Access Policies for Hybrid Cloud Environments - Ruiyi Wang, Google

less than 1 minute read

Abstract

A typical admin/developer today needs to deal with many access policy systems: K8s RBAC, Istio RBAC and ABAC, OPA, policies from cloud vendors including IAM, firewall rules, quota etc. Reasoning about access across these systems is getting more and more complex and difficult. We want to invite those who build access policies and those who use access policies to come together to discuss the vision of a secure, easy to use and consistent/coherent access management experience across infrastructure, services and applications. And more importantly: how do we get there?

Sched URL

Video