Patterns in S3 Data Access: Protecting and Enhancing Access to Cloud Data Stores
fwd:cloudsec via YouTube
Overview
Syllabus
Introduction
Agenda
Becky Weiss talk
Signed URLs
Capabilitybased security
Reenactment
The Big Idea
AWS Request Signing
NonAWS Users
Photo Sharing App
Photo Sharing Service
Complex Data
Data Lakes
Reshaping Data
Common Solutions
Permission Boundaries
Complexity
Limitations
Permissions
Proxy
STS Assume Role
STS Rate Limit
The Last Solution
Sign Requests
AWS Click
Can I change responses
List calls
Object Lambda
Why
Proxy recall
Multipart requests
Running as a Lambda
Network latency
Data Geekery
Questions
Taught by
fwd:cloudsec