Authorization that Scales to the Cloud and Beyond

Companies are leveraging cloud native capabilities such as storage, orchestration, and compute to deliver value to their business; and much of net new application development now takes place in the cloud at a faster pace than ever before. We see the proliferation of more services, more users, and more data which all translate to more risk. Getting your access control right becomes more critical than ever – and it’s not just about security, it’s also about enabling new scenarios.

In this webinar, Gerry and David will cover new standards such as the Abbreviated Language for Authorization (called ALFA) and the power of cloud-native authorization that enables enterprises and their developers to seamlessly integrate the right controls into their cloud application and data lake development maturity. Gerry and David will cover how dynamic authorization can support your cloud migration strategy by leveraging containerization, configuration-driven authorization, and CI/CD principles.

You’ll get insight on….

  • Scaling authorization in line with your cloud migration strategy
  • Tackling data access control challenges for new data stores, such as data lakes
  • Adopting a standards-based policy-driven approach to implement access controls as configuration rather than code and why this is a game-changer
  • How to distribute, automate, and configure authorization in line with cloud principles


Watch this webinar on-demand.

Other Resources

The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.