Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Patterns in S3 Data Access: Protecting and Enhancing Access to Cloud Data Stores
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Becky Weiss talk
- 4 Signed URLs
- 5 Capabilitybased security
- 6 Reenactment
- 7 The Big Idea
- 8 AWS Request Signing
- 9 NonAWS Users
- 10 Photo Sharing App
- 11 Photo Sharing Service
- 12 Complex Data
- 13 Data Lakes
- 14 Reshaping Data
- 15 Common Solutions
- 16 Permission Boundaries
- 17 Complexity
- 18 Limitations
- 19 Permissions
- 20 Proxy
- 21 STS Assume Role
- 22 STS Rate Limit
- 23 The Last Solution
- 24 Sign Requests
- 25 AWS Click
- 26 Can I change responses
- 27 List calls
- 28 Object Lambda
- 29 Why
- 30 Proxy recall
- 31 Multipart requests
- 32 Running as a Lambda
- 33 Network latency
- 34 Data Geekery
- 35 Questions