Addressing the security audit findings
In this section, we will meticulously examine the outcomes of our security audit, shedding light on the vulnerabilities and areas of concern within our application’s security landscape. We’ll dissect the audit results and embark on a journey to explore various effective strategies and patterns to secure and mitigate these identified risks. This chapter serves as a roadmap for enhancing the robustness of our application’s security, ensuring it stays resilient against potential threats and vulnerabilities.
Authentication
Authentication is one of two key security concepts that you must internalize when developing secure applications (the other being authorization). Authentication identifies who is attempting to request a resource. You may be familiar with authentication in your daily online and offline life, in very different contexts, as follows:
- Credential-based authentication: When you log in to your web-based...