Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementCybersecurity News

5 minutes with Tehila Shneider - Authorization policy management in the enterprise

By Maria Henriquez
5 m with Shneider
May 26, 2021

While authentication and authorization might sound similar, they are two distinct security processes in the identity and access management (IAM) space. Authentication is the security practice of confirming that someone is who they claim to be, while authorization is the process of establishing the rights and privileges of a user. Here, we talk to Tehila Shneider about authorization, authentication, and why authorizations remains a problem that is mostly unsolved. 

 

Security: What is your background and current role?

Shneider: My current role is VP of R&D at build.security where I lead the development team. I hold a Masters in Computer Science, and my experience is in leading R&D groups across multiple domains, including the fields of mobility, artificial intelligence and in the defense industry of Israel. 

 

Security: Why are authorization, access controls and permissions a big challenge for developers?

Shneider: Authorization is incredibly complex.  You are managing users, groups, policies and resources whose hierarchies and relationships are constantly changing across your applications and infrastructure. Permissions for different resources might get updated frequently, and that needs to be reflected in your authorization across very large environments. 

And at the backbone of access management is policy, which is driving the decision engine for your application. Authoring, managing and testing policies can be grueling and trying to manage this across all of your systems isn’t an easy task.

So when you decide to build an authorization system in-house, which most organizations do today, you need to build something that is high performance, low latency and can provide flexibility and scalability as you grow.  You also need to build it in a secure way that can ensure proper access to your organization’s most valuable resources and can pass security audits.

You end up devoting a significant amount of engineering resources to build it and managing it can be very laborious.  

 

Security: Why does authorization, unlike authentication, remain a problem that is mostly unsolved, in your opinion?

Shneider: You think about access management as having two pillars - authorization and authentication. Authentication, by its very nature, is somewhat simplistic. It’s binary and it happens once in a session. Authentication gives us the ability to recognize a user’s identity given a certain set of credentials so really, the only choice becomes what service will I use (Okta/Auth0/etc) in order to manage it.

Its complexity makes it difficult to build ‘the solution’ for managing authorization and policy management. Trying to author a policy that gives a user access to a specific row or column in a database, or granting API access according to HTTP method, headers, JWT tokens, claims, geolocation or other environmental context is not easy -- even for the most seasoned developers. There are numerous sources of data involved in the process of making an authorization decision. Trying to manage policy across all of your systems with those data sources will continue to pose a challenge to most engineering teams.  

 

Security: How does this issue impact enterprise security?

Shneider: Authorization is ultimately responsible for who has access to your applications, services or resources. If any of these are touching PII, financial or other sensitive data, your entire enterprise security is potentially at risk. Broken access controls are listed in OWASP’s Top 10 Web Application Security Risks. Developers are playing a key role as gatekeepers of the sensitive data found in enterprise applications. As responsibility for secure code shifts left, developers are tasked with overseeing key security measures in application development, chief among them authorization and authentication. The time consuming, confusing and error-prone nature of these processes heightens the risk of insufficient software protection, leaving enterprises vulnerable to exploitation. 

 

Security: What are steps enterprise security leaders can keep in mind in regards to their authorization policies?

Shneider: 

  1. With a zero-trust security model, you always want to enforce policies in a way that doesn’t make assumptions about when/where the policy is being enforced. For instance, you don’t want to assume that a specific API call happens only after it has successfully passed a subsequent policy. You want to enforce policy each and every time.  
  2. Unlike authentication, authorization policy checks can happen thousands of times during the course of a session. Because these calls happen so frequently, you need to ensure your authorization service coexists seamlessly with your application, preferably on the same host. It’s obviously not feasible to go back to a distant service for every API call. This means your policy decision point needs to sit as close to the application as possible in order to reduce latency and maintain high performance. 
  3. Consider the different types of data sources you may need in order to make policy decisions. If access is allowed or denied based on the status of a Jira ticket, an account status in Salesforce or the employee type in Workday, the data from these applications needs to be brought closer to the authorization service. If each API call means going to the database in Salesforce to retrieve that information, latency and performance is going to be a problem. Bringing this data closer to the authorization service via caching allows you to fetch that information in real time in order to make a decision. 
  4. Adopt both policy as code as well as security as code if you haven’t already. This will allow you to author, review, test, enforce your policies before they are put into production. 
  5. We strongly encourage engineering teams to decouple their policy from the code. We speak to a lot of teams that end up baking their policy and decision making into their applications, but by doing so, it becomes incredibly difficult to manage your policies across all of your applications and infrastructure. 
KEYWORDS: access control authentication enterprise security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Half open laptop

4 Data Security Incidents to Know About (February 2026)

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Woman in suit

Can the Industry Do More for Women in Security?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • 5 mins with Prout

    5 minutes with Jeremy Prout - How to protect the workforce against security risks in 2021

    See More
  • 5 mins with Ehret

    5 minutes with Jonathan Ehret – The need for third-party risk management in cybersecurity

    See More
  • SEC_Web_5Minutes-Reinhold-1221_1170x658.jpg

    5 minutes with Tracy Reinhold: Critical event management for enterprise resilience

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products

Events

View AllSubmit An Event
  • April 21, 2026

    The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

    Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing