Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

If the application has a higher security risk, step-up authentication needs to be implemented to access high value/risk transactions.

OWASP has an access control cheat sheet where you can find more information about the different types of access control and how to safely implement them.

...