6h2g' |
How we designed Cedar to be intuitive to use, fast, and safe | AWS Security Blog
https://aws.amazon.com/blogs/security/how-we-designed-cedar-to-be-intuitive-to-use-fast-and-safe/
Saved on 2023-08-24 [19593 edays] via aws.amazon.com
Modified 2023-08-24 [19593 edays]
cybersecurity programming
https://aws.amazon.com/blogs/security/how-we-designed-cedar-to-be-intuitive-to-use-fast-and-safe/
Saved on 2023-08-24 [19593 edays] via aws.amazon.com
Modified 2023-08-24 [19593 edays]
cybersecurity programming
This post is a deep dive into the design of Cedar, an open source language for writing and evaluating authorization policies. Using Cedar, you can control access to your application’s resources in a modular and reusable way. You write Cedar policies that express your application’s permissions, and the application uses Cedar’s authorization engine to decide which access requests to allow. This decouples access control from the application logic, letting you write, update, audit, and reuse authorization policies independently of application code.