How can you quickly discover misconfigured security groups, access control lists, or routing tables? We explore how practitioners serving distributed teams or customer workloads can tighten up policies, impact costs, and unblock their colleagues with cloud infrastructure observability that starts with the network.