Aug. 21, 2023, 8:33 p.m. | Emina Torlak

AWS Security Blog aws.amazon.com

This post is a deep dive into the design of Cedar, an open source language for writing and evaluating authorization policies. Using Cedar, you can control access to your application’s resources in a modular and reusable way. You write Cedar policies that express your application’s permissions, and the application uses Cedar’s authorization engine to decide which […]

access advanced (300) amazon verified access amazon verified permissions application authorization automated reasoning cedar compliance control deep dive design dive express fast identity language modular open source permissions policies resources safe security security blog technical how-to writing

More from aws.amazon.com / AWS Security Blog

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC