Observability and Monitoring Governance (Part 2 of 4)
“How did we fail to monitor xyz prior to this incident?" “We should monitor everything" “Are we vetting applications prior to deployment, including security apps that may adversely affect application performance and responsiveness?”