From the course: Cybersecurity Foundations: Application Security
Unlock the full course today
Join today to access over 24,500 courses taught by industry experts.
Improper authorization
From the course: Cybersecurity Foundations: Application Security
Improper authorization
- [Instructor] When developing the access control mechanisms for an application, after you confirm that a user is indeed who they say they are, also known as authentication, you then need to assign them rights and roles on the system. This is known as authorization. Basic system rights include administrator that typically has full access to the system, user that can perform general functions, and reader with read-only access to the system. More complex systems have more complex rights and roles, depending on the organizational context. Authorization should be assigned in-line with the information security principle of least privilege, which is to assign a user the least amount of permissions needed for them to execute their work. Improper authorization occurs when a logged-in user is able to perform functions beyond the rights that have been assigned to them. Not to be confused with improper authentication,…