Aug. 21, 2023, 8:33 p.m. | Emina Torlak

AWS Security Blog aws.amazon.com

This post is a deep dive into the design of Cedar, an open source language for writing and evaluating authorization policies. Using Cedar, you can control access to your application’s resources in a modular and reusable way. You write Cedar policies that express your application’s permissions, and the application uses Cedar’s authorization engine to decide which […]

access advanced (300) amazon verified access amazon verified permissions application authorization automated reasoning cedar compliance control deep dive design dive express fast identity language modular open source permissions policies resources safe security security blog technical how-to writing

More from aws.amazon.com / AWS Security Blog

Financial Crimes Compliance - Senior - Consulting - Location Open

@ EY | New York City, US, 10001-8604

Software Engineer - Cloud Security

@ Neo4j | Malmö

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Identity Governance Consultant

@ Allianz | Sydney, NSW, AU, 2000

Educator, Cybersecurity

@ Brain Station | Toronto

Principal Security Engineer

@ Hippocratic AI | Palo Alto