Posted on 8. September 2024
Although authorization sounds similar to authentication and a relationship between the two exists, they are not the same and play a different role in the data security process.
In 2021, Broken Access Control moved up from the fifth to the first position in the OWASP Top10. Besides, I did report some serious vulnerabilities to SaaS companies regarding unhandled authorization in the last months.
That's why it is important to know the difference between the two and what else to take care of to protect resources and information from being read or altered by third parties which should be prevented from doing so in order to secure web applications.