240 –> 00:41:46,640
outperform AWS alternatives on a feature-by-feature basis.

1073
00:41:46,640 –> 00:41:48,920
The reality is that Microsoft’s products are integrated,

1074
00:41:48,920 –> 00:41:51,320
meaning they share data and enforce consistent policy

1075
00:41:51,320 –> 00:41:54,720
without requiring you to glue five different third-party tools together.

1076
00:41:54,720 –> 00:41:56,120
The glue is built into the license.

1077
00:41:56,120 –> 00:41:59,040
An organization signs an EA and receives Microsoft 365,

1078
00:41:59,040 –> 00:42:00,720
which ensures that work happens in Teams

1079
00:42:00,720 –> 00:42:02,520
and identity originates in EntraID.

1080
00:42:02,520 –> 00:42:04,680
Security monitoring flows through Defender,

1081
00:42:04,680 –> 00:42:06,200
audit trails live in Sentinel,

1082
00:42:06,200 –> 00:42:08,360
and compliance is enforced through Perview.

1083
00:42:08,360 –> 00:42:11,240
When those same organizations run AWS workloads,

1084
00:42:11,240 –> 00:42:12,560
they need a way to govern them.

1085
00:42:12,560 –> 00:42:14,040
Microsoft owns the control plane,

1086
00:42:14,040 –> 00:42:16,600
so Microsoft governs the AWS workloads.

1087
00:42:16,600 –> 00:42:18,160
The licensing advantage is profound

1088
00:42:18,160 –> 00:42:19,840
because it scales with the organization.

1089
00:42:19,840 –> 00:42:22,760
An enterprise with 5,000 employees needs M365

1090
00:42:22,760 –> 00:42:24,440
and EntraID for every single person

1091
00:42:24,440 –> 00:42:25,760
and they need Defender and Perview

1092
00:42:25,760 –> 00:42:27,720
to maintain their operational foundation.

1093
00:42:27,720 –> 00:42:29,760
These licenses become non-negotiable

1094
00:42:29,760 –> 00:42:32,720
because they are the bedrock of how the company functions.

1095
00:42:32,720 –> 00:42:35,400
AWS cannot compete here because they do not own

1096
00:42:35,400 –> 00:42:37,000
the foundational layer of the business.

1097
00:42:37,000 –> 00:42:40,120
They might offer better compute or more performant databases,

1098
00:42:40,120 –> 00:42:42,280
but they cannot offer better identity governance

1099
00:42:42,280 –> 00:42:44,160
when they don’t own the identity itself.

1100
00:42:44,160 –> 00:42:46,280
They cannot bundle governance with productivity

1101
00:42:46,280 –> 00:42:48,680
because they do not own the productivity suite.

1102
00:42:48,680 –> 00:42:51,440
This is why enterprises extend Microsoft across AWS.

1103
00:42:51,440 –> 00:42:53,840
It isn’t because Azure services are more feature-rich,

1104
00:42:53,840 –> 00:42:55,560
but because Microsoft owns the bundle

1105
00:42:55,560 –> 00:42:57,200
and the integration that comes with it.

1106
00:42:57,200 –> 00:42:59,240
Once an organization commits to this bundle,

1107
00:42:59,240 –> 00:43:01,240
the cost of switching becomes astronomical.

1108
00:43:01,240 –> 00:43:03,000
You cannot easily remove EntraID

1109
00:43:03,000 –> 00:43:06,000
without dismantling your entire identity management strategy.

1110
00:43:06,000 –> 00:43:08,280
You cannot pull out Defender or Sentinel

1111
00:43:08,280 –> 00:43:11,720
without losing your security monitoring and audit trails.

1112
00:43:11,720 –> 00:43:13,400
The EA is an architectural commitment

1113
00:43:13,400 –> 00:43:15,360
rather than a simple licensing deal.

1114
00:43:15,360 –> 00:43:18,640
It is a declaration that Microsoft’s control plane

1115
00:43:18,640 –> 00:43:20,320
is the foundation of the organization.

1116
00:43:20,320 –> 00:43:21,840
Once that foundation is set,

1117
00:43:21,840 –> 00:43:23,840
the underlying AWS infrastructure

1118
00:43:23,840 –> 00:43:26,320
becomes less strategically important.

1119
00:43:26,320 –> 00:43:28,960
AWS becomes the place where workloads run,

1120
00:43:28,960 –> 00:43:31,760
but Microsoft remains the place where governance happens.

1121
00:43:31,760 –> 00:43:33,920
That is the reality of the licensing lock-in.

1122
00:43:33,920 –> 00:43:35,760
Enterprises standardize on Microsoft

1123
00:43:35,760 –> 00:43:38,720
because the control plane makes everything else work.

1124
00:43:38,720 –> 00:43:42,200
Regulated industries where control plane dominance is absolute

1125
00:43:42,200 –> 00:43:44,200
in healthcare, finance and government

1126
00:43:44,200 –> 00:43:46,160
compliance is an existential requirement

1127
00:43:46,160 –> 00:43:48,680
rather than an optional configuration.

1128
00:43:48,680 –> 00:43:51,160
Regulators are not interested in your infrastructure.

1129
00:43:51,160 –> 00:43:53,400
They care if you can prove that data is protected

1130
00:43:53,400 –> 00:43:55,080
and access is strictly controlled.

1131
00:43:55,080 –> 00:43:56,680
This is where the control plane shifts

1132
00:43:56,680 –> 00:43:59,480
from being a benefit to being a mandatory requirement.

1133
00:43:59,480 –> 00:44:02,760
These industries require specific hard guarantees.

1134
00:44:02,760 –> 00:44:04,040
They need residency protections,

1135
00:44:04,040 –> 00:44:06,600
tamper-proof audit trails and insider risk detection

1136
00:44:06,600 –> 00:44:08,560
that catches threats before a breach occurs.

1137
00:44:08,560 –> 00:44:11,080
They need DLP enforcement to stop sensitive data

1138
00:44:11,080 –> 00:44:14,040
from leaving the perimeter and role-based access control

1139
00:44:14,040 –> 00:44:16,480
that is enforced at every single layer.

1140
00:44:16,480 –> 00:44:18,800
Microsoft PerView provides this entire framework

1141
00:44:18,800 –> 00:44:23,120
across M365, Azure and even federated AWS environments.

1142
00:44:23,120 –> 00:44:25,120
When a healthcare provider needs to prove

1143
00:44:25,120 –> 00:44:26,880
hyper compliance, they do not start

1144
00:44:26,880 –> 00:44:28,840
by auditing their EC2 instances.

1145
00:44:28,840 –> 00:44:30,360
They audit their data flows and check

1146
00:44:30,360 –> 00:44:31,920
who accessed patient records.

1147
00:44:31,920 –> 00:44:33,680
They look at whether DLP policies stopped

1148
00:44:33,680 –> 00:44:34,960
unauthorized sharing.

1149
00:44:34,960 –> 00:44:37,880
PerView answers those questions and provides the audit trail

1150
00:44:37,880 –> 00:44:39,960
that proves compliance to the regulator.

1151
00:44:39,960 –> 00:44:43,160
AWS offers AWS config for infrastructure compliance,

1152
00:44:43,160 –> 00:44:45,760
which is useful for verifying that EC2 instances

1153
00:44:45,760 –> 00:44:49,120
are configured correctly or that S3 buckets are encrypted.

1154
00:44:49,120 –> 00:44:51,320
However, AWS config does not govern data

1155
00:44:51,320 –> 00:44:52,960
or manage retention policies.

1156
00:44:52,960 –> 00:44:54,840
It is a tool for hardening the compute layer,

1157
00:44:54,840 –> 00:44:57,360
but it is not a complete compliance solution.

1158
00:44:57,360 –> 00:44:58,800
There is a critical distinction here

1159
00:44:58,800 –> 00:45:01,360
that regulated industries understand perfectly.

1160
00:45:01,360 –> 00:45:04,200
AWS is compliant with HIPAA, meaning their data centers

1161
00:45:04,200 –> 00:45:06,280
are secure and their encryption is strong,

1162
00:45:06,280 –> 00:45:08,560
but Microsoft’s governance layer is what actually

1163
00:45:08,560 –> 00:45:10,560
enforces HIPAA for the organization.

