OWASP Top 10: A01:2021-Broken Access Control
Resource authorization occurs after successful authentication. Resources include objects such as files folders web apps storage accounts virtual machines and more. In this course learn about various resource access control models including mandatory (MAC) discretionary (DAC) role-based (RBAC) and attribute-based access control (ABAC). Next examine how broken access control attacks occur and how HTTP requests and responses interact with web applications. Discover how to set file system permissions in Windows and Linux assign permissions to code and digitally sign a PowerShell script. Finally explore identity federation and how to execute and mitigate broken access control attacks. Upon completion youll be able to harden resource access to mitigate broken access control attacks.