YoVDO

Permissions: Balancing Centralized and Decentralized Approaches

Offered By: RSA Conference via YouTube

Tags

Authorization Courses Cloud Computing Courses Distributed Systems Courses Policy Design Courses Access Control Courses Permissions Management Courses Enterprise Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the balance between centralized and decentralized permissions in modern business applications through this insightful 51-minute conference talk from the RSA Conference. Learn from AWS's Sarah Cecchetti and Microsoft's Pieter Kasselman as they share their extensive experience with thousands of authorization schemas. Discover how to design permission structures that are fast, flexible, and globally reliable while addressing the conflicting needs of edge applications requiring quick local policy decisions and large organizations demanding uniform security guardrails. Gain valuable insights into creating a permissions framework that effectively combines centralized and decentralized approaches for optimal security and performance.

Syllabus

Permissions: Centralized or Decentralized? Both!


Taught by

RSA Conference

Related Courses

Windows Server Management and Security
University of Colorado System via Coursera
Introduction to Cyber Security
New York University (NYU) via Coursera
AWS Certified Security Specialty 2024 [NEW]
Udemy
Planning for Microsoft 365 Windows 10 Deployment
Pluralsight
MicroStrategy 10 Certification Training
Edureka