1164
00:45:10,560 –> 00:45:12,760
When a healthcare company runs a regulated workload

1165
00:45:12,760 –> 00:45:15,760
on AWS, they still rely on PerView for data governance.

1166
00:45:15,760 –> 00:45:18,280
They still need Sentinel to audit record access

1167
00:45:18,280 –> 00:45:21,600
and enter ID to manage identity through context-aware policies.

1168
00:45:21,600 –> 00:45:24,120
They require the entire Microsoft governance stack

1169
00:45:24,120 –> 00:45:26,840
even when the infrastructure belongs to AWS.

1170
00:45:26,840 –> 00:45:28,360
This creates a strange inversion.

1171
00:45:28,360 –> 00:45:30,800
AWS provides the compliant infrastructure,

1172
00:45:30,800 –> 00:45:33,360
but Microsoft provides the compliant governance.

1173
00:45:33,360 –> 00:45:35,440
In these industries, the governance is what matters

1174
00:45:35,440 –> 00:45:38,240
because the infrastructure has become a commodity.

1175
00:45:38,240 –> 00:45:41,240
Every major cloud provider meets the basic regulatory requirements

1176
00:45:41,240 –> 00:45:42,920
for storage and compute.

1177
00:45:42,920 –> 00:45:45,240
The real differentiator is the governance layer

1178
00:45:45,240 –> 00:45:48,120
that makes those requirements provable to an auditor.

1179
00:45:48,120 –> 00:45:49,600
When the regulator arrives,

1180
00:45:49,600 –> 00:45:52,360
the organization doesn’t show them a list of AWS servers.

1181
00:45:52,360 –> 00:45:54,360
They show them the PerView compliance dashboard

1182
00:45:54,360 –> 00:45:56,080
and the Sentinel audit logs.

1183
00:45:56,080 –> 00:45:58,760
Financial services experience these same pressures.

1184
00:45:58,760 –> 00:46:01,440
To prove ASOX compliance, a bank must demonstrate

1185
00:46:01,440 –> 00:46:03,920
that access to critical systems is controlled

1186
00:46:03,920 –> 00:46:06,600
and that insider threats are being monitored.

1187
00:46:06,600 –> 00:46:08,320
PerView handles this natively,

1188
00:46:08,320 –> 00:46:11,120
while AWS config simply cannot reach that level

1189
00:46:11,120 –> 00:46:12,680
of data-centric oversight.

1190
00:46:12,680 –> 00:46:15,600
Government agencies face the most intense requirements of all,

1191
00:46:15,600 –> 00:46:18,880
including FedRAMP, NIST and CMMC frameworks.

1192
00:46:18,880 –> 00:46:21,360
These standards demand centralized identity management

1193
00:46:21,360 –> 00:46:23,400
and comprehensive continuous monitoring.

1194
00:46:23,400 –> 00:46:25,680
Microsoft’s governance layer was built to address

1195
00:46:25,680 –> 00:46:27,040
these specific needs.

1196
00:46:27,040 –> 00:46:30,360
While AWS infrastructure can be FedRAMP compliant,

1197
00:46:30,360 –> 00:46:33,320
AWS does not own the governance layer that actually proves it.

1198
00:46:33,320 –> 00:46:35,920
This is where control plane dominance becomes absolute.

1199
00:46:35,920 –> 00:46:39,000
In these sectors, the control plane is the entire business.

1200
00:46:39,000 –> 00:46:41,760
Organizations do not choose between AWS and Azure

1201
00:46:41,760 –> 00:46:44,240
based on how fast a virtual machine boots up.

1202
00:46:44,240 –> 00:46:46,680
They choose based on which platform allows them to survive

1203
00:46:46,680 –> 00:46:47,240
and audit.

1204
00:46:47,240 –> 00:46:49,240
Microsoft owns this space entirely.

1205
00:46:49,240 –> 00:46:51,560
AWS will continue to provide the hardware

1206
00:46:51,560 –> 00:46:53,280
and the compliant data centers,

1207
00:46:53,280 –> 00:46:55,880
but Microsoft will continue to own the governance layer

1208
00:46:55,880 –> 00:46:57,440
in the world of regulated industries.

1209
00:46:57,440 –> 00:46:59,680
That is the only thing that determines the winner.

1210
00:46:59,680 –> 00:47:02,680
That is where the battle for the enterprise is being won.

1211
00:47:02,680 –> 00:47:04,120
Government and sovereign cloud

1212
00:47:04,120 –> 00:47:06,120
where Microsoft’s advantage is structural.

1213
00:47:06,120 –> 00:47:08,240
Most organizations view sovereign clouds

1214
00:47:08,240 –> 00:47:11,520
as a simple matter of data residency, but they are wrong.

1215
00:47:11,520 –> 00:47:14,040
Microsoft operates specialized regions in territories

1216
00:47:14,040 –> 00:47:16,680
where data sovereignty is a non-negotiable requirement

1217
00:47:16,680 –> 00:47:17,520
of doing business.

1218
00:47:17,520 –> 00:47:19,560
You see this in Germany through Deutsche Telekom

1219
00:47:19,560 –> 00:47:22,680
in China via 21 VNET and across the US government

1220
00:47:22,680 –> 00:47:25,720
with GCC, GCC high and DOD variants.

1221
00:47:25,720 –> 00:47:27,520
These are not merely infrastructure regions

1222
00:47:27,520 –> 00:47:29,080
designed to host virtual machines.

1223
00:47:29,080 –> 00:47:30,240
They are governance containers

1224
00:47:30,240 –> 00:47:33,240
where the system enforces boundaries by design.

1225
00:47:33,240 –> 00:47:36,880
Within these walls, identity remains local, data stays put,

1226
00:47:36,880 –> 00:47:38,800
and regulators can perform audits

1227
00:47:38,800 –> 00:47:42,400
because nothing leaves the perimeter without explicit authorization.

1228
00:47:42,400 –> 00:47:44,180
AWS maintains similar footprints with

1229
00:47:44,180 –> 00:47:46,420
Gough Cloud and various international regions

1230
00:47:46,420 –> 00:47:48,860
yet a fundamental architectural gap remains.

1231
00:47:48,860 –> 00:47:51,620
While AWS can host the underlying infrastructure

1232
00:47:51,620 –> 00:47:53,180
in these sensitive locations,

1233
00:47:53,180 –> 00:47:54,900
they do not own the governance layer

1234
00:47:54,900 –> 00:47:56,740
that sits on top of that hardware.

1235
00:47:56,740 –> 00:47:59,580
The US government still runs its workforce collaboration

1236
00:47:59,580 –> 00:48:02,700
on Microsoft 365, meaning that even in the most restricted

1237
00:48:02,700 –> 00:48:06,300
GCC high environments, the control plane belongs to Microsoft.

1238
00:48:06,300 –> 00:48:08,820
Decisions are made in teams, documents live in SharePoint

1239
00:48:08,820 –> 00:48:10,940
and communications are archived in exchange

1240
00:48:10,940 –> 00:48:13,820
while EntraID serves as the origin for every identity.

1241
00:48:13,820 –> 00:48:15,620
Security is monitored through defender

1242
00:48:15,620 –> 00:48:18,340
and audit trails are consolidated in Sentinel,

1243
00:48:18,340 –> 00:48:20,420
creating a reality where Microsoft manages

1244
00:48:20,420 –> 00:48:22,260
the entire operational context.

1245
00:48:22,260 –> 00:48:26,060
This distinction matters because it is a structural reality

1246
00:48:26,060 –> 00:48:29,780
rather than a simple feature comparison or product evaluation.

1247
00:48:29,780 –> 00:48:32,180
We are looking at a scenario where Microsoft owns

1248
00:48:32,180 –> 00:48:34,100
the entire stack in sovereign environments

1249
00:48:34,100 –> 00:48:37,020
while AWS is relegated to providing the substrate.

1250
00:48:37,020 –> 00:48:39,460
AWS provides the raw infrastructure

1251
00:48:39,460 –> 00:48:41,100
but Microsoft provides the governance

1252
00:48:41,100 –> 00:48:43,860
that makes that infrastructure usable for regulated agency.

1253
00:48:43,860 –> 00:48:45,420
Consider the operational consequences

1254
00:48:45,420 –> 00:48:47,740
for a government agency running a multi-cloud strategy

1255
00:48:47,740 –> 00:48:48,700
within GCC high.

