Fork me on GitHub

Implementation -> Infrastructure Hardening: Role based authentication and authorization

Risk and Opportunity

Risk: Everyone is able to get unauthorized access to information on systems or to modify information unauthorized on systems.
Opportunity: The usage of a (role based) access control helps to restrict system access to authorized users.

Exploit details

Usefullness: Medium
Required knowledge: Low (one discipline)
Required time: Medium
Required resources (systems): Very Low

Additional Information

Dependencies: Defined deployment process, Defined build process
Implementation hints: Directory Service, Plugins
OWASP SAMM 2 Mapping: o-environment-management|A|1
ISO27001:2017 Controls Mapping: