API Authorization – Secure Sensitive Data with Attribute Based Access Control

In this session we have invited a very special guest speaker, Anderson Gray from CA Technologies for a look at the growth of APIs, trends, the use of API gateways and the need for more fine-grained access control.

APIs have revolutionized the way that application data can be accessed, shared and monetized. But data must also be protected, and complex authorization rules are required to ensure individuals see only what they’re authorized to see.

This webinar will provide an overview of the API landscape (from CA Technologies) and a deep dive into the world of policy and attribute based access control, and how this approach can help ensure the security of sensitive data.

Key takeaways:

  • Understanding the API Landscape
  • API trend evolution
  • Securing your APIs from authentication to authorization
  • APIs, policies and attributes – a top-down approach to authorization from the application to the database
  • Planning your API roadmap – a simple approach to implementing an ABAC solution


Download Q&A from webinar


Other Resources

The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.