YoVDO

Common Authorization Vulnerabilities and Best Practices

Offered By: Kunal Kushwaha via YouTube

Tags

Access Control Courses RBAC Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore common authorization vulnerabilities and best practices in this informative Open Source Cafe episode featuring a conversation with Marco from Teleport. Gain insights into providing privileges, managing multiple services, addressing location-specific vulnerabilities, and implementing effective authorization strategies. Learn about the differences between ABAC and RBAC, server-side authorization best practices, and when to implement authorization in your projects. Discover valuable resources and connect with experts in the field of Kubernetes security through provided links and timestamps for easy navigation.

Syllabus

Introduction
Common vulnerabilities in authorization
Providing privileges
How to manage multiple services
Managing location specific vulnerabilities
Best practices
When to implement authorization
ABAC vs RBAC
Server side authorization best practices
Other best practices
Outro


Taught by

Kunal Kushwaha

Related Courses

Microsoft Azure Developer: Implement User Authentication and Authorization
Pluralsight
Building Authorization in Azure Active Directory for Developers
Pluralsight
Configuring Virtual Machines in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Secure Access Using Azure AD
Pluralsight
Managing and Monitoring Access on AWS
Pluralsight