Tagged | access-control
-
How to implement access control in a GraphQL API
(advancedweb.hu) -
Restriction Rules
(engineering.salesforce.com) -
Role Management at Slack
(slack.engineering)#software-engineering #software-architecture #access-control
-
Safe ACL Change through Model-based Analysis
(tech.ebayinc.com) -
Salesforce Cloud Security: Automating Least Privilege in AWS IAM with Policy Sentry
(engineering.salesforce.com) -
Securing Apache Airflow UI With DAG Level Access
(eng.lyft.com) -
Apotheosis: A GCP Privilege Escalation Tool
(codeascraft.com) -
How Google adopted BeyondCorp: Part 3 (tiered access)
(security.googleblog.com) -
Key Conjurer: Our Policy of Least Privilege
(technology.riotgames.com) -
Evolving to Enterprise-Grade Permissions
(benchling.engineering)#software-engineering #software-design #software-architecture #security #access-control
-
Keep your infrastructure keys safe with Vault
(blog.octo.com) -
TTL as a Service: Automatic Revocation of Stale Privileges
(engineeringblog.yelp.com)#software-engineering #software-design #security #access-control
-
Sinkholing - Face the Threat, Beat the Threat
(tech.showmax.com) -
How S3 Signed URLs work
(advancedweb.hu) -
How To Structure Permissions In A SaaS App
(heap.engineering) -
Building Application Backends with End-to-end Encryption
(hackernoon.com) -
Securing Services for Kubernetes on AWS
(code.hootsuite.com) -
Building Account Systems
(auth0.com) -
An Introduction to Managing Secrets Safely with Version Control Systems
(www.digitalocean.com) -
A Simple, Secure Tool for One-time (Self-Destructing) Messages
(blog.algolia.com) -
The Right Way to Manage Secrets in AWS
(segment.com) -
Identity and Access Management (IAM) in the aftermath of NotPetya
(developer.ibm.com)