1256
00:48:48,700 –> 00:48:50,700
They might have workload sitting in AWS

1257
00:48:50,700 –> 00:48:54,060
and Azure simultaneously alongside legacy on premises systems

1258
00:48:54,060 –> 00:48:56,700
yet they still require a unified way to manage them all.

1259
00:48:56,700 –> 00:48:58,100
Microsoft provides that bridge

1260
00:48:58,100 –> 00:49:00,660
because EntraID authenticates the users

1261
00:49:00,660 –> 00:49:03,220
and conditional access enforces the policies

1262
00:49:03,220 –> 00:49:04,860
across the entire environment.

1263
00:49:04,860 –> 00:49:06,820
Defender monitors the AWS instances

1264
00:49:06,820 –> 00:49:09,820
while Sentinel logs the access and purview ensures compliance

1265
00:49:09,820 –> 00:49:13,020
meaning the entire governance layer is a Microsoft engine

1266
00:49:13,020 –> 00:49:15,100
operating within the sovereign boundary.

1267
00:49:15,100 –> 00:49:16,980
AWS cannot replicate this model

1268
00:49:16,980 –> 00:49:19,420
because they do not own the identity system

1269
00:49:19,420 –> 00:49:22,140
or the policy engine required to authenticate users

1270
00:49:22,140 –> 00:49:24,460
and enforce context-aware access.

1271
00:49:24,460 –> 00:49:26,820
They can provide compliant racks and power

1272
00:49:26,820 –> 00:49:29,140
but they cannot provide the overarching framework

1273
00:49:29,140 –> 00:49:31,100
that proves to a regulator that every policy

1274
00:49:31,100 –> 00:49:32,500
is being strictly enforced.

1275
00:49:32,500 –> 00:49:34,340
This structural advantage repeats itself

1276
00:49:34,340 –> 00:49:36,340
in every sovereign region across the globe.

1277
00:49:36,340 –> 00:49:38,540
In Germany the data and identity stay local

1278
00:49:38,540 –> 00:49:40,580
but the system that determines who has access

1279
00:49:40,580 –> 00:49:42,820
and what they can do still belongs to Microsoft.

1280
00:49:42,820 –> 00:49:45,300
For government agencies this is the decisive factor

1281
00:49:45,300 –> 00:49:48,180
that outweighs compute performance or storage capacity

1282
00:49:48,180 –> 00:49:50,100
every single time they aren’t buying features

1283
00:49:50,100 –> 00:49:51,780
they are buying the ability to operate

1284
00:49:51,780 –> 00:49:55,100
within a sovereign boundary using a single unified governance model.

1285
00:49:55,100 –> 00:49:57,420
This is why government adoption consistently favors

1286
00:49:57,420 –> 00:49:59,860
Microsoft regardless of whether Azure infrastructure

1287
00:49:59,860 –> 00:50:01,220
is better in a vacuum.

1288
00:50:01,220 –> 00:50:04,020
Microsoft owns the identity, the policy, the compliance

1289
00:50:04,020 –> 00:50:05,780
and the audit trail all contained

1290
00:50:05,780 –> 00:50:07,900
within the required sovereignty boundary.

1291
00:50:07,900 –> 00:50:10,740
AWS will continue to provide the underlying infrastructure

1292
00:50:10,740 –> 00:50:12,220
but they will never control the layer

1293
00:50:12,220 –> 00:50:13,780
where the government actually operates

1294
00:50:13,780 –> 00:50:16,020
and where compliance is ultimately proven.

1295
00:50:16,020 –> 00:50:18,980
As agencies adopt teams, sharepoint and outlook

1296
00:50:18,980 –> 00:50:20,580
this structural advantage compounds

1297
00:50:20,580 –> 00:50:22,780
and the control plane becomes even more critical

1298
00:50:22,780 –> 00:50:24,100
to daily operations.

1299
00:50:24,100 –> 00:50:27,340
The implementation of co-pilot only deepens this dependence

1300
00:50:27,340 –> 00:50:30,180
and as agencies move toward cloud only identities

1301
00:50:30,180 –> 00:50:33,180
via intra-carberos they eliminate their old on premises

1302
00:50:33,180 –> 00:50:34,420
footprint entirely.

1303
00:50:34,420 –> 00:50:36,420
The real advantage isn’t found in current products

1304
00:50:36,420 –> 00:50:39,020
but in the architectural foundation of the companies themselves.

1305
00:50:39,020 –> 00:50:41,300
Microsoft built the control plane first

1306
00:50:41,300 –> 00:50:42,900
and attached infrastructure to it

1307
00:50:42,900 –> 00:50:44,620
whereas AWS built infrastructure

1308
00:50:44,620 –> 00:50:47,820
and tried to bolt on governance as an afterthought.

1309
00:50:47,820 –> 00:50:50,740
In sovereign environments where governance is the entire business

1310
00:50:50,740 –> 00:50:53,740
that original architectural intent determines the winner.

1311
00:50:53,740 –> 00:50:56,540
By 2027 the shift to cloud only identities

1312
00:50:56,540 –> 00:50:58,820
and the rollout of AI across the workforce

1313
00:50:58,820 –> 00:51:00,980
will make this advantage feel insurmountable.

1314
00:51:00,980 –> 00:51:03,580
AWS will still be a viable compliant platform

1315
00:51:03,580 –> 00:51:04,940
for hosting workloads

1316
00:51:04,940 –> 00:51:07,060
but Microsoft will control the decision engine

1317
00:51:07,060 –> 00:51:09,380
that dictates every action within the environment.

1318
00:51:09,380 –> 00:51:12,220
In the world of regulated industries and government contracts

1319
00:51:12,220 –> 00:51:14,420
that structural ownership of the control plane

1320
00:51:14,420 –> 00:51:16,540
is the only thing that actually matters.

1321
00:51:16,540 –> 00:51:20,580
The CIO’s dilemma, unified control versus best of breed services.

1322
00:51:20,580 –> 00:51:22,460
CIOs are currently facing a choice

1323
00:51:22,460 –> 00:51:24,300
that sounds perfectly rational in a boardroom

1324
00:51:24,300 –> 00:51:27,460
but reveals a massive hidden cost once it hits production.

1325
00:51:27,460 –> 00:51:30,060
They have to choose between a unified control plane

1326
00:51:30,060 –> 00:51:32,060
and the best of breed service model

1327
00:51:32,060 –> 00:51:34,740
and this is where architectural theory turns into

1328
00:51:34,740 –> 00:51:36,260
a painful budget decision.

1329
00:51:36,260 –> 00:51:39,020
A unified control plane means committing to a single vendor

1330
00:51:39,020 –> 00:51:42,140
like Microsoft to handle identity policy compliance

1331
00:51:42,140 –> 00:51:45,100
and security monitoring through a single integrated stack.

1332
00:51:45,100 –> 00:51:48,180
You use EntraID for identity, conditional access

1333
00:51:48,180 –> 00:51:50,620
for your policy engine, purview for compliance

1334
00:51:50,620 –> 00:51:52,100
and Sentinel as your CM.

1335
00:51:52,100 –> 00:51:53,980
While the cost per service might be higher

1336
00:51:53,980 –> 00:51:55,700
because you are paying for deep integration

1337
00:51:55,700 –> 00:51:57,540
the trade-off is a simplified operation

1338
00:51:57,540 –> 00:52:00,340
with one dashboard and one consistent governance model.

1339
00:52:00,340 –> 00:52:02,460
The alternative is the best of breed approach

1340
00:52:02,460 –> 00:52:05,420
where you pick the absolute best tool for every specific job

1341
00:52:05,420 –> 00:52:06,260
in the enterprise.

1342
00:52:06,260 –> 00:52:08,940
You might choose Octa for identity, Splunk for your CM

1343
00:52:08,940 –> 00:52:10,540
and a specialized vendor for DLP

1344
00:52:10,540 –> 00:52:12,420
because you want the most advanced solution

1345
00:52:12,420 –> 00:52:13,980
for every individual function.

1346
00:52:13,980 –> 00:52:16,300
On paper this looks cheaper because you only buy exactly

1347
00:52:16,300 –> 00:52:18,540
what you need but the operational complexity

1348
00:52:18,540 –> 00:52:21,460
begins to multiply the moment the contracts are signed.

