YoVDO

Least Privilege: Security Gain without Developer Pain

Offered By: USENIX Enigma Conference via YouTube

Tags

Computer Security Courses DevSecOps Courses Access Control Courses Application Security Courses Role-Based Access Control Courses Container Security Courses Security Automation Courses

Course Description

Overview

Explore the challenges and solutions of implementing the Least Privilege principle in computer security through this 17-minute conference talk from USENIX Enigma 2018. Dive into Travis McPeak's insights as a Sr. Security Engineer at Netflix, examining why this long-established concept remains underutilized despite its benefits. Learn about the obstacles faced by developers and security teams in crafting effective security policies, and discover Netflix's innovative approach to automatically adjusting permissions based on application behavior. Gain valuable knowledge on balancing security needs with development velocity, overcoming implementation challenges, and applying similar methodologies in various environments. Understand key concepts such as overprovisioning, role-based access control, and container capabilities while exploring real-world examples and practical solutions for achieving least privilege without hindering developer productivity.

Syllabus

Intro
Target Breach
Data Breach
Why Privilege is Hard
Overprovisioning
Physical vs Software
Abandoned Projects
RoleBased Access Control
Example
Netflix Example
New Permissions
Removing Permissions
Break Applications
Application Permissions
Container Capabilities
Closing Thoughts


Taught by

USENIX Enigma Conference

Related Courses

Securing Digital Democracy
University of Michigan via Coursera
Computer Science 101
Stanford University via Coursera
Introduction to Cybersecurity for Business
University of Colorado System via Coursera
Proactive Computer Security
University of Colorado System via Coursera
How Computers Work
University of London International Programmes via Coursera