A common approach to application security is role-based access control (RBAC). Under this system, an administrator assigns individuals to roles and then authorizes those roles to perform certain actions within the system. As we adopt immutable architectures, RBAC becomes more challenging. Requiring an administrator to assign roles and permissions reduces the autonomy of individual users. Consulting a single source of truth for those roles and permissions reduces the autonomy of client nodes. The access control model begins to work against the advantages that we fought so hard to achieve. ...
7. Security
Get The Art of Immutable Architecture: Theory and Practice of Data Management in Distributed Systems now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.