1349
00:52:21,460 –> 00:52:23,500
Best of breed sounds superior in theory

1350
00:52:23,500 –> 00:52:25,580
because nobody wants to accept an inferior tool

1351
00:52:25,580 –> 00:52:27,260
just for the sake of integration.

1352
00:52:27,260 –> 00:52:30,580
However, this model almost always fails at enterprise scale

1353
00:52:30,580 –> 00:52:32,980
because it ignores the reality of system entropy.

1354
00:52:32,980 –> 00:52:34,580
When you manage 10 different vendors

1355
00:52:34,580 –> 00:52:37,540
you are actually managing 10 different identity systems

1356
00:52:37,540 –> 00:52:39,180
with 10 different credential stores

1357
00:52:39,180 –> 00:52:40,660
and 10 different password policies.

1358
00:52:40,660 –> 00:52:42,820
If an employee changes their password in one system

1359
00:52:42,820 –> 00:52:44,500
and it fails to propagate to the others

1360
00:52:44,500 –> 00:52:46,660
they are immediately locked out of half their tools.

1361
00:52:46,660 –> 00:52:49,620
Support tickets start to pile up and productivity drops

1362
00:52:49,620 –> 00:52:51,660
because the systems aren’t talking to each other

1363
00:52:51,660 –> 00:52:52,620
in a meaningful way.

1364
00:52:52,620 –> 00:52:54,420
Compliance becomes a theater performance

1365
00:52:54,420 –> 00:52:56,980
when you have to pull logs from 10 different vendors

1366
00:52:56,980 –> 00:52:58,580
who all use different data formats.

1367
00:52:58,580 –> 00:53:01,220
One might use Jason while another uses CISLOG

1368
00:53:01,220 –> 00:53:03,340
forcing your team to spend weeks normalizing

1369
00:53:03,340 –> 00:53:06,180
and correlating data just to prove a single access event

1370
00:53:06,180 –> 00:53:07,140
to a regulator.

1371
00:53:07,140 –> 00:53:08,860
This isn’t true compliance.

1372
00:53:08,860 –> 00:53:11,260
It’s a desperate attempt to reconstruct a narrative

1373
00:53:11,260 –> 00:53:13,260
from fragmented pieces of evidence.

1374
00:53:13,260 –> 00:53:15,100
Security posture also suffers

1375
00:53:15,100 –> 00:53:17,420
because you end up with 10 different policy frameworks

1376
00:53:17,420 –> 00:53:19,140
that don’t share the same standards.

1377
00:53:19,140 –> 00:53:21,660
One vendor might enforce MFA while another allows

1378
00:53:21,660 –> 00:53:24,140
weak passwords creating a fragmented environment

1379
00:53:24,140 –> 00:53:25,900
where an attacker only needs to find

1380
00:53:25,900 –> 00:53:27,540
the single weakest link to succeed.

1381
00:53:27,540 –> 00:53:30,180
Your security is no longer a cohesive shield.

1382
00:53:30,180 –> 00:53:31,940
It is a collection of mismatched plates

1383
00:53:31,940 –> 00:53:33,220
with gaps in between them.

1384
00:53:33,220 –> 00:53:35,700
The maintenance burden is the final nail in the coffin

1385
00:53:35,700 –> 00:53:38,220
as every integration between these disparate tools

1386
00:53:38,220 –> 00:53:39,940
becomes a potential failure point.

1387
00:53:39,940 –> 00:53:42,940
You have to write custom code to make the identity system

1388
00:53:42,940 –> 00:53:45,660
talk to the seam and the seam talk to the ticketing system

1389
00:53:45,660 –> 00:53:46,980
and all of it breaks the moment

1390
00:53:46,980 –> 00:53:48,460
a vendor updates an API.

1391
00:53:48,460 –> 00:53:50,300
You also stop hiring cloud architects

1392
00:53:50,300 –> 00:53:51,540
and start hiring specialists

1393
00:53:51,540 –> 00:53:54,420
who only know how to run specific point solutions.

1394
00:53:54,420 –> 00:53:56,500
Training and hiring costs skyrocket

1395
00:53:56,500 –> 00:53:58,940
because your team is focused on mastering tools

1396
00:53:58,940 –> 00:54:01,380
that might be obsolete or acquired within a few years.

1397
00:54:01,380 –> 00:54:04,460
This is the true hidden cost of the best of breed strategy.

1398
00:54:04,460 –> 00:54:06,180
It isn’t the price of the software

1399
00:54:06,180 –> 00:54:09,140
but the massive overhead of managing the fragmentation.

1400
00:54:09,140 –> 00:54:11,860
A unified control plane eliminates these friction points

1401
00:54:11,860 –> 00:54:14,060
by providing one authentication mechanism,

1402
00:54:14,060 –> 00:54:16,700
one policy engine and one provable audit trail.

1403
00:54:16,700 –> 00:54:18,340
You pay more for the individual services

1404
00:54:18,340 –> 00:54:20,260
but you pay significantly less overall

1405
00:54:20,260 –> 00:54:23,180
because you aren’t funding 10 different integration projects

1406
00:54:23,180 –> 00:54:25,220
or 10 different specialist teams.

1407
00:54:25,220 –> 00:54:27,260
This is the core of the CIO’s dilemma

1408
00:54:27,260 –> 00:54:30,060
where the best of breed approach wins the technical debate

1409
00:54:30,060 –> 00:54:32,900
but the unified control plane wins the business reality.

1410
00:54:32,900 –> 00:54:34,500
Enterprises choose Microsoft

1411
00:54:34,500 –> 00:54:37,340
not because every individual tool is the market leader

1412
00:54:37,340 –> 00:54:39,700
but because the platform offers a single place

1413
00:54:39,700 –> 00:54:41,900
where policy is actually enforced.

1414
00:54:41,900 –> 00:54:44,140
AWS cannot offer this level of cohesion

1415
00:54:44,140 –> 00:54:45,940
because they do not own the identity

1416
00:54:45,940 –> 00:54:48,300
or the workflow layers of the stack.

1417
00:54:48,300 –> 00:54:51,580
Once an enterprise chooses Microsoft for that unified control

1418
00:54:51,580 –> 00:54:53,380
they inevitably extend that governance

1419
00:54:53,380 –> 00:54:55,460
across their AWS workloads

1420
00:54:55,460 –> 00:54:57,780
and the battle for the control plane is over.

1421
00:54:57,780 –> 00:55:01,460
The architectural inversion, infrastructure,

1422
00:55:01,460 –> 00:55:03,140
subordinate to governance.

1423
00:55:03,140 –> 00:55:05,100
For decades the hierarchy of enterprise IT

1424
00:55:05,100 –> 00:55:07,140
was built entirely around infrastructure.

1425
00:55:07,140 –> 00:55:10,060
You had a data center team to manage physical servers,

1426
00:55:10,060 –> 00:55:12,380
a network team to handle connectivity

1427
00:55:12,380 –> 00:55:14,620
and a storage team to oversee capacity.

1428
00:55:14,620 –> 00:55:16,980
These groups operated in rigid silos

1429
00:55:16,980 –> 00:55:18,260
reporting up different chains

1430
00:55:18,260 –> 00:55:20,740
and optimizing for completely different metrics.

1431
00:55:20,740 –> 00:55:24,180
In that world, infrastructure was the primary organizing principle

1432
00:55:24,180 –> 00:55:26,580
and every other concern was secondary.

1433
00:55:26,580 –> 00:55:29,660
Cloud computing flattened that hierarchy almost overnight.

1434
00:55:29,660 –> 00:55:31,820
Suddenly infrastructure became a commodity

1435
00:55:31,820 –> 00:55:33,020
you could buy off a shelf.

1436
00:55:33,020 –> 00:55:35,300
You no longer needed a dedicated data center team

1437
00:55:35,300 –> 00:55:36,620
because someone else owned the building

1438
00:55:36,620 –> 00:55:38,580
and you didn’t need to manage physical hardware

1439
00:55:38,580 –> 00:55:41,780
because providers handled the maintenance for you.

1440
00:55:41,780 –> 00:55:44,940
Compute, storage and networking all transformed into services

1441
00:55:44,940 –> 00:55:47,620
which meant infrastructure was no longer a scarce resource

1442
00:55:47,620 –> 00:55:49,220
or a meaningful constraint.

