OWASP Top Ten 2017 - A5 Broken Access Control

owasp-a5

Often, restrictions on what an authenticated user is allowed to do are either missing or improperly implemented.

An attacker could exploit these weaknesses to access unauthorized functionalities and data they are not entitled to access.

For example, it might be possible to access other users' accounts, view confidential files, modify other users' data, or even change their access rights.

OWASP Top 10 Application Security Risks - 2017 Reference
A5:2017-Broken Access Control OWASP


Once the user is identified, it is necessary to align the application with Business Logic and the Need To Know principle.

Every single action must consider:
1. the calling user; 2. the accessed data; 3. the type of operation.
It is important to consider not only the user's role but also whether the user owns the data and, secondly, the type of action concerning the data.

Francesco Ongaro

Request more information about this

Or call us at
(+39) 045 4853232


Recent Posts

Visit the blog


Popular Tags


🎉 We want to talk to you! Book an appointment!