You are receiving this email because either we have met, chatted, or you've visited our website cerbos.devand asked us to keep you up-to-date. If you have been forwarded this email, you can subscribeand receive future updates directly from us. If you prefer not to receive these updates, you can unsubscribe below, but we hope you stay!
Updates to Cerbos
v0.29 of Cerbos
The v0.29 release of Cerbos is packed with new features such as shared variables, support for globals, updates to scopes and more.
It’s now possible to share variable definitions between multiple policies using the new ExportVariables policy type.
A new globals object is available to policies at runtime to read environment-specific values defined in the configuration file of the Cerbos server.
When evaluating scoped policies, the default behaviour of Cerbos is to fail if a policy file with the requested scope doesn’t exist. You can now relax this requirement through a configuration setting.
This release also includes updates to the ListPolicies method on the Admin API to allow filtering and a couple of community contributions to support TLS on the Kafka log sink and improvements to the contents of the logs.
A big thank you to everyone who stopped by our booths at Collision and GopherCon EU, and chatted to Alex Olivier at London CTOs Unconference. Our team had a great time connecting with you.
Looking ahead, we're excited to announce that we'll be attending several more events in the upcoming weeks. Join us at:
At the Cloud Native Meetup, our Product Lead, Alex Olivier, will be delivering a talk that you won't want to miss! Alex will likewise be presenting at the Developer-First Security Week on August 9th, at 1pm EST.
Blog highlights
Authorization remains #1 issue - OWASP 2023 Top 10 List
Authorization remains the top issue in the OWASP Foundation 2023 Top 10 List. The top issue of 2023 is “Broken Object Level Authorization” - a specific form of Broken Access Control where unauthorized users can gain access to objects they shouldn't due to insufficient authorization checks at the object level.
We are excited to share the latest improvements to Cerbos' Query Plan Adapter for Prisma, offering enhanced support for nested relation fields to be filtered by policy conditions. Cerbos Query Plans are the solution to filtering database query results based on what a user has permissions to access derived from policy. These are dynamically generated for every unique request making use of the context about the principal making the call and the resource type they are trying to access.
The new features put together by our team are based on valuable feedback from our beta users. They are designed to further streamline workflows, and make the authorization management process of developers even more efficient and effective.