Data Engineering Podcast cover image

Beyond the Perimeter: Practical Patterns for Fine‑Grained Data Access

Data Engineering Podcast

00:00

Machine-to-machine access and short-lived workload identity

They explore workload identity, attestation, ephemeral credentials, and how to safely grant machines access to data.

Play episode from 31:43
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app