YoVDO

Permissions: Balancing Centralized and Decentralized Approaches

Offered By: RSA Conference via YouTube

Tags

Authorization Courses Cloud Computing Courses Distributed Systems Courses Policy Design Courses Access Control Courses Permissions Management Courses Enterprise Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the balance between centralized and decentralized permissions in modern business applications through this insightful 51-minute conference talk from the RSA Conference. Learn from AWS's Sarah Cecchetti and Microsoft's Pieter Kasselman as they share their extensive experience with thousands of authorization schemas. Discover how to design permission structures that are fast, flexible, and globally reliable while addressing the conflicting needs of edge applications requiring quick local policy decisions and large organizations demanding uniform security guardrails. Gain valuable insights into creating a permissions framework that effectively combines centralized and decentralized approaches for optimal security and performance.

Syllabus

Permissions: Centralized or Decentralized? Both!


Taught by

RSA Conference

Related Courses

Software as a Service
University of California, Berkeley via Coursera
Software Defined Networking
Georgia Institute of Technology via Coursera
Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Web-Technologien
openHPI
Données et services numériques, dans le nuage et ailleurs
Certificat informatique et internet via France Université Numerique