Background Attribute Based Access Control (ABAC) leverages attributes in combination with a set of policies to determine authorization decisions. A request is sent from an application, API gateway, or something else that acts as a Policy Enforcement Point (PEP). The Policy Decision Point (PDP)
What is Big Data and Why You Should Care In a previous post, I discussed some of the security challenges awaiting companies looking to leverage the explosion of Big Data. The term itself - “Big Data” - is sort of vague. What do we mean when we say Big Data? Is it the size of the data files?
Background When a policy is being evaluated in XACML 3.0 Policy Decision Points (PDP), Obligations and Advice elements will be ignored for “Indeterminate” and “Not Applicable” results. Only a "Permit " or "Deny" condition will result in an Obligation or Advice message being returned. This
Axiomatics is heading to Gartner’s annual Identity and Access Management (IAM) Summit on November 29 at Caesar's Palace in Las Vegas. By the time the event concludes on December 1st, the 1600-plus attendees will have a better understanding of the most pressing security issues facing digital
Background We haven’t discussed combining algorithms much, but they are just one of the many powerful features of an XACML-based authorization system. You can think of combining algorithms as a way to assign weight to many partial answers to the same question. Let’s use a background
The big data landscape is, not surprisingly, big. Matt Turck’s excellent blog (mattturck.com) has good coverage on the development in this area and captures how much the landscape has grown over the past few years. The figure below, created by Turck, captures the vendors in the Big Data