{"id":43038,"date":"2021-01-27T00:00:00","date_gmt":"2021-01-27T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/a\/what-is-operational-excellence.html"},"modified":"2021-01-27T00:00:00","modified_gmt":"2021-01-27T00:00:00","slug":"what-is-operational-excellence-and-why-should-i-care-cloud-advocate","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/","title":{"rendered":"What is Operational Excellence and Why Should I Care? Cloud Advocate"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/a\/what-is-operational-excellence-and-why-should-i-care\/operational-excellence.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/a\/what-is-operational-excellence-and-why-should-i-care\/operational-excellence.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A few years ago during an AWS re:Invent conference, Amazon Web Services (AWS) updated their <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/20\/l\/well-architected-framework-guide.html\" target=\"_blank\" rel=\"noopener\">Well-Architected Framework<\/a>, introducing a new pillar to the family: <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/20\/l\/achieve-operational-excellence-in-cloud-workload.html\" target=\"_blank\" rel=\"noopener\">Operational Excellence<\/a>. In this article, we explore what Operation Excellence looks like in AWS and Azure architecture and how to start meeting industry best practices.<\/p>\n<p><span class=\"body-subhead-title\">Why Was the Operational Excellence Pillar Introduced?<\/span><\/p>\n<p>A large contributing factor to AWS being a leader in the extremely competitive cloud market is their fantastic dedication to being customer centric. AWS constantly evolves their product suite and best practices in line with customer requests, catering to emerging trends and new security threats. While this provides customers with the very best services and cutting-edge technology, it represents a significant challenge for enterprise and anyone leveraging the cloud for critical production workloads.<\/p>\n<p>Operational Excellence was introduced in response to the market wanting more guidelines and best practices for ensuring their infrastructure is continually running at the top of its game.<\/p>\n<p><a href=\"https:\/\/wa.aws.amazon.com\/wat.pillar.operationalExcellence.en.html\" target=\"_blank\" rel=\"noopener\">AWS Operational Excellence definition<\/a>: Adhering to the <b>Operational Excellence<\/b> pillar includes being able to run and monitor systems to deliver business value and continually improve supporting processes and procedures.<\/p>\n<p><span class=\"body-subhead-title\">How to Implement Operational Excellence in Your AWS &amp; Azure Environments<\/span><\/p>\n<p>Frankly, there\u2019s no quick and easy solution, and it may seem quite daunting. However, if you look at Operational Excellence as a journey and take one step at a time, you\u2019ll certainly be on the right path to achieving it. Remember, Operational Excellence is a combination of processes and continuous improvement to ensure your AWS &amp; Azure infrastructure remains secure, reliable, efficient and cost effective.<\/p>\n<p><b>Operational Excellence Implementation Tips<\/b><\/p>\n<p>Here are a few starting points to keep in mind when taking on the challenge of achieving Operational Excellence:<\/p>\n<p><b>1) Automate, automate, and automate some more!<\/b><\/p>\n<p>Don\u2019t rely on humans to perform critical tasks\u2014even the most experienced, reliable staff make mistakes. Automation provides you with the peace of mind that critical tasks are performed exactly the same every time. Automation also ensures you get the most out of your AWS infrastructure by utilizing features like auto-scaling and self-healing. Far too often I speak to large AWS customers that are either not experiencing the cost savings usually associated with cloud adoption or are struggling to leverage the agility of the cloud, due to lack of automation. For those early in their cloud adoption, don\u2019t endure the struggle\u2014it\u2019s much easier to automate from day one than retrospectively once you are \u201call in\u201d.<\/p>\n<p><b>2) Leverage tools where possible<\/b><\/p>\n<p>Enthusiastic, reliable, qualified AWS professionals are hard to find, not to mention expensive! Don\u2019t waste those resources doing tedious and repetitive tasks that can be easily (and cheaply) covered by an AWS certified technology product. Free your resources to focus on the more important tasks, such as automating everything. Plus, since AWS has implemented a rigorous process that partners need to pass before they become a certified technology partner, all you need to do is look for that <a href=\"https:\/\/www.cloudconformity.com\/\" target=\"_blank\" rel=\"noopener\">AWS Partner<\/a> logo. With that stamp of approval, you can be sure that you\u2019re getting a quality product that is already being used by other AWS customers.<\/p>\n<p><b>3) Security should not be an afterthought<\/b><\/p>\n<p>Too many times organizations are so focused on demonstrating the benefits of the cloud, rapidly migrating from their on-premises infrastructure without baking security in from the start. We all know the pain associated with change management and trying to retrospectively implement processes and tools (let\u2019s face it, more work!), so make a commitment to keep security front and center.<\/p>\n<p><b>4) Constantly evolve and make the most of new services<\/b><\/p>\n<p>AWS constantly evolves its product suite. Anyone that\u2019s been lucky enough to attend AWS re:Invent understands just how much AWS improves their offering each year. Even if your accounts were completely optimized, reliable, efficient, and secure two weeks ago, there\u2019s no guarantee they are now! Review your infrastructure regularly and make a point to reassess your AWS products and services to see what else would benefit your architecture\u2014there is always something.