Styra Hosts Cloud Native Policy Day Featuring Nine Sessions from Open Policy Agent Expert Users

A full day of advanced sessions at KubeCon + CloudNativeCon NA 2022 where attendees will learn policy-as-code best practices from real-world, production OPA use cases

San Francisco, Calif. — October 11, 2022 — Styra, Inc., the creators and maintainers of Open Policy Agent (OPA) and leader of cloud-native authorization, announced today that it is hosting Cloud Native Policy Day with OPA on October 25, 2022, at The Westin Book Cadillac Detroit, Michigan. The event is being held as part of the Cloud Native Computing Foundation’s flagship conference, KubeCon + CloudNativeCon.

Bringing the OPA community together, this event features speakers from leading enterprises to discuss and share policy-as-code best practices, key learnings and novel use cases for OPA. Attendees will see an in depth account of real-world implementations and live-coding demos from OPA end users. To register for the event, add Cloud Native Policy Day with OPA from the co-located event list selections when registering for KubeCon + CloudNativeCon NA 2022. Event-goers can also add it to their existing registration by selecting “modify” on the confirmation page or clicking the “modify” link in their confirmation email.

Upcoming Cloud Native Policy Day with Open Policy Agent Sessions

Nvidia: Extending OPA SDK to Make Policy Evaluations Dynamic!

  • Who: Sowmya Seetharaman and Jieping Lu, Senior Software Engineers
  • When: 9:05 AM ET (pre-recorded)
  • What: Hear how Nvidia’s policy decision point leverages the OPA SDK to evaluate Rego policies, uses OPA’s built-in health monitoring and audit functions, and extends the OPA runtime with additional functionalities. In this presentation, Nvidia will discuss the benefits the Policy decision point platform reaped by the implementation of OPA. 

Comcast: Correctness Checks in Client Configuration via OPA

  • Who: Andrew Wang, Principal Software Engineer, and Matthew Morrissey, Software Engineer 
  • When: 9:50 AM ET
  • What: Learn how Comcast deploys OPA to automatically check for correctness of any proposed configuration, including how these checks were incorporated in their build process, as well as how  Comcast uses OPA in its Observability platform for both its metrics team in their terraform configuration and logging team in its configuration for Elasticsearch.

Yubico: Adopting Policies and the Open Policy Agent at Yubico

  • Who: John Reese, Software Engineer
  • When: 10:50 AM ET
  • What: This presentation will discuss why Yubico adopted a policy-first approach, giving their teams more autonomy over their applications and removing the restraint of having manual reviews by integrating OPA. They’ll discuss the streamlined benefits they have since garnered, including testing of policies, generated supporting documentation and ongoing policy audits.

Chime: Getting OPA the Data it Craves with Custom Rego Batch Loading Functions

  • Who: Donovan Lampa, Engineer, and Ed Paget, Decision Platform
  • When: 11:35 AM ET
  • What: This presentation will talk about how Chime’s Decision Platform, which is supported by the OPA SDK and renders millions of decisions a day across the Chime ecosystem, provides a generic method for concurrently gathering data from various systems and integrations for use in policy evaluation.

Capital One: Styra DAS at Capital One – Federating Governance on Kubernetes and Building a Community around OPA and Rego

  • Who: Jason Burks, Director of Engineering
  • When: 1:20 PM ET
  • What: Hear how Capital One utilizes OPA to govern its infrastructure management operations and Kubernetes-based application runtime infrastructure, and how they leverage Styra DAS to help manage policies among several groups in multiple lines of business.  

Snap Inc.: Snap’s Journey to Standardizing Internal AuthZ

  • Who: Umar Faruq, Infrastructure Security Engineer
  • When: 2:05 PM ET
  • What: This presentation will focus on Snap’s need for a standardized authorization solution as their suite of internal services expanded. Their journey weighed the pros and cons of developing a unified authorization solution in house to building one on top of Open Policy Agent, a proven technology. Leading them to create a centralized access control system leveraging OPA.

T-Mobile: Protecting a Distributed Envoy Dataplane with Kubernetes and OPA

  • Who: Ian RudiePrinciple Engineer 
  • When: 2:50 PM ET
  • What: Hear the latest chapter T-Mobile’s OPA adoption story. From their origins of writing a custom validating admission controller, and writing their policies in Python, T-mobile learned the value of expressing policy in Rego. Now they’re expanding the protection OPA provides by protecting their Envoy data plane from customer misconfiguration.

Snowflake: SansShell: A Non-interactive Daemon for Host Management

  • Who: James Chacon, Principal Engineer
  • When: 3:50 PM ET
  • What: Learn how Snowflake developed SansShell, an open source tool, to help them audit actions done on a machine, and why they turned to OPA as their authorization mechanism. This session will also cover how the team worked through policy challenges as they scaled.

Styra: Authorization: The Data Gravity Problem

  • Who: Tim Hinrichs, CTO, Styra, & Co-founder, OPA 
  • When: 4:35 PM ET
  • What: Learn about some of the most popular design patterns for cloud native authorization and OPA, covering the types of policies, architectures, and data dependencies for each. Also hear about how data volume, dynamicity and consistency can effectively exert gravitational pull to influence your authorization architecture.   

For more information about Cloud Native Policy Day with OPA, visit www.styra.com/cloud-native-policy-day-with-opa-2022/.

About Styra

Styra enables enterprises to define, enforce and monitor policy across their cloud-native environments. With a combination of open source (Open Policy Agent) and commercial products (Declarative Authorization Service), Styra provides security, operations and compliance guardrails to protect applications, as well as the infrastructure they run on. Styra policy-as-code approach lets developers, DevOps, and security teams mitigate risks, reduce human error and accelerate application development. Learn more at Styra.

Cloud native
Authorization

Entitlement Explosion Repair

Join Styra and PACLabs on April 11 for a webinar exploring how organizations are using Policy as Code for smarter Access Control.

Speak with an Engineer

Request time with our team to talk about how you can modernize your access management.