1443
00:55:49,220 –> 00:55:50,980
When infrastructure stops being scarce,

1444
00:55:50,980 –> 00:55:52,620
the bottleneck shifts elsewhere.

1445
00:55:52,620 –> 00:55:54,180
The new scarcity is governance.

1446
00:55:54,180 –> 00:55:55,460
The new constraint is policy.

1447
00:55:55,460 –> 00:55:57,140
The real struggle now is the ability

1448
00:55:57,140 –> 00:55:59,420
to enforce consistent rules across a messy

1449
00:55:59,420 –> 00:56:01,100
fragmented collection of platforms

1450
00:56:01,100 –> 00:56:02,900
and this is the architectural inversion.

1451
00:56:02,900 –> 00:56:06,300
While organizations used to be built around their hardware,

1452
00:56:06,300 –> 00:56:08,980
they are now being rebuilt around their governance models.

1453
00:56:08,980 –> 00:56:10,660
Infrastructure has become subordinate

1454
00:56:10,660 –> 00:56:13,140
while governance has become the primary driver of design.

1455
00:56:13,140 –> 00:56:15,540
Think about how this changes your day-to-day operations.

1456
00:56:15,540 –> 00:56:16,700
In the old model you picked

1457
00:56:16,700 –> 00:56:18,580
an infrastructure provider first

1458
00:56:18,580 –> 00:56:20,780
deciding to build on AWS or Azure

1459
00:56:20,780 –> 00:56:22,900
before you ever worried about oversight.

1460
00:56:22,900 –> 00:56:24,340
Governance was an afterthought.

1461
00:56:24,340 –> 00:56:27,220
Something you figured out only after the servers were ready running.

1462
00:56:27,220 –> 00:56:28,620
Infrastructure was the big decision

1463
00:56:28,620 –> 00:56:30,540
and governance just followed along behind it.

1464
00:56:30,540 –> 00:56:32,980
In this new model, you choose your governance framework

1465
00:56:32,980 –> 00:56:34,580
before you do anything else.

1466
00:56:34,580 –> 00:56:37,140
You decide that identity will originate in EntraID

1467
00:56:37,140 –> 00:56:39,660
that policy will be enforced through conditional access

1468
00:56:39,660 –> 00:56:41,860
and that compliance will live in purview.

1469
00:56:41,860 –> 00:56:43,620
Only after those rules are set,

1470
00:56:43,620 –> 00:56:45,980
do you figure out where the actual workloads should live.

1471
00:56:45,980 –> 00:56:48,100
Governance is now the foundational decision

1472
00:56:48,100 –> 00:56:50,220
and the infrastructure simply follows.

1473
00:56:50,220 –> 00:56:52,660
This inversion gives Microsoft a massive home field advantage

1474
00:56:52,660 –> 00:56:55,660
because they built their ecosystem around governance from day one.

1475
00:56:55,660 –> 00:56:58,460
They prioritized identity, policy enforcement,

1476
00:56:58,460 –> 00:57:00,980
and compliance frameworks long before they ever worried

1477
00:57:00,980 –> 00:57:02,620
about the underlying hardware.

1478
00:57:02,620 –> 00:57:04,180
AWS took the opposite path

1479
00:57:04,180 –> 00:57:06,180
by building world-class infrastructure first

1480
00:57:06,180 –> 00:57:07,900
and trying to bolt on governance later.

1481
00:57:07,900 –> 00:57:11,140
As a result, AWS governance still feels like a tool

1482
00:57:11,140 –> 00:57:13,340
for managing servers rather than a system

1483
00:57:13,340 –> 00:57:15,220
for managing an entire enterprise.

1484
00:57:15,220 –> 00:57:17,220
When infrastructure is subordinate to governance,

1485
00:57:17,220 –> 00:57:19,740
the provider who owns the rules wins the contract.

1486
00:57:19,740 –> 00:57:23,180
AWS might still be the best infrastructure provider on the planet,

1487
00:57:23,180 –> 00:57:25,220
offering more services, more regions

1488
00:57:25,220 –> 00:57:28,380
and more mature optimization tools than anyone else.

1489
00:57:28,380 –> 00:57:29,700
But here is the uncomfortable truth.

1490
00:57:29,700 –> 00:57:32,260
Enterprises aren’t optimizing for infrastructure anymore.

1491
00:57:32,260 –> 00:57:33,740
They are optimizing for control.

1492
00:57:33,740 –> 00:57:35,100
This isn’t a temporary trend

1493
00:57:35,100 –> 00:57:36,900
or a passing phase in the industry.

1494
00:57:36,900 –> 00:57:38,780
It is an architectural shift that reflects

1495
00:57:38,780 –> 00:57:40,980
what modern businesses actually need to survive.

1496
00:57:40,980 –> 00:57:43,340
They need to enforce policy consistently

1497
00:57:43,340 –> 00:57:45,020
across every single platform they use

1498
00:57:45,020 –> 00:57:47,540
and they need to prove that compliance to regulators

1499
00:57:47,540 –> 00:57:49,420
with audit trails that cannot be faked.

1500
00:57:49,420 –> 00:57:51,500
These are governance problems, not hardware problems.

1501
00:57:51,500 –> 00:57:54,940
AWS can solve infrastructure problems with brilliant efficiency,

1502
00:57:54,940 –> 00:57:56,260
but they struggle with governance

1503
00:57:56,260 –> 00:57:59,060
because that layer requires owning the identity of the user.

1504
00:57:59,060 –> 00:58:01,260
AWS does not own the identity layer.

1505
00:58:01,260 –> 00:58:02,260
Microsoft does.

1506
00:58:02,260 –> 00:58:04,540
This architectural inversion will only accelerate

1507
00:58:04,540 –> 00:58:06,500
as we move toward 2027.

1508
00:58:06,500 –> 00:58:09,140
As nearly every enterprise adopts a multi-cloud strategy

1509
00:58:09,140 –> 00:58:11,500
and identity replaces the network as the new perimeter,

1510
00:58:11,500 –> 00:58:14,860
governance becomes the only thing that stays constant.

1511
00:58:14,860 –> 00:58:17,020
Infrastructure is becoming interchangeable

1512
00:58:17,020 –> 00:58:19,820
while the control plane is becoming the only strategic asset

1513
00:58:19,820 –> 00:58:20,700
that matters.

1514
00:58:20,700 –> 00:58:23,020
The organization of the future will be built entirely

1515
00:58:23,020 –> 00:58:24,340
around this governance layer.

1516
00:58:24,340 –> 00:58:27,100
You will choose your framework, likely Microsoft,

1517
00:58:27,100 –> 00:58:29,100
and then treat infrastructure providers

1518
00:58:29,100 –> 00:58:30,620
like plug and play components.

1519
00:58:30,620 –> 00:58:33,700
You might run some workloads on AWS, someone Azure

1520
00:58:33,700 –> 00:58:36,620
and keep others on premises, but your policy will be unified.

1521
00:58:36,620 –> 00:58:38,140
Your identity will be centralized

1522
00:58:38,140 –> 00:58:40,060
and your audit trails will be complete.

1523
00:58:40,060 –> 00:58:42,620
That is the reality of the architectural inversion.

1524
00:58:42,620 –> 00:58:44,340
The control plane belongs to Microsoft,

1525
00:58:44,340 –> 00:58:45,780
not because their servers are better,

1526
00:58:45,780 –> 00:58:48,060
but because the servers themselves aren’t the point anymore.

1527
00:58:48,060 –> 00:58:49,140
Governance is what matters,

1528
00:58:49,140 –> 00:58:51,220
and Microsoft owns the engine that runs it.

1529
00:58:51,220 –> 00:58:53,860
Still manning AWS, why they still matter.

1530
00:58:53,860 –> 00:58:57,140
AWS is not losing this fight, and I want to be very clear about that.

1531
00:58:57,140 –> 00:58:58,740
What we are seeing is not a defeat,

1532
00:58:58,740 –> 00:59:02,340
but a repositioning of where AWS fits into the stack.

1533
00:59:02,340 –> 00:59:03,980
That distinction matters.

1534
00:59:03,980 –> 00:59:07,580
AWS remains the undisputed heavyweight champion of infrastructure.

1535
00:59:07,580 –> 00:59:09,340
That isn’t a controversial opinion.

1536
00:59:09,340 –> 00:59:12,980
It is a measurable fact backed by 15 years of relentless expansion.

