Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Free courses from frontend to fullstack and AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to secure access by leveraging Identity Governance and Administration (IGA), Just-In-Time (JIT) access, and policy controls to address OWASP security threats in this 44-minute conference talk. Explore comprehensive strategies for implementing robust access management frameworks that can effectively mitigate common web application security risks identified by OWASP. Discover how IGA solutions provide centralized identity lifecycle management, automated provisioning and deprovisioning, and continuous compliance monitoring. Understand the implementation of JIT access principles to minimize attack surfaces by providing temporary, time-bound access to resources only when needed. Examine policy-based access controls that enforce granular permissions and dynamic authorization decisions based on contextual factors. Gain insights into mapping these access control mechanisms against specific OWASP Top 10 vulnerabilities, including broken access control, security misconfiguration, and identification and authentication failures. Master practical approaches for integrating these security controls into existing infrastructure while maintaining operational efficiency and user experience.
Syllabus
Securing Access: Leveraging IGA, JIT & Policy Controls to Tackle OWASP Threats
Taught by
OWASP Foundation