Permission Models As Code - Securing the entire stack

A talk by Raz Cohen and Oded Ben David and

Register to watch this content

By submitting you agree to the Terms & Privacy Policy
Watch this content now

Tracks covered by this talk

About this talk

In this presentation, we will discuss a number of topics that will provide an insight into how permission models as code can be used to secure products from top to bottom - from infrastructure up to the application layer.

For more info on this session, please visit the session page at the Summit's website

The following topics will be discussed:

  • Why permissions are hard to build and maintain

  • The different options for permission models

  • Policy as Code

  • Generating policy as code (Rego) - with's low-code policy editor

  • Applying policies to Kubernetes infrastructure

  • Applying policies to the application layer

Following our previous talks on Open Security Summits :



Sponsor this Event

Your logo could go here!

If you'd like to get your brand in front of attendees contact us.

loading content...

loading content...