SlideShare a Scribd company logo
AUTHORIZATION
Security Mechanism:
Authentication
Authorization
Session Management
Data Validation
Error Handling
Logging
Encryption
Authorization Core Concepts
Is the user allowed to perform this action, within this context?
1st
2nd
Should the user be allowed this function at all?
Should the user have only limited context access?
Authorization Words to Live By
 Every function (page) must verify authorization to access
 Every function (page) must verify the access context
 Any client/server application must verify security on server
Authorization Words to Live By: #1
 The problem
– When access control checks are not applied consistently (or not at
all) users are able to access data or perform actions that they should
not be allowed to perform. This can lead to a wide range of
problems, including information exposures, denial of service, and
arbitrary code execution.
Every function (page) must verify authorization to access
Real World Example – CuteFlow Exploit
Authorization Words to Live By: #2
 The problem
– The system's access control functionality does not prevent one user
from gaining access to another user's records by modifying the key
value identifying the record.
Every function (page) must verify access context
Real World Example – Fidelity Canada
Usually, when users can directly access a PDF or other non-code file from the
web server, (e.g., resource is located in the web root) there is no opportunity for
authorization code to execute.
With a predictable structure to the filename, it only takes minutes to create a
script capable of retrieving all of the statements/reports on the site!
Sullivan, B. (2002, May 30). Glitch at Fidelity Canada exposes customer info. Retrieved June 3, 2010, from
http://www.itworldcanada.com/news/glitch-at-fidelity-canada-exposes-customer-info/124086
Authorization Words to Live By: #3
 The problem
– The software is composed of a server that relies on the client to
implement a mechanism that is intended to protect the server. An
attacker can modify the client-side behavior to bypass the protection
mechanisms.
Any client/server application must verify security on the server
Real World Example – PayPal & Vendor Issue

More Related Content

PDF
Broken access control
PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
PDF
Web application sec_3
PPTX
Data base security and injection
PPTX
06 application security fundamentals - part 2 - security mechanisms - sessi...
PPTX
Security Testing for Web Application
PPT
Security Software
PDF
E capture movie (PDF version)
Broken access control
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Web application sec_3
Data base security and injection
06 application security fundamentals - part 2 - security mechanisms - sessi...
Security Testing for Web Application
Security Software
E capture movie (PDF version)

What's hot (20)

PPTX
e-capture.net feature tour
PPTX
Mobile security and drozer tool demo
PPTX
E capture movie (updated)
PPTX
Security vulnerability
PDF
OWASP Top 10 Overview
PPTX
Android application security unveiled
PDF
Pertemuan 14 keamanan sistem operasi
PPTX
Secure Code Warrior - Defense in depth
PPT
Security Testing
PDF
Client /server security overview
PDF
Android security
PPTX
Network security
PDF
Fighting The Top 7 Threats to Cloud Cybersecurity
DOC
Cracking
PPTX
Secure Code Warrior - Logging
PPT
Web Application Security
PDF
Security-testing presentation
PPT
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
PPTX
Content filters presentation
PPTX
Security testing
e-capture.net feature tour
Mobile security and drozer tool demo
E capture movie (updated)
Security vulnerability
OWASP Top 10 Overview
Android application security unveiled
Pertemuan 14 keamanan sistem operasi
Secure Code Warrior - Defense in depth
Security Testing
Client /server security overview
Android security
Network security
Fighting The Top 7 Threats to Cloud Cybersecurity
Cracking
Secure Code Warrior - Logging
Web Application Security
Security-testing presentation
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
Content filters presentation
Security testing
Ad

Viewers also liked (6)

PPTX
Date security security principles
PPT
Info hiding
PPTX
Data security authorization and access control
PPT
OPSEC Vulnerabilities And Indicators
PPT
6. Integrity and Security in DBMS
PPTX
Security in E-commerce
Date security security principles
Info hiding
Data security authorization and access control
OPSEC Vulnerabilities And Indicators
6. Integrity and Security in DBMS
Security in E-commerce
Ad

Similar to 05 application security fundamentals - part 2 - security mechanisms - authorization (20)

