According to Davis, “nearly all the built-in governance capabilities have fallen under Managed Environments. The feature list has grown over time and was due for a revamp. The new approach includes new capabilities, but also breaks out the governance capabilities that existed under Managed Environments into three areas: managed governance, managed operations, and managed security.”
These areas, he said, “align with typical roles within an organization. For example, managed operations are where you’ll find backup and recovery, ALM, testing, and monitoring capabilities. Managed Security is where you’ll find IAM, network isolation, advanced data policies, and encryption.”
Davis added, “the major change to data policies is that they have been simplified. The blocked, non-business, and business categories have been removed. Now, an organization can choose which connectors to make available and which to block. Also, all connectors are now blockable.”