<\/p>\n<p><span class=\"body-subhead-title\">Final Thoughts on Cloud Operational Excellence<\/span><\/p>\n<p>To achieve Operational Excellence, you need to remain vigilant and open to alternative approaches. Ensure you maintain oversight of what\u2019s happening in your public cloud accounts, as well as who has access to your infrastructure. You may also need to re-architect as best practices change and new services are released. If you\u2019re using a third-party technology product, keep them honest! Make sure they are constantly improving their offering and keeping up with Cloud Service Provider best practices. With the partner community is expanding every day, if your current provider isn\u2019t evolving as quickly as AWS, you can be sure there\u2019s another one that is.<\/p>\n<p>Trend Micro <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/cloud-one-conformity.html\" target=\"_blank\" rel=\"noopener\">Cloud One\u2122 \u2013 Conformity<\/a> provides continuous security, compliance and governance of your public could to ensure you are following industry best practices and compliance standards. With the design principles of the Well-Architected Framework rooted in the platform, your critical workloads are under constant monitoring to provide you with full visibility. Conformity <a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/aws\/\" target=\"_blank\" rel=\"noopener\">runs over 750+<\/a> public cloud infrastructure configuration checks against your AWS and Microsoft\u00ae Azure\u00ae accounts, alerting you of any rule violations as you decide necessary. Check your adherence to all of the pillars within the Well-Architected Framework with a <a href=\"https:\/\/cloudone.trendmicro.com\/SignUp.screen?\" target=\"_blank\" rel=\"noopener\">30-day trial of Conformity<\/a>, and experience full access to the solution, including the APIs, real-time monitoring and <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/20\/h\/automate-compliance-aws-well-architected-framework.html\">auto-remediation<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/a\/what-is-operational-excellence.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is an introduction to operational excellence, which is a critical part to building a well-architected framework that has built in security, automation, evolution, and utilizes tools to facilitate cloud management. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43039,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9503,9505,9502,9504,9572,9571,9500],"class_list":["post-43038","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-article","tag-trend-micro-devops-aws","tag-trend-micro-devops-azure","tag-trend-micro-devops-compliance","tag-trend-micro-devops-conformity","tag-trend-micro-devops-how-to","tag-trend-micro-devops-workload-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Operational Excellence and Why Should I Care? Cloud Advocate 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Operational Excellence and Why Should I Care? Cloud Advocate 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-27T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1282\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What is Operational Excellence and Why Should I Care? Cloud Advocate\",\"datePublished\":\"2021-01-27T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/\"},\"wordCount\":910,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg\",\"keywords\":[\"Trend Micro DevOps : Article\",\"Trend Micro DevOps : AWS\",\"Trend Micro DevOps : Azure\",\"Trend Micro DevOps : Compliance\",\"Trend Micro DevOps : Conformity\",\"Trend Micro DevOps : How To\",\"Trend Micro DevOps : Workload Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/\",\"name\":\"What is Operational Excellence and Why Should I Care? Cloud Advocate 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg\",\"datePublished\":\"2021-01-27T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg\",\"width\":1282,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : Article\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-devops-article\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is Operational Excellence and Why Should I Care? Cloud Advocate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Operational Excellence and Why Should I Care? Cloud Advocate 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/","og_locale":"en_US","og_type":"article","og_title":"What is Operational Excellence and Why Should I Care? Cloud Advocate 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-27T00:00:00+00:00","og_image":[{"width":1282,"height":700,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What is Operational Excellence and Why Should I Care? Cloud Advocate","datePublished":"2021-01-27T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/"},"wordCount":910,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg","keywords":["Trend Micro DevOps : Article","Trend Micro DevOps : AWS","Trend Micro DevOps : Azure","Trend Micro DevOps : Compliance","Trend Micro DevOps : Conformity","Trend Micro DevOps : How To","Trend Micro DevOps : Workload Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/","url":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/","name":"What is Operational Excellence and Why Should I Care? Cloud Advocate 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg","datePublished":"2021-01-27T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate.jpg","width":1282,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/what-is-operational-excellence-and-why-should-i-care-cloud-advocate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/"},{"@type":"ListItem","position":3,"name":"What is Operational Excellence and Why Should I Care? Cloud Advocate"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43038"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43038\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43039"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}