YoVDO

Permissions: Balancing Centralized and Decentralized Approaches

Offered By: RSA Conference via YouTube

Tags

Authorization Courses Cloud Computing Courses Distributed Systems Courses Policy Design Courses Access Control Courses Permissions Management Courses Enterprise Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the balance between centralized and decentralized permissions in modern business applications through this insightful 51-minute conference talk from the RSA Conference. Learn from AWS's Sarah Cecchetti and Microsoft's Pieter Kasselman as they share their extensive experience with thousands of authorization schemas. Discover how to design permission structures that are fast, flexible, and globally reliable while addressing the conflicting needs of edge applications requiring quick local policy decisions and large organizations demanding uniform security guardrails. Gain valuable insights into creating a permissions framework that effectively combines centralized and decentralized approaches for optimal security and performance.

Syllabus

Permissions: Centralized or Decentralized? Both!


Taught by

RSA Conference

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera