From the course: Cybersecurity with Cloud Computing

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Controlling access to cloud objects

Controlling access to cloud objects

From the course: Cybersecurity with Cloud Computing

Start my 1-month free trial

Controlling access to cloud objects

- [Instructor] Cloud deployments need the ability to control access by users to infrastructure platforms, and software applications, and to the resources used in the applications. There are a number of authorization models such as mandatory access control, role based access control, discretionary access control, and rule-based access control. Rule-based access control can be implemented using rules based on attributes, claims, and authorizations. The Cloud Security Alliance recommends that application designers move to a rule-based access control model. There are some terms that need to be defined in order to understand access control. Authorization is the confirmation there's an identity has been authorized by the resource owner to access a resource. Entitlement sometimes called a privilege is a predefined permission to take an action. That's action might be to use a service, or run a specific command. Access control is…

Contents