Patterns in S3 Data Access: Protecting and Enhancing Access to Cloud Data Stores

Patterns in S3 Data Access: Protecting and Enhancing Access to Cloud Data Stores

fwd:cloudsec via YouTube Direct link

AWS Click

25 of 35

25 of 35

AWS Click

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Patterns in S3 Data Access: Protecting and Enhancing Access to Cloud Data Stores

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Becky Weiss talk
  4. 4 Signed URLs
  5. 5 Capabilitybased security
  6. 6 Reenactment
  7. 7 The Big Idea
  8. 8 AWS Request Signing
  9. 9 NonAWS Users
  10. 10 Photo Sharing App
  11. 11 Photo Sharing Service
  12. 12 Complex Data
  13. 13 Data Lakes
  14. 14 Reshaping Data
  15. 15 Common Solutions
  16. 16 Permission Boundaries
  17. 17 Complexity
  18. 18 Limitations
  19. 19 Permissions
  20. 20 Proxy
  21. 21 STS Assume Role
  22. 22 STS Rate Limit
  23. 23 The Last Solution
  24. 24 Sign Requests
  25. 25 AWS Click
  26. 26 Can I change responses
  27. 27 List calls
  28. 28 Object Lambda
  29. 29 Why
  30. 30 Proxy recall
  31. 31 Multipart requests
  32. 32 Running as a Lambda
  33. 33 Network latency
  34. 34 Data Geekery
  35. 35 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.