Centralizing the Code – Separating Authorization Logic from Apps

For any business in the Fortune 1000 – such as health care, insurance, banking, pharmaceuticals and manufacturing – the need to shift beyond legacy role-based access control models becomes more immediate with every data breach. There’s one trend that’s crossing industries – separating hard-coded authorization logic from applications: externalizing authorization and using a policy-based approach go hand-in-hand to ensure your business is on pace with the fast-moving data-intense IT environment.

This webinar will help you cut through the code to securely share sensitive data under the right conditions – with a centralized, policy-based approach.

Key takeaways:

  • The changing landscape
  • The big three: context, user type and data
  • Shifting away from roles to attributes
  • A model for externalized authorization

 

 

Other Resources

Webinars
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.