All Collections
Indigo Product Security and Management
Protection against broken access; 3 ways to control who has access to your system
Protection against broken access; 3 ways to control who has access to your system
Marie Claire Saliba avatar
Written by Marie Claire Saliba
Updated over a week ago

A broken access control vulnerability is one where a user has unauthorized access to data in an application. Unauthorized access occurs when authentication checks are not properly configured. Attackers exploit broken access control so that they can access sensitive files and data.

Here are three ways you can control who has access to data in your system:

Did this answer your question?