Persona view
Explore how different roles engage with each layer of the Velocity Blueprint. Each cell represents a specialized role responsible for a specific focus within a layer.
Business/Product Product vision, priorities, and ROI | Architecture Technical design and standards | Build/Dev Development and implementation | Reliability Operations and incident response | Governance Security, compliance, and policy | |
|---|---|---|---|---|---|
| Agentic core | |||||
| Software core | |||||
| Data core | |||||
| Foundations |
Understanding the view
Layers
- Agentic core
- Software core
- Data core
- Foundations
Concerns
- Business/Product: Product vision, priorities, and ROI
- Architecture: Technical design and standards
- Build/Dev: Development and implementation
- Reliability: Operations and incident response
- Governance: Security, compliance, and policy
Cloud security
Governance · Foundations
Ensures cloud infrastructure security and compliance.
Responsibilities
- • Cloud security policies
- • IAM management
- • Security monitoring
- • Compliance audits
Key metrics
Primary components (3)
Manages IAM policies, enforces least-privilege access, and audits authentication configurations
Foundations › Compliance automationConfigures automated compliance checks and manages regulatory evidence collection
Foundations › Security policy enforcementDefines and enforces cloud security policies across all environments
Secondary components (7)
Audits agent-assisted development workflows for security policy compliance
Foundations › Container orchestrationAudits container security, reviews network policies, and enforces image signing
Foundations › Serverless runtimeReviews function permissions, enforces VPC configurations, and audits event source bindings
Foundations › Network infrastructureReviews network security configurations, firewall rules, and VPC peering
Foundations › IAMManages identity and access management policies at the infrastructure layer
Foundations › Pipeline governanceEnforces CI/CD pipeline security standards and approval gates
Foundations › Supply chain securityValidates software supply chain integrity and artifact provenance