Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Securing Access - Leveraging IGA, JIT and Policy Controls to Tackle OWASP Threats

OWASP Foundation via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to secure access by leveraging Identity Governance and Administration (IGA), Just-In-Time (JIT) access, and policy controls to address OWASP security threats in this 44-minute conference talk. Explore comprehensive strategies for implementing robust access management frameworks that can effectively mitigate common web application security risks identified by OWASP. Discover how IGA solutions provide centralized identity lifecycle management, automated provisioning and deprovisioning, and continuous compliance monitoring. Understand the implementation of JIT access principles to minimize attack surfaces by providing temporary, time-bound access to resources only when needed. Examine policy-based access controls that enforce granular permissions and dynamic authorization decisions based on contextual factors. Gain insights into mapping these access control mechanisms against specific OWASP Top 10 vulnerabilities, including broken access control, security misconfiguration, and identification and authentication failures. Master practical approaches for integrating these security controls into existing infrastructure while maintaining operational efficiency and user experience.

Syllabus

Securing Access: Leveraging IGA, JIT & Policy Controls to Tackle OWASP Threats

Taught by

OWASP Foundation

Reviews

Start your review of Securing Access - Leveraging IGA, JIT and Policy Controls to Tackle OWASP Threats

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.