Broken Access Control

The OWASP top 10 is a standard document to create awareness on the ten most critical security vulnerabilities affecting web applications. This document is on the 2021 edition.

Introduction

Access control is deciding who has access to what. Example, the pin or fingerprint configured on your mobile phones is a form of access control, it determines who can unlock your phone and have access. If you are conscious of your privacy, you could even put pin code or fingerprint requirement on specific apps on your phone to further control access to sensitive data.

Definition

Now more formally, in this context, access control is the implementation of and administrative controls to protect the confidentiality of an asset(data)

cyb ndy
© 2023 Designed & Developed by Cybandy