Software Security | Access Control (2024)

[1] Salesforce Developers Technical Library Secure Coding Guidelines - Authorization and Access Control

[2] Salesforce Developers Technical Library Testing CRUD and FLS Enforcement

[3] Salesforce Developers Technical Library Enforcing CRUD and FLS

[4] Salesforce Developers Technical Library Visualforce Developers Guide - Standard Controllers

[5] Standards Mapping - CIS Azure Kubernetes Service Benchmark

3.0

[6] Standards Mapping - CIS Amazon Elastic Kubernetes Service Benchmark

1.0

[7] Standards Mapping - CIS Amazon Web Services Foundations Benchmark

1

[8] Standards Mapping - CIS Google Kubernetes Engine Benchmark

confidentiality

[9] Standards Mapping - CIS Kubernetes Benchmark

complete

[10] Standards Mapping - Common Weakness Enumeration

CWE ID 566

[11] Standards Mapping - Common Weakness Enumeration Top 25 2023

[24] CWE ID 863

[12] Standards Mapping - DISA Control Correlation Identifier Version 2

CCI-000213, CCI-001084, CCI-002165

[13] Standards Mapping - FIPS200

AC

[14] Standards Mapping - General Data Protection Regulation (GDPR)

Access Violation

[15] Standards Mapping - NIST Special Publication 800-53 Revision 4

AC-3 Access Enforcement (P1)

[16] Standards Mapping - NIST Special Publication 800-53 Revision 5

AC-3 Access Enforcement

[18] Standards Mapping - OWASP Top 10 2007

A4 Insecure Direct Object Reference

[19] Standards Mapping - OWASP Top 10 2010

A4 Insecure Direct Object References

[20] Standards Mapping - OWASP Top 10 2013

A4 Insecure Direct Object References

[21] Standards Mapping - OWASP Top 10 2017

A5 Broken Access Control

[22] Standards Mapping - OWASP Top 10 2021

A01 Broken Access Control

[23] Standards Mapping - OWASP Application Security Verification Standard 4.0

1.2.2 Authentication Architectural Requirements (L2 L3), 1.2.3 Authentication Architectural Requirements (L2 L3), 1.2.4 Authentication Architectural Requirements (L2 L3), 1.4.2 Access Control Architectural Requirements (L2 L3), 1.4.4 Access Control Architectural Requirements (L2 L3), 2.7.1 Out of Band Verifier Requirements (L1 L2 L3), 2.7.2 Out of Band Verifier Requirements (L1 L2 L3), 2.7.3 Out of Band Verifier Requirements (L1 L2 L3), 2.8.4 Single or Multi Factor One Time Verifier Requirements (L2 L3), 2.8.5 Single or Multi Factor One Time Verifier Requirements (L2 L3), 3.7.1 Defenses Against Session Management Exploits (L1 L2 L3), 4.1.2 General Access Control Design (L1 L2 L3), 4.1.3 General Access Control Design (L1 L2 L3), 4.1.5 General Access Control Design (L1 L2 L3), 4.2.1 Operation Level Access Control (L1 L2 L3), 8.3.4 Sensitive Private Data (L1 L2 L3), 9.2.3 Server Communications Security Requirements (L2 L3), 10.2.1 Malicious Code Search (L2 L3), 13.1.4 Generic Web Service Security Verification Requirements (L2 L3), 14.5.1 Validate HTTP Request Header Requirements (L1 L2 L3), 14.5.4 Validate HTTP Request Header Requirements (L1 L2 L3)

[24] Standards Mapping - OWASP Mobile 2014

M5 Poor Authorization and Authentication

[25] Standards Mapping - OWASP Mobile 2023

M3 Insecure Authentication/Authorization

[26] Standards Mapping - OWASP Mobile 2024

M3 Insecure Authentication/Authorization

[27] Standards Mapping - OWASP Mobile Application Security Verification Standard 2.0

MASVS-AUTH-1

[28] Standards Mapping - Payment Card Industry Data Security Standard Version 1.1

