Permissions: Balancing Centralized and Decentralized Approaches
Offered By: RSA Conference via YouTube
Course Description
Overview
Explore the balance between centralized and decentralized permissions in modern business applications through this insightful 51-minute conference talk from the RSA Conference. Learn from AWS's Sarah Cecchetti and Microsoft's Pieter Kasselman as they share their extensive experience with thousands of authorization schemas. Discover how to design permission structures that are fast, flexible, and globally reliable while addressing the conflicting needs of edge applications requiring quick local policy decisions and large organizations demanding uniform security guardrails. Gain valuable insights into creating a permissions framework that effectively combines centralized and decentralized approaches for optimal security and performance.
Syllabus
Permissions: Centralized or Decentralized? Both!
Taught by
RSA Conference
Related Courses
Cybersecurity and Its Ten DomainsUniversity System of Georgia via Coursera Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Computing, Storage and Security with Google Cloud Platform
Google via Coursera