Solid talk! Surprising how little there is out there talking about EDA security, in "end-to-end" terms - with reference to user auth (eg JWTs) - and how that translates to access controls between internal processing nodes (eg IAM / resource-based policies). This was definitely helpful. Learned a bunch. Thanks!
Solid talk!
Surprising how little there is out there talking about EDA security, in "end-to-end" terms - with reference to user auth (eg JWTs) - and how that translates to access controls between internal processing nodes (eg IAM / resource-based policies).
This was definitely helpful. Learned a bunch.
Thanks!
thx for the feedback!