Security Exploration - AWS Verified Permissions

  Рет қаралды 726

AppSecEngineer

AppSecEngineer

Күн бұрын

In this video, Abhay Bhargav does a raw exploration of AWS's newest feature - Verified Permissions.
Authorization is a huge problem for applications and building scalable permission-systems and authorization models is a key concern for software development teams everywhere
Amazon Verified Permissions is a scalable permissions management and fine-grained authorization service for the applications that you build. Using Cedar, an expressive and analyzable open-source policy language, developers and admins can define policy-based access controls using roles and attributes for more granular, context-aware access control.
With Verified Permissions, developers can build more secure applications faster by externalizing authorization and centralizing policy management. They can also align application access with Zero Trust principles. Security and audit teams can also better analyze and audit who has access to what within applications.
This is the first video in our series of Security Explorations. This is a raw, no-edit video approach of how we learn and figure out topics at AppSecEngineer. This takes you through a journey of learning a very specific concept with a project-oriented mindset.
Enjoy!
00:00 AWS Verified Permissions - Intro
02:36 Handling Verified Permissions Policy Store
04:56 Let's start our project
07:00 Understanding Resources in Verified Permissions
08:13 Setting up a User Pool in Cognito
10:09 Defining AuthZ requirements for our Application
15:23 Exploring the Verified Permissions SDK with Python's Boto3
16:35 Testing our policy
21:00 Policy Templates
30:35 Testing Policy with the user's ID Token with Cognito
47:00 Understanding User Definition in Policy
59:47 Finally figured out the solution

Пікірлер: 1
@NaveenSiddareddy
@NaveenSiddareddy Ай бұрын
2 things : 1. its going to be hard to pool all the attributes from various apps and 2nd like you said people will start asking some list, set operations on permissions data . ideally its outside the scope of auth engine but since it holds all relevant data clients will ask!
Introdução a Api com Rails - Segurança(CORS)
20:06
puts_dev
Рет қаралды 80
Intro to AWS Storage Gateway | File Gateway
38:10
StratusGrid
Рет қаралды 119
Я не голоден
01:00
К-Media
Рет қаралды 9 МЛН
Mom's Unique Approach to Teaching Kids Hygiene #shorts
00:16
Fabiosa Stories
Рет қаралды 40 МЛН
Webinar: Secure by Design - Across the stack
55:51
AppSecEngineer
Рет қаралды 82
Implementing Secure by Design Principles in AWS | AWS Security
14:58
VPN vs Zero Trust: Which is better?
2:46
Plow Networks
Рет қаралды 601
Stop, Intel’s Already Dead! - AMD Ryzen 9600X & 9700X Review
13:47
Linus Tech Tips
Рет қаралды 1,2 МЛН
Cracking the Code: Symmetric vs. Asymmetric Encryption Explained!
0:56
How to Catch Failed SSH Logins with AWS Cloudwatch | AWS Security
19:37
4 Common Mistakes in Cloud Security and How to Fix Them
3:58
AppSecEngineer
Рет қаралды 68
Я не голоден
01:00
К-Media
Рет қаралды 9 МЛН