1537
00:59:12,980 –> 00:59:16,020
Their advantages aren’t just theoretical ideas on a slide deck.

1538
00:59:16,020 –> 00:59:19,220
They are operational realities that companies rely on every single day.

1539
00:59:19,220 –> 00:59:21,180
And if you look at raw service breadth,

1540
00:59:21,180 –> 00:59:24,740
AWS is still in a league of its own with over 230 services.

1541
00:59:24,740 –> 00:59:27,140
They offer everything from basic compute and storage

1542
00:59:27,140 –> 00:59:30,340
to quantum computing and specialized machine learning tools.

1543
00:59:30,340 –> 00:59:31,300
This wasn’t an accident,

1544
00:59:31,300 –> 00:59:34,820
but the result of a decade and a half of building an ecosystem so deep

1545
00:59:34,820 –> 00:59:36,580
that if you can imagine a cloud service,

1546
00:59:36,580 –> 00:59:40,180
AWS probably already has a mature version of it.

1547
00:59:40,180 –> 00:59:43,380
Their global footprint is equally dominant spanning 33 regions

1548
00:59:43,380 –> 00:59:45,140
and over 100 availability zones.

1549
00:59:45,140 –> 00:59:47,300
If your application is sensitive to latency

1550
00:59:47,300 –> 00:59:50,900
or you have to meet strict data residency laws in obscure locations,

1551
00:59:50,900 –> 00:59:54,020
AWS is usually the only provider that can actually deliver.

1552
00:59:54,020 –> 00:59:57,140
That kind of reach is incredibly valuable for global enterprises.

1553
00:59:57,140 –> 01:00:00,900
Beyond the hardware, AWS dominates in the maturity of its DevOps tooling.

1554
01:00:00,900 –> 01:00:03,780
Organizations have spent years and millions of dollars

1555
01:00:03,780 –> 01:00:05,940
building automation on top of cloud formation,

1556
01:00:05,940 –> 01:00:08,020
systems manager and code to deploy.

1557
01:00:08,020 –> 01:00:12,020
They have teams of experts who understand the AWS way of doing things down to the bone.

1558
01:00:12,020 –> 01:00:14,660
You don’t just throw away that level of institutional knowledge

1559
01:00:14,660 –> 01:00:18,260
and technical investment because a competitor has a better identity plate.

1560
01:00:18,260 –> 01:00:20,420
They also lead the way in cost optimization.

1561
01:00:20,420 –> 01:00:23,860
Between savings plans, spot instances and the compute optimizer,

1562
01:00:23,860 –> 01:00:26,020
AWS gives you the most granular tools

1563
01:00:26,020 –> 01:00:28,420
to squeeze every bit of value out of your spend.

1564
01:00:28,420 –> 01:00:30,260
For a company running at massive scale,

1565
01:00:30,260 –> 01:00:32,820
the visibility and efficiency AWS provides

1566
01:00:32,820 –> 01:00:34,980
can save them tens of millions of dollars a year.

1567
01:00:34,980 –> 01:00:39,700
Even in the AI race, AWS is holding its ground by focusing on the heavy lifting.

1568
01:00:39,700 –> 01:00:43,620
With bedrock, sage maker and their own custom training and inferential chips,

1569
01:00:43,620 –> 01:00:46,580
they provide the raw power for companies that want to build

1570
01:00:46,580 –> 01:00:48,980
and fine tune their own proprietary models.

1571
01:00:48,980 –> 01:00:52,020
They are providing the flexibility that developers crave.

1572
01:00:52,020 –> 01:00:56,180
AWS will continue to dominate these specific areas for the foreseeable future.

1573
01:00:56,180 –> 01:00:58,980
They will likely continue to run more workloads than anyone else

1574
01:00:58,980 –> 01:01:01,540
and maintain the most sophisticated catalog of tools.

1575
01:01:01,540 –> 01:01:03,220
These strengths aren’t going anywhere,

1576
01:01:03,220 –> 01:01:05,220
but the repositioning is happening nonetheless.

1577
01:01:05,220 –> 01:01:10,420
AWS is moving from being the cloud to being the infrastructure layer that Microsoft governs.

1578
01:01:10,420 –> 01:01:14,180
This isn’t a failure, it’s just a different way of being dominant.

1579
01:01:14,180 –> 01:01:15,620
Look at how this works in practice.

1580
01:01:15,620 –> 01:01:19,380
A company might run 80% of its actual compute power on AWS,

1581
01:01:19,380 –> 01:01:21,380
which is a massive win for Amazon’s bottom line.

1582
01:01:21,380 –> 01:01:23,940
But that same company uses EntraID for identity,

1583
01:01:23,940 –> 01:01:26,740
conditional access for security and purview for compliance.

1584
01:01:26,740 –> 01:01:28,580
Their audit logs sit in Sentinel

1585
01:01:28,580 –> 01:01:31,060
and their employees use co-pilot for daily tasks.

1586
01:01:31,060 –> 01:01:34,980
In this scenario, the control plane is Microsoft, but the engine room is AWS.

1587
01:01:34,980 –> 01:01:36,420
AWS isn’t losing that deal.

1588
01:01:36,420 –> 01:01:40,420
They are winning the workload, providing the storage and running the databases.

1589
01:01:40,420 –> 01:01:43,700
They are the muscle of the operation, even if they aren’t the brain.

1590
01:01:43,700 –> 01:01:47,060
They are providing the power while Microsoft provides the permission.

1591
01:01:47,060 –> 01:01:50,660
This is a perfectly sustainable position for AWS to hold for decades.

1592
01:01:50,660 –> 01:01:53,860
They can continue to innovate in silicon, optimize for performance

1593
01:01:53,860 –> 01:01:57,700
and dominate in raw volume without ever needing to own the identity layer.

1594
01:01:57,700 –> 01:02:02,260
They don’t have to compete in every single category to be a vital part of the enterprise stack.

1595
01:02:02,260 –> 01:02:05,540
The real question is whether AWS is actually comfortable with this arrangement.

1596
01:02:05,540 –> 01:02:09,060
We have to wonder if they are okay being the utility layer

1597
01:02:09,060 –> 01:02:11,540
that sits underneath another vendor’s control plane.

1598
01:02:11,540 –> 01:02:14,180
So far, their response has been to build their own governance tools

1599
01:02:14,180 –> 01:02:17,780
like control tower and guard duty, which are excellent products in their own right.

1600
01:02:17,780 –> 01:02:20,660
The problem is that those tools are AWS-specific.

1601
01:02:20,660 –> 01:02:24,180
They don’t reach out and manage your Azure or on-premises environments,

1602
01:02:24,180 –> 01:02:27,140
which means they don’t actually abstract the infrastructure layer.

1603
01:02:27,140 –> 01:02:30,820
They aren’t designed to compete with Microsoft’s cross-platform governance model

1604
01:02:30,820 –> 01:02:33,940
because they are still fundamentally built to sell more AWS.

1605
01:02:33,940 –> 01:02:36,900
For AWS to truly challenge Microsoft’s control,

1606
01:02:36,900 –> 01:02:40,420
they would have to fundamentally rethink their entire business model.

1607
01:02:40,420 –> 01:02:43,060
They would have to stop being an infrastructure first company

1608
01:02:43,060 –> 01:02:44,660
and become a governance first company.

1609
01:02:44,660 –> 01:02:49,060
They would need a policy engine that treats AWS, Azure, and Google Cloud as equals.

1610
01:02:49,060 –> 01:02:52,500
Nothing they’ve done so far suggests they have any interest in doing that.

1611
01:02:52,500 –> 01:02:54,820
So the future looks like a division of labor.

1612
01:02:54,820 –> 01:02:58,020
AWS will remain the best place to run a workload,

1613
01:02:58,020 –> 01:03:00,900
dominating in compute, storage, and database maturity.

1614
01:03:00,900 –> 01:03:04,340
But they will do so while operating underneath Microsoft’s control plane.

1615
01:03:04,340 –> 01:03:07,140
It’s a world where AWS wins at the hardware level

1616
01:03:07,140 –> 01:03:09,460
and Microsoft wins at the governance level

1617
01:03:09,460 –> 01:03:10,980
that isn’t a loss for either side.

1618
01:03:10,980 –> 01:03:12,820
It’s just the new architectural reality.

