You are receiving this email because either we have met, chatted, or you've visited our website cerbos.devand asked us to keep you up-to-date. If you have been forwarded this email, you can subscribeand receive future updates directly from us. If you prefer not to receive these updates, you can unsubscribe below, but we hope you stay!
Updates to Cerbos
v0.27 & v0.28 of Cerbos
The latest releases of Cerbos include support for user-defined outputs from policies, storage overlay support for fallback scenarios, as well as Kafka and tests suites updates.
Cerbos now supports returning user-defined output values from policy evaluation enabling context to be returned from a policy decision for use in your application logic, for example to explain why permission was denied. A commonly requested use case is to enforce that 2FA has been completed in order for certain actions to be performed, and if not return a message to redirect the user to reauthenticate
Introduced policy output testing, ensuring policies produce accurate decisions as well as producing expected output values.
Launched new overlay storage, a driver enabling configuration of base and fallback storage providers to ensure continuing service even if the primary storage engine becomes unavailable.
Extended the Kafka audit-sink with compression support.
You can find the full release notes here: v0.27, v0.28.
Cerbos events
Cerbos will be attending three exciting events in the upcoming weeks! Join us at:
Collision in Toronto from June 26th to 29th - booth G102
If you have any questions about how Cerbos can help your business achieve its authorization goals, don't hesitate to come talk to us. We'll be on hand to answer any questions you may have and to help you explore the possibilities of authorization.
Blog highlights
Cloud Native Live: Modernizing authorization
In a recent CNCF live demo, Alex Olivier, Cerbos’ Product Lead, emphasized the need for an evolved authorization strategy in today's fast-paced software development environment. Alex further delved into the realm of modernizing authorization, offering valuable insights.
Securing your business's digital frontier: A comprehensive guide to identity and access management
In today's digital business landscape, the role of IAM cannot be overstated. In his piece featured on HackerNoon, Alex Olivier examines how a robust IAM strategy doesn't just shield your digital assets from threats, but also fuels operational efficiency and scalability.
The power of secure code in protecting digital environments
Adrian Bridgwater's Forbes article spotlights Alex Olivier's call to focus on an overlooked security layer: the code itself. Olivier argues that amidst advancements in network-based intrusion detection, firewalls, and SBOMs, code integrity under end-user scenarios is crucial to secure computing.