Any obvious pitfalls of modeling access control policies using subject, scope, object?

Context
A small web application with REST API and postgres as db, that has users, documents and teams. A user can do basic CRUD operations on document.
A user is always a part of a team. A team is generated on user signup. A team has at le… Continue reading Any obvious pitfalls of modeling access control policies using subject, scope, object?

Vulnerabilities in Cisco Identity Services Engine require your attention (CVE-2022-20822, CVE-2022-20959)

Cisco has published a heads-up for admins of Cisco Identity Services Engine solutions, about two vulnerabilities (CVE-2022-20822, CVE-2022-20959) that could be exploited to read and delete files on an affected device, and to execute arbitrary script or… Continue reading Vulnerabilities in Cisco Identity Services Engine require your attention (CVE-2022-20822, CVE-2022-20959)

Purpose-based access control: Putting data access requests into context

Access control is the heart of data protection. Striking the right balance between easy access and tight security isn’t easy, but getting it right is how you maintain business agility while still meeting regulatory and fiduciary data protection respons… Continue reading Purpose-based access control: Putting data access requests into context

There is no secure critical infrastructure without identity-based access

Organizational security strategy has long been defined by an internal perimeter enclosing all a company’s information in a single secure location. Designed to keep external threats out through firewalls and other intrusion prevention systems, this secu… Continue reading There is no secure critical infrastructure without identity-based access

How complicated access management protocols have impacted cloud security

During AWS re:Inforce, Amazon executives emphasized how important access control is when it comes to cloud security and why IT leaders need to ask who has access to what and why. The executives emphasized the importance of enabling multi-factor authent… Continue reading How complicated access management protocols have impacted cloud security

What are useful readings for a novice trying to understand Identity and Access Management? [closed]

What are useful readings for a novice trying to understand Identity and Access Management? Those may include overviews, theory, deployment, etc. Non-technical discussions and case studies are especially appreciated. Thanks!

Continue reading What are useful readings for a novice trying to understand Identity and Access Management? [closed]

What are useful readings for a novice trying to understand Identity and Access Management? [closed]

What are useful readings for a novice trying to understand Identity and Access Management? Those may include overviews, theory, deployment, etc. Non-technical discussions and case studies are especially appreciated. Thanks!

Continue reading What are useful readings for a novice trying to understand Identity and Access Management? [closed]

What are useful readings for a novice trying to understand Identity and Access Management? [closed]

What are useful readings for a novice trying to understand Identity and Access Management? Those may include overviews, theory, deployment, etc. Non-technical discussions and case studies are especially appreciated. Thanks!

Continue reading What are useful readings for a novice trying to understand Identity and Access Management? [closed]