From the course: Static Application Security Testing
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
A1: Broken access controls - SonarQube Tutorial
From the course: Static Application Security Testing
A1: Broken access controls
- [Instructor] The most significant risks in the OWASP top 10 list are broken access control flaws. You learned about broken authentication earlier on keeping unauthorized users out of the application but you also need to make sure the application enforces the right security on users after they successfully log in. An authenticated user should only have access to their individual account. If access controls aren't properly enforced though, an attacker could potentially have access to functions and data that belong to another user. While automated tools might be able to detect whether access controls are missing, you really need to rely on manual testing to make sure that the access controls are properly aligned with your business rules. That lack of automated detection is one of the reasons it's so easy for broken access controls to slip into an application. Automated scanners have no way of knowing whether Dan in accounting…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
The OWASP Top 103m 26s
-
(Locked)
A1: Broken access controls6m 17s
-
(Locked)
A2: Cryptographic failures7m 29s
-
(Locked)
A3: Injection8m
-
(Locked)
A4: Insecure design5m 21s
-
(Locked)
A5: Security misconfiguration7m 58s
-
(Locked)
A6: Vulnerable and outdated components7m 8s
-
(Locked)
A7: Identification and authentication failures7m 39s
-
(Locked)
A8: Software and data integrity failures5m 49s
-
(Locked)
A9: Security logging and monitoring failures6m 55s
-
(Locked)
A10: Server-Side Request Forgery4m 58s
-
(Locked)
-