Authorization that Scales to the Cloud and Beyond

Companies are leveraging cloud native capabilities such as storage, orchestration, and compute to deliver value to their business; and much of net new application development now takes place in the cloud at a faster pace than ever before. We see the proliferation of more services, more users, and more data which all translate to more risk. Getting your access control right becomes more critical than ever – and it’s not just about security, it’s also about enabling new scenarios.

In this webinar, Gerry and David will cover new standards such as the Abbreviated Language for Authorization (called ALFA) and the power of cloud-native authorization that enables enterprises and their developers to seamlessly integrate the right controls into their cloud application and data lake development maturity. Gerry and David will cover how dynamic authorization can support your cloud migration strategy by leveraging containerization, configuration-driven authorization, and CI/CD principles.

You’ll get insight on….

  • Scaling authorization in line with your cloud migration strategy
  • Tackling data access control challenges for new data stores, such as data lakes
  • Adopting a standards-based policy-driven approach to implement access controls as configuration rather than code and why this is a game-changer
  • How to distribute, automate, and configure authorization in line with cloud principles


Watch this webinar on-demand.

Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.