PPTX
Broken Authentication and Authorization(1).pptx
PPTX
04 application security fundamentals - part 2 - security mechanisms - authe...
PPT
1 security goals
PDF
Session4-Authentication
PDF
OWASP Top 10 Proactive Control 2016 (C5-C10)
PPT
Application Security
PPTX
Authentication and session v4
PDF
What is Authentication vs Authorization Difference? | INTROSERV
PDF
Securing Internet Payment Systems
PPSX
Broken Authentication & authorization
PDF
network security.pdf
PDF
CyberSecurity101.pdf
PPTX
AusCERT 2018
PPT
Security audit
PPT
Security Audit
DOCX
ISOL536Security Architecture and DesignWeek 6Web Threa.docx
PPTX
Access Control authentication and authorization .pptx
PPTX
Secure Code Warrior - Authentication
PPTX
2 security concepts
PPTX
iovation's Dynamic Authentication Suite
Broken Authentication and Authorization(1).pptx
04 application security fundamentals - part 2 - security mechanisms - authe...
1 security goals
Session4-Authentication
OWASP Top 10 Proactive Control 2016 (C5-C10)
Application Security
Authentication and session v4
What is Authentication vs Authorization Difference? | INTROSERV
Securing Internet Payment Systems
Broken Authentication & authorization
network security.pdf
CyberSecurity101.pdf
AusCERT 2018
Security audit
Security Audit
ISOL536Security Architecture and DesignWeek 6Web Threa.docx
Access Control authentication and authorization .pptx
Secure Code Warrior - Authentication
2 security concepts
iovation's Dynamic Authentication Suite

More from appsec (10)

PPTX
23 owasp top 10 - resources
PPTX
15 owasp top 10 - a3-xss
PPTX
12 owasp top 10 - introduction
PPTX
10 application security fundamentals - part 2 - security mechanisms - encry...
PPTX
11 application security fundamentals - part 2 - security mechanisms - summary
PPTX
09 application security fundamentals - part 2 - security mechanisms - logging
PPTX
08 application security fundamentals - part 2 - security mechanisms - error...
PPTX
07 application security fundamentals - part 2 - security mechanisms - data ...
PPTX
02 application security fundamentals - part 1 - security priciples
PPTX
01 Application Security Fundamentals - part 1 - introduction and goals
23 owasp top 10 - resources
15 owasp top 10 - a3-xss
12 owasp top 10 - introduction
10 application security fundamentals - part 2 - security mechanisms - encry...
11 application security fundamentals - part 2 - security mechanisms - summary
09 application security fundamentals - part 2 - security mechanisms - logging
08 application security fundamentals - part 2 - security mechanisms - error...
07 application security fundamentals - part 2 - security mechanisms - data ...
02 application security fundamentals - part 1 - security priciples
01 Application Security Fundamentals - part 1 - introduction and goals

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
sap open course for s4hana steps from ECC to s4
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf

05 application security fundamentals - part 2 - security mechanisms - authorization

  • 2. Authorization Core Concepts Is the user allowed to perform this action, within this context? 1st 2nd Should the user be allowed this function at all? Should the user have only limited context access?
  • 3. Authorization Words to Live By  Every function (page) must verify authorization to access  Every function (page) must verify the access context  Any client/server application must verify security on server
  • 4. Authorization Words to Live By: #1  The problem – When access control checks are not applied consistently (or not at all) users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution. Every function (page) must verify authorization to access
  • 5. Real World Example – CuteFlow Exploit
  • 6. Authorization Words to Live By: #2  The problem – The system's access control functionality does not prevent one user from gaining access to another user's records by modifying the key value identifying the record. Every function (page) must verify access context
  • 7. Real World Example – Fidelity Canada Usually, when users can directly access a PDF or other non-code file from the web server, (e.g., resource is located in the web root) there is no opportunity for authorization code to execute. With a predictable structure to the filename, it only takes minutes to create a script capable of retrieving all of the statements/reports on the site! Sullivan, B. (2002, May 30). Glitch at Fidelity Canada exposes customer info. Retrieved June 3, 2010, from http://www.itworldcanada.com/news/glitch-at-fidelity-canada-exposes-customer-info/124086
  • 8. Authorization Words to Live By: #3  The problem – The software is composed of a server that relies on the client to implement a mechanism that is intended to protect the server. An attacker can modify the client-side behavior to bypass the protection mechanisms. Any client/server application must verify security on the server
  • 9. Real World Example – PayPal & Vendor Issue