Click a principle to expand layered guidance for builders and defenders.
Multiple independent controls so one failure does not equal total compromise.
Narrow identities and permissions to the minimum needed for the task and duration.
| Authentication | Authorization | |
|---|---|---|
| Question | Who are you? | What may you do? |
| Examples | MFA login, OAuth, mTLS | RBAC, ABAC, IAM policies |
| Failure mode | Stolen session / credential | IDOR, privilege escalation |
Authenticate once per session or token lifetime; authorize every sensitive action. Log both identity and decision outcome for audit.
Never assume trust based on network location alone; verify explicitly, use least privilege, and assume breach.