1619
01:03:12,820 –> 01:03:16,340
The hybrid operating model, the enterprise default.

1620
01:03:16,340 –> 01:03:20,260
By 2027, the hybrid operating model will no longer be an aspirational goal

1621
01:03:20,260 –> 01:03:23,700
or a messy exception because it is becoming the enterprise default.

1622
01:03:23,700 –> 01:03:26,900
This is not a speculative prediction about what organizations should do,

1623
01:03:26,900 –> 01:03:29,860
but a statement about what they will actually be doing to survive.

1624
01:03:29,860 –> 01:03:33,460
To understand this shift, we have to look at how the model functions operationally,

1625
01:03:33,460 –> 01:03:37,380
which is quite different from the traditional marketing definition of hybrid cloud.

1626
01:03:37,380 –> 01:03:39,940
Identity now originates directly in Microsoft,

1627
01:03:39,940 –> 01:03:45,540
and rather than being synchronized from on-premises or federated from some aging legacy system,

1628
01:03:45,540 –> 01:03:48,020
Entra ID acts as the absolute source of truth

1629
01:03:48,020 –> 01:03:52,340
where users, groups, and roles exist natively in the cloud from the moment they are created.

1630
01:03:52,340 –> 01:03:56,340
This makes identity the centralized foundation of the entire architecture.

1631
01:03:56,340 –> 01:03:58,340
Policy enforcement follows a similar pattern

1632
01:03:58,340 –> 01:04:00,180
by moving through Azure Arc and Defender

1633
01:04:00,180 –> 01:04:02,020
to reach every corner of the environment.

1634
01:04:02,020 –> 01:04:04,980
On-premises servers, AWS, EC2 instances,

1635
01:04:04,980 –> 01:04:07,860
and Google Cloud VMs all run the Arc agent,

1636
01:04:07,860 –> 01:04:12,100
which allows them to appear in the Azure portal as standard managed resources.

1637
01:04:12,100 –> 01:04:13,860
This creates a single policy framework

1638
01:04:13,860 –> 01:04:16,820
where Azure Policy and Conditional Access apply to every asset,

1639
01:04:16,820 –> 01:04:20,100
regardless of which infrastructure provider is actually hosting the hardware.

1640
01:04:20,740 –> 01:04:22,900
Infrastructure has become interchangeable,

1641
01:04:22,900 –> 01:04:26,340
allowing you to run workloads on AWS for compute pricing,

1642
01:04:26,340 –> 01:04:28,900
or Azure for M365 integration,

1643
01:04:28,900 –> 01:04:32,260
while keeping latency sensitive tasks on-premises.

1644
01:04:32,260 –> 01:04:35,140
While the underlying infrastructure remains heterogeneous,

1645
01:04:35,140 –> 01:04:37,300
the governance layer is entirely unified.

1646
01:04:37,300 –> 01:04:40,500
Unified governance means you operate with one identity system,

1647
01:04:40,500 –> 01:04:44,740
one policy engine, and one-ordered trail across every cloud provider you use.

1648
01:04:44,740 –> 01:04:46,340
Pervue classifies data everywhere,

1649
01:04:46,340 –> 01:04:50,340
while DLP and Sentinel monitor access and prevent leaks without ever caring

1650
01:04:50,340 –> 01:04:52,340
about traditional infrastructure boundaries.

1651
01:04:52,340 –> 01:04:54,820
Governance is no longer about where the data lives,

1652
01:04:54,820 –> 01:04:56,820
but about how the policy is enforced.

1653
01:04:56,820 –> 01:05:00,660
This model addresses the most painful problems facing the modern enterprise

1654
01:05:00,660 –> 01:05:02,900
by ensuring compliance is never fragmented.

1655
01:05:02,900 –> 01:05:07,220
Instead of managing separate audit trails for Azure, AWS, and local data centers,

1656
01:05:07,220 –> 01:05:10,740
you maintain a single source of truth that makes compliance provable to regulators.

1657
01:05:10,740 –> 01:05:15,140
Costs are optimized because you are no longer locked into a single provider,

1658
01:05:15,140 –> 01:05:19,620
giving you the freedom to shift workloads based on current pricing or performance needs.

1659
01:05:19,620 –> 01:05:22,260
You can keep predictable workloads on hardware you own

1660
01:05:22,260 –> 01:05:26,900
while bursting elastic tasks to whichever cloud offers the best rate at that specific moment.

1661
01:05:26,900 –> 01:05:29,140
Security shifts to an identity first model,

1662
01:05:29,140 –> 01:05:32,740
where the network perimeter is replaced by EntraID and conditional access.

1663
01:05:32,740 –> 01:05:35,940
Every access decision is evaluated based on context,

1664
01:05:35,940 –> 01:05:37,940
device compliance, and risk signals,

1665
01:05:37,940 –> 01:05:39,940
which effectively prevents lateral movement

1666
01:05:39,940 –> 01:05:43,140
by ensuring every single action is logged and auditable.

1667
01:05:43,140 –> 01:05:46,180
Agility is preserved because you can swap infrastructure providers

1668
01:05:46,180 –> 01:05:50,740
or migrate workloads between clouds without ever re-architecting your identity system

1669
01:05:50,740 –> 01:05:52,580
or changing your policy framework.

1670
01:05:52,580 –> 01:05:55,300
Infrastructure becomes a variable that you can change at will

1671
01:05:55,300 –> 01:05:57,140
while governance remains the only constant.

1672
01:05:57,140 –> 01:05:59,380
AWS cannot provide this level of abstraction

1673
01:05:59,380 –> 01:06:01,220
because they do not own the governance layer,

1674
01:06:01,220 –> 01:06:06,020
whereas Microsoft owns the identity, policy, and compliance tools required to unify the stack.

1675
01:06:06,020 –> 01:06:08,100
By abstracting the infrastructure layer,

1676
01:06:08,100 –> 01:06:10,260
Microsoft has replaced it with a control plane

1677
01:06:10,260 –> 01:06:12,500
that enterprises find functionally necessary.

1678
01:06:12,500 –> 01:06:14,500
This is the default reality for 2027,

1679
01:06:14,500 –> 01:06:17,300
not because Microsoft is forcing the hand of the enterprise

1680
01:06:17,300 –> 01:06:21,460
but because the model solves the fundamental problems of cost, security, and compliance.

1681
01:06:21,460 –> 01:06:25,940
Once an organization unifies its governance across a hybrid footprint,

1682
01:06:25,940 –> 01:06:28,340
the cost of switching away becomes astronomical.

1683
01:06:28,340 –> 01:06:32,020
Removing EntraID or Azure Arc would mean dismantling the entire security

1684
01:06:32,020 –> 01:06:33,460
and compliance engine of the company.

1685
01:06:33,460 –> 01:06:37,380
The hybrid operating model locks enterprises into Microsoft’s control plane

1686
01:06:37,380 –> 01:06:38,660
through functional necessity,

1687
01:06:38,660 –> 01:06:41,780
effectively making it the operating system for the modern business.

1688
01:06:42,420 –> 01:06:43,620
The prediction.

1689
01:06:43,620 –> 01:06:46,660
Enterprise operating reality by 2028.

1690
01:06:46,660 –> 01:06:50,580
By 2028, the cloud market will be completely reorganized

1691
01:06:50,580 –> 01:06:53,060
around control planes rather than infrastructure providers.

1692
01:06:53,060 –> 01:06:55,780
This shift is inevitable because of the architectural forces

1693
01:06:55,780 –> 01:06:57,860
currently in motion across the industry.

1694
01:06:57,860 –> 01:07:00,980
AWS will likely still dominate the world of cloud compute

1695
01:07:00,980 –> 01:07:04,340
by running more global workloads and offering a broader service catalog

1696
01:07:04,340 –> 01:07:05,940
than any of its competitors.

1697
01:07:05,940 –> 01:07:09,540
For organizations building cloud native applications from the ground up,

1698
01:07:09,540 –> 01:07:12,980
AWS will remain the primary choice due to a structural dominance

1699
01:07:12,980 –> 01:07:14,660
that is incredibly durable.

1700
01:07:14,660 –> 01:07:18,660
Microsoft, however, will define the actual operating reality for the enterprise

1701
01:07:18,660 –> 01:07:21,540
which represents a much more fundamental type of dominance.

