<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — Authorization / Broken Access Control</title>
  <link>https://appsec.fyi/authz.html</link>
  <description>Curated Authorization / Broken Access Control resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/authz.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Wed, 22 Apr 2026 18:38:42 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>Rights Management Approaches: ACL, RBAC, ABAC, ReBAC</title>
    <link>https://system-design.space/en/chapter/access-control-models-acl-rbac-abac-rebac/</link>
    <guid isPermaLink="true">https://system-design.space/en/chapter/access-control-models-acl-rbac-abac-rebac/</guid>
    <description>Rights Management Approaches: ACL, RBAC, ABAC, ReBAC</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:29 +0000</pubDate>
  </item>
  <item>
    <title>OPA, Cedar, OpenFGA: Why Are Policy Languages Trending Right Now?</title>
    <link>https://dev.to/permit_io/opa-cedar-openfga-why-are-policy-languages-trending-right-now-g7e</link>
    <guid isPermaLink="true">https://dev.to/permit_io/opa-cedar-openfga-why-are-policy-languages-trending-right-now-g7e</guid>
    <description>OPA, Cedar, OpenFGA: Why Are Policy Languages Trending Right Now?</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:28 +0000</pubDate>
  </item>
  <item>
    <title>OPA vs OpenFGA: A Technical Comparison of Policy Engines</title>
    <link>https://madappgang.com/blog/opa-vs-openfga-a-comprehensive-technical-compariso/</link>
    <guid isPermaLink="true">https://madappgang.com/blog/opa-vs-openfga-a-comprehensive-technical-compariso/</guid>
    <description>OPA vs OpenFGA: A Technical Comparison of Policy Engines</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:27 +0000</pubDate>
  </item>
  <item>
    <title>Implementing Google Zanzibar: A Demonstration of Its Basics</title>
    <link>https://permify.co/post/exploring-google-zanzibar-a-demonstration-of-its-basics</link>
    <guid isPermaLink="true">https://permify.co/post/exploring-google-zanzibar-a-demonstration-of-its-basics</guid>
    <description>Implementing Google Zanzibar: A Demonstration of Its Basics</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:27 +0000</pubDate>
  </item>
  <item>
    <title>How to Protect Your API with OpenFGA: ReBAC Concepts to Practical Usage</title>
    <link>https://getlarge.eu/blog/how-to-protect-your-api-with-openfga/</link>
    <guid isPermaLink="true">https://getlarge.eu/blog/how-to-protect-your-api-with-openfga/</guid>
    <description>How to Protect Your API with OpenFGA: ReBAC Concepts to Practical Usage</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:26 +0000</pubDate>
  </item>
  <item>
    <title>How Google Drive Models Authorization: A Look into Zanzibar</title>
    <link>https://www.aserto.com/blog/google-zanzibar-drive-rebac-authorization-model</link>
    <guid isPermaLink="true">https://www.aserto.com/blog/google-zanzibar-drive-rebac-authorization-model</guid>
    <description>How Google Drive Models Authorization: A Look into Zanzibar</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:25 +0000</pubDate>
  </item>
  <item>
    <title>Common Bug Bounty Vulnerabilities: A Technical Deep Dive for Hunters in 2026</title>
    <link>https://www.redfoxsec.com/blog/common-bug-bounty-vulnerabilities-a-technical-deep-dive-for-hunters-in-2026</link>
    <guid isPermaLink="true">https://www.redfoxsec.com/blog/common-bug-bounty-vulnerabilities-a-technical-deep-dive-for-hunters-in-2026</guid>
    <description>Common Bug Bounty Vulnerabilities: A Technical Deep Dive for Hunters in 2026</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:24 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-32877 - Red Hat Security Advisory</title>
    <link>https://access.redhat.com/security/cve/cve-2026-32877</link>
    <guid isPermaLink="true">https://access.redhat.com/security/cve/cve-2026-32877</guid>
    <description>CVE-2026-32877 - Red Hat Security Advisory</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:24 +0000</pubDate>
  </item>
  <item>
    <title>CVE 2026: When Identity Breaks and Legacy Code Bites Back</title>
    <link>https://www.penligent.ai/hackinglabs/cve-2026-the-vulnerability-landscape-when-identity-breaks-and-legacy-code-bites-back/</link>
    <guid isPermaLink="true">https://www.penligent.ai/hackinglabs/cve-2026-the-vulnerability-landscape-when-identity-breaks-and-legacy-code-bites-back/</guid>
    <description>CVE 2026: When Identity Breaks and Legacy Code Bites Back</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:23 +0000</pubDate>
  </item>
  <item>
    <title>What is Google Zanzibar?</title>
    <link>https://workos.com/guide/google-zanzibar</link>
    <guid isPermaLink="true">https://workos.com/guide/google-zanzibar</guid>
    <description>What is Google Zanzibar?</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Wed, 22 Apr 2026 12:52:22 +0000</pubDate>
  </item>
  <item>
    <title>The Hidden Security Risks in Outsourced Web Development and How to Manage Them</title>
    <link>https://cybersecuritynews.com/outsourced-web-development-security-risks/</link>
    <guid isPermaLink="true">https://cybersecuritynews.com/outsourced-web-development-security-risks/</guid>
    <description>The Hidden Security Risks in Outsourced Web Development — and How to Manage Them https://ift.tt/rPHZ1f5</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Tue, 21 Apr 2026 00:03:44 +0000</pubDate>
  </item>
  <item>
    <title>Broken Access Control: The Quiet Killer in Web Applications</title>
    <link>https://infosecwriteups.com/broken-access-control-the-quiet-killer-in-web-applications-79cb85f72cd8</link>
    <guid isPermaLink="true">https://infosecwriteups.com/broken-access-control-the-quiet-killer-in-web-applications-79cb85f72cd8</guid>
    <description>Broken Access Control: The Quiet Killer in Web Applications</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sun, 19 Apr 2026 02:22:15 +0000</pubDate>
  </item>
  <item>
    <title>OWASP Top 10 2025: IAAA Failures TryHackMe Writeup</title>
    <link>https://alban.ee/writeups/owasp-top-10-2025-iaaa-failures.html</link>
    <guid isPermaLink="true">https://alban.ee/writeups/owasp-top-10-2025-iaaa-failures.html</guid>
    <description>OWASP Top 10 2025: IAAA Failures TryHackMe Writeup</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sun, 19 Apr 2026 02:22:14 +0000</pubDate>
  </item>
  <item>
    <title>Broken Access Control: The Silent Web Vulnerability</title>
    <link>https://cybersecuritywriteups.com/broken-access-control-the-silent-web-vulnerability-hackers-exploit-to-bypass-security-6b9608935dbb</link>
    <guid isPermaLink="true">https://cybersecuritywriteups.com/broken-access-control-the-silent-web-vulnerability-hackers-exploit-to-bypass-security-6b9608935dbb</guid>
    <description>Broken Access Control: The Silent Web Vulnerability</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sun, 19 Apr 2026 02:22:13 +0000</pubDate>
  </item>
  <item>
    <title>Broken Access Control: The 40% Surge in 2025</title>
    <link>https://instatunnel.my/blog/broken-access-control-the-40-surge-in-2025s-most-exploited-vulnerability</link>
    <guid isPermaLink="true">https://instatunnel.my/blog/broken-access-control-the-40-surge-in-2025s-most-exploited-vulnerability</guid>
    <description>Broken Access Control: The 40% Surge in 2025</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sun, 19 Apr 2026 02:22:12 +0000</pubDate>
  </item>
  <item>
    <title>OWASP Top 10 2025 — A01 Broken Access Control</title>
    <