Requirement 6.5.2

[29] Standards Mapping - Payment Card Industry Data Security Standard Version 1.2

Requirement 6.5.4

[30] Standards Mapping - Payment Card Industry Data Security Standard Version 2.0

Requirement 6.5.8

[31] Standards Mapping - Payment Card Industry Data Security Standard Version 3.0

Requirement 6.5.8

[32] Standards Mapping - Payment Card Industry Data Security Standard Version 3.1

Requirement 6.5.8

[33] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2

Requirement 6.5.8

[34] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2.1

Requirement 6.5.8

[35] Standards Mapping - Payment Card Industry Data Security Standard Version 4.0

Requirement 6.2.4

[36] Standards Mapping - Payment Card Industry Software Security Framework 1.0

Control Objective 5.4 - Authentication and Access Control

[37] Standards Mapping - Payment Card Industry Software Security Framework 1.1

Control Objective 5.4 - Authentication and Access Control

[38] Standards Mapping - Payment Card Industry Software Security Framework 1.2

Control Objective 5.4 - Authentication and Access Control, Control Objective C.2.3 - Web Software Access Controls

[39] Standards Mapping - SANS Top 25 2011

Porous Defenses - CWE ID 863

[40] Standards Mapping - Security Technical Implementation Guide Version 3.1

APP3480.1 CAT II

[41] Standards Mapping - Security Technical Implementation Guide Version 3.4

APP3480.1 CAT I

[42] Standards Mapping - Security Technical Implementation Guide Version 3.5

APP3480.1 CAT I

[43] Standards Mapping - Security Technical Implementation Guide Version 3.6

APP3480.1 CAT I

[44] Standards Mapping - Security Technical Implementation Guide Version 3.7

APP3480.1 CAT I

[45] Standards Mapping - Security Technical Implementation Guide Version 3.9

APP3480.1 CAT I

[46] Standards Mapping - Security Technical Implementation Guide Version 3.10

APP3480.1 CAT I

[47] Standards Mapping - Security Technical Implementation Guide Version 4.1

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[48] Standards Mapping - Security Technical Implementation Guide Version 4.2

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[49] Standards Mapping - Security Technical Implementation Guide Version 4.3

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[50] Standards Mapping - Security Technical Implementation Guide Version 4.4

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[51] Standards Mapping - Security Technical Implementation Guide Version 4.5

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[52] Standards Mapping - Security Technical Implementation Guide Version 4.6

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[53] Standards Mapping - Security Technical Implementation Guide Version 4.7

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[54] Standards Mapping - Security Technical Implementation Guide Version 4.8

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[55] Standards Mapping - Security Technical Implementation Guide Version 4.9

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[56] Standards Mapping - Security Technical Implementation Guide Version 4.10

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[57] Standards Mapping - Security Technical Implementation Guide Version 4.11

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[58] Standards Mapping - Security Technical Implementation Guide Version 5.1

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[59] Standards Mapping - Security Technical Implementation Guide Version 5.2

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-002360 CAT II

[60] Standards Mapping - Security Technical Implementation Guide Version 5.3

APSC-DV-000460 CAT I, APSC-DV-000470 CAT II, APSC-DV-001280 CAT II, APSC-DV-001290 CAT II, APSC-DV-001300 CAT II, APSC-DV-001310 CAT II, APSC-DV-001320 CAT II, APSC-DV-001330 CAT II, APSC-DV-001410 CAT II, APSC-DV-002310 CAT I, APSC-DV-002360 CAT II, APSC-DV-002960 CAT II

[61] Standards Mapping - Web Application Security Consortium Version 2.00

Insufficient Authorization (WASC-02)

[62] Standards Mapping - Web Application Security Consortium 24 + 2

Insufficient Authorization
Software Security | Access Control (2024)
Top Articles
Latest Posts
Article information

Author: Rubie Ullrich

Last Updated:

Views: 6678

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Rubie Ullrich

Birthday: 1998-02-02

Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

Phone: +2202978377583

Job: Administration Engineer

Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.