1702
01:07:21,540 –> 01:07:25,060
By 2028, CIOs will measure their success through governance metrics

1703
01:07:25,060 –> 01:07:27,060
instead of focusing on infrastructure statistics.

1704
01:07:27,060 –> 01:07:29,780
They will stop asking how many workloads are running on AWS

1705
01:07:29,780 –> 01:07:32,100
and start asking what percentage of access decisions

1706
01:07:32,100 –> 01:07:34,340
are being evaluated by conditional access.

1707
01:07:34,340 –> 01:07:36,820
The primary concern will shift from Azure compute spend

1708
01:07:36,820 –> 01:07:40,100
to the number of data classification policies being enforced through PerView.

1709
01:07:40,100 –> 01:07:42,100
Governance becomes the true measure of success

1710
01:07:42,100 –> 01:07:44,500
while infrastructure is relegated to the substrate.

1711
01:07:44,500 –> 01:07:47,780
Compliance will move from a manual process to an automated one

1712
01:07:47,780 –> 01:07:51,380
where organizations no longer spend months preparing for a single audit.

1713
01:07:51,380 –> 01:07:53,620
Continuous compliance reports will be the norm

1714
01:07:53,620 –> 01:07:55,860
with PerView classifying data in real time

1715
01:07:55,860 –> 01:07:58,740
and DLP preventing violations before they can even happen.

1716
01:07:58,740 –> 01:08:01,060
Regulators will simply audit a live dashboard

1717
01:08:01,060 –> 01:08:02,900
to see policy enforcement in action,

1718
01:08:02,900 –> 01:08:06,260
making compliance a provable fact rather than a theoretical goal.

1719
01:08:06,260 –> 01:08:10,180
Identity will fully replace the network as the primary security perimeter.

1720
01:08:10,180 –> 01:08:12,980
Organizations will stop trying to defend network boundaries

1721
01:08:12,980 –> 01:08:14,980
and focus entirely on the identity boundary

1722
01:08:14,980 –> 01:08:18,180
where every user and device is evaluated by conditional access.

1723
01:08:18,180 –> 01:08:20,820
When every access request is authenticated through EntraID

1724
01:08:20,820 –> 01:08:22,820
and checked for compliance, the underlying network

1725
01:08:22,820 –> 01:08:24,740
becomes architecturally irrelevant.

1726
01:08:24,740 –> 01:08:28,260
Policy will be treated as code rather than a collection of word documents

1727
01:08:28,260 –> 01:08:29,460
or manual processes.

1728
01:08:29,460 –> 01:08:31,700
Azure policy will enforce rules that propagate

1729
01:08:31,700 –> 01:08:33,780
and remediate violations automatically,

1730
01:08:33,780 –> 01:08:36,100
allowing policy to become version controlled,

1731
01:08:36,100 –> 01:08:39,940
auditable and part of the standard infrastructure as code workflow.

1732
01:08:39,940 –> 01:08:43,700
Hybrid setups will be the default for 90% of organizations,

1733
01:08:43,700 –> 01:08:46,260
making single cloud environments a rare exception.

1734
01:08:46,260 –> 01:08:49,140
The question will no longer be whether an organization should be hybrid

1735
01:08:49,140 –> 01:08:52,180
but rather which infrastructure providers can best fit

1736
01:08:52,180 –> 01:08:54,660
within their existing hybrid governance model.

1737
01:08:54,660 –> 01:08:56,660
AWS will adapt to this new reality

1738
01:08:56,660 –> 01:08:58,580
by deepening its integration with Microsoft

1739
01:08:58,580 –> 01:09:00,660
to offer better federation with EntraID

1740
01:09:00,660 –> 01:09:02,820
and stronger support for defender for cloud.

1741
01:09:02,820 –> 01:09:04,820
It will become easier to project Azure governance

1742
01:09:04,820 –> 01:09:08,420
onto AWS infrastructure as the two companies become more complementary.

1743
01:09:08,420 –> 01:09:10,980
AWS will remain the preferred infrastructure layer

1744
01:09:10,980 –> 01:09:13,940
while Microsoft solidifies its position as the governance layer.

1745
01:09:13,940 –> 01:09:16,580
The control plane will remain firmly in Microsoft’s hands

1746
01:09:16,580 –> 01:09:19,220
because AWS is not building a competing framework

1747
01:09:19,220 –> 01:09:21,300
that can span across multiple clouds

1748
01:09:21,300 –> 01:09:23,220
and on-premises environments.

1749
01:09:23,220 –> 01:09:25,300
AWS remains an infrastructure first company

1750
01:09:25,300 –> 01:09:28,100
while Microsoft has pivoted to a governance first strategy

1751
01:09:28,100 –> 01:09:30,420
and that architectural gap is not going to close.

1752
01:09:30,420 –> 01:09:34,580
By 2028 enterprises will see this arrangement as the optimal way to run a business.

1753
01:09:34,580 –> 01:09:37,380
They might run 70% of their compute on AWS

1754
01:09:37,380 –> 01:09:40,820
while managing every bit of it through the Microsoft control plane.

1755
01:09:40,820 –> 01:09:42,500
There is no contradiction in this setup

1756
01:09:42,500 –> 01:09:45,060
because it allows a company to use the best infrastructure

1757
01:09:45,060 –> 01:09:46,900
alongside the best governance tools.

1758
01:09:46,900 –> 01:09:49,300
This is the enterprise reality of 2028

1759
01:09:49,300 –> 01:09:51,620
where the conversation shifts from which cloud

1760
01:09:51,620 –> 01:09:53,860
to how do we govern across all clouds.

1761
01:09:53,860 –> 01:09:56,260
AWS will still be winning the infrastructure race

1762
01:09:56,260 –> 01:09:58,260
but Microsoft will be the one defining

1763
01:09:58,260 –> 01:09:59,860
what winning actually looks like.

1764
01:09:59,860 –> 01:10:01,620
Conclusion.

1765
01:10:01,620 –> 01:10:03,620
The control plane is the battleground.

1766
01:10:03,620 –> 01:10:05,780
AWS won the infrastructure war

1767
01:10:05,780 –> 01:10:07,940
and that is now a matter of historical record.

1768
01:10:07,940 –> 01:10:11,220
They dominate cloud compute by running more global workloads

1769
01:10:11,220 –> 01:10:12,660
than any competitor

1770
01:10:12,660 –> 01:10:16,660
and their lead in services and regions remains undisputed.

1771
01:10:16,660 –> 01:10:17,860
AWS won.

1772
01:10:17,860 –> 01:10:21,060
Microsoft is winning the control plane war

1773
01:10:21,060 –> 01:10:23,860
which is the battle currently deciding the fate of the enterprise.

1774
01:10:23,860 –> 01:10:26,260
This is where identity, policy and governance live

1775
01:10:26,260 –> 01:10:28,500
and it is exactly where Microsoft’s gravity

1776
01:10:28,500 –> 01:10:30,100
pulls the largest organizations.

1777
01:10:30,100 –> 01:10:32,900
In the enterprise the control plane is the only thing that matters

1778
01:10:32,900 –> 01:10:34,980
because infrastructure has become a commodity

1779
01:10:34,980 –> 01:10:36,660
while governance remains scarce.

1780
01:10:36,660 –> 01:10:39,540
By 2027, nine out of ten organizations

1781
01:10:39,540 –> 01:10:41,140
will operate in hybrid environments

1782
01:10:41,140 –> 01:10:44,100
where unified governance always beats distributed services.

1783
01:10:44,100 –> 01:10:45,700
Microsoft owns governance

1784
01:10:45,700 –> 01:10:47,620
and while AWS owns infrastructure,

1785
01:10:47,620 –> 01:10:50,740
the enterprise will always choose the path of unified control.

1786
01:10:50,740 –> 01:10:53,220
Drop a comment if you think AWS can actually mount

1787
01:10:53,220 –> 01:10:54,740
a control plane comeback.

1788
01:10:54,740 –> 01:10:56,340
Subscribe for the architectural takes

1789
01:10:56,340 –> 01:10:58,100
that nobody else is willing to give you.



Source link

0 Votes: 0 Upvotes, 0 Downvotes (0 Points)

Leave a reply

Follow
Search
Loading

Signing-in 3 seconds...

Signing-up 3 seconds...

Discover more from 365 Community Online

Subscribe now to keep reading and get access to the full archive.

Continue reading