Advanced IAM: Hacks, tips, and tricks for policy management
This deep-dive on access policy management in Identity and Access Management covers advanced topics such as avoiding policy change conflicts through concurrency control, policy attachment point discovery, attribute-based access control with IAM Conditions, client library usage, policy schema versions, and more.
This session features live demonstrations including example code, command-line, and API usage.
Speaker: Blake T.
Watch more:
Google Cloud Next ’20: OnAir → https://goo.gle/next2020
Subscribe to the GCP Channel → https://goo.gle/GCP
#GoogleCloudNext
SEC302
product: Cloud Key Management Service (KMS), Security Command Center, Cloud Data Loss Prevention; fullname: Blake T;
Видео Advanced IAM: Hacks, tips, and tricks for policy management канала Google Cloud Platform
This session features live demonstrations including example code, command-line, and API usage.
Speaker: Blake T.
Watch more:
Google Cloud Next ’20: OnAir → https://goo.gle/next2020
Subscribe to the GCP Channel → https://goo.gle/GCP
#GoogleCloudNext
SEC302
product: Cloud Key Management Service (KMS), Security Command Center, Cloud Data Loss Prevention; fullname: Blake T;
Видео Advanced IAM: Hacks, tips, and tricks for policy management канала Google Cloud Platform
Показать
Комментарии отсутствуют
Информация о видео
15 сентября 2020 г. 21:05:01
00:17:48
Другие видео канала
![Azure Active Directory (AD, AAD) Tutorial | Identity and Access Management Service](https://i.ytimg.com/vi/Ma7VAQE7ga4/default.jpg)
![Cloud IAM in Google Cloud Platform !!](https://i.ytimg.com/vi/vaylQUuIANk/default.jpg)
![DATA & ANALYTICS - IoT - from small data to big data: Building solutions with connected devices](https://i.ytimg.com/vi/8NbP07OEGsQ/default.jpg)
![Classical Management Theory](https://i.ytimg.com/vi/d1jOwD-CTLI/default.jpg)
![Project Management Simplified: Learn The Fundamentals of PMI's Framework ✓](https://i.ytimg.com/vi/ZKOL-rZ79gs/default.jpg)
![Scale-up to your security telemetry](https://i.ytimg.com/vi/SWwo2M23VzU/default.jpg)
![Authentication for Anthos clusters](https://i.ytimg.com/vi/Qh1zP-TF-d4/default.jpg)
![AWS re:Invent 2018: [REPEAT 1] Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1)](https://i.ytimg.com/vi/YQsK4MtsELU/default.jpg)
![Identity and Access Management: Technical Overview](https://i.ytimg.com/vi/Tcvsefz5DmA/default.jpg)
![Minimizing permissions using IAM Recommender](https://i.ytimg.com/vi/0MUaNoyGgNw/default.jpg)
![Data Governance in a Cloud-First World (Cloud Next '19)](https://i.ytimg.com/vi/iCVJdFedSv4/default.jpg)
![Identity And Access Management | CISSP Training Videos](https://i.ytimg.com/vi/8rYaUxgfhHM/default.jpg)
![Market Correction, Volatility, Fiscal Policy | ITK with Cathie Wood](https://i.ytimg.com/vi/vm2N5NuWNvg/default.jpg)
![How to migrate to microservices & aim for stateless](https://i.ytimg.com/vi/4OCk1whicSc/default.jpg)
![What’s new in BigQuery, Google Cloud’s modern data warehouse](https://i.ytimg.com/vi/DvR-DmYrReI/default.jpg)
![Best Practices for Using AWS Identity and Access Management (IAM) Roles](https://i.ytimg.com/vi/DyHrppoArKQ/default.jpg)
![Using AI in manufacturing for increased productivity](https://i.ytimg.com/vi/aRwhRwybKF0/default.jpg)
![New Education Policy 2020 | Fatafat Review | Must Watch For All Students, Parents & Teachers](https://i.ytimg.com/vi/9QtI1dlYUyw/default.jpg)
![Getting started with Data Loss Prevention on Security Command Center](https://i.ytimg.com/vi/k7ZEfAocMq4/default.jpg)