logo

Database

Summary

The system must enforce access controls on trusted enforcement points, which are not on the client's side.

Description

Systems must enforce access controls on trusted enforcement points, such as access control gateways, servers and serverless functions. Client-side access control enforcement cannot be trusted because it is prone to being bypassed and/or tampered with.

References

Weaknesses