Главная
Study mode:
on
1
Intro
2
Target Breach
3
Data Breach
4
Why Privilege is Hard
5
Overprovisioning
6
Physical vs Software
7
Abandoned Projects
8
RoleBased Access Control
9
Example
10
Netflix Example
11
New Permissions
12
Removing Permissions
13
Break Applications
14
Application Permissions
15
Container Capabilities
16
Closing Thoughts
Description:
Explore the challenges and solutions of implementing the Least Privilege principle in computer security through this 17-minute conference talk from USENIX Enigma 2018. Dive into Travis McPeak's insights as a Sr. Security Engineer at Netflix, examining why this long-established concept remains underutilized despite its benefits. Learn about the obstacles faced by developers and security teams in crafting effective security policies, and discover Netflix's innovative approach to automatically adjusting permissions based on application behavior. Gain valuable knowledge on balancing security needs with development velocity, overcoming implementation challenges, and applying similar methodologies in various environments. Understand key concepts such as overprovisioning, role-based access control, and container capabilities while exploring real-world examples and practical solutions for achieving least privilege without hindering developer productivity.

Least Privilege: Security Gain without Developer Pain

USENIX Enigma Conference
Add to list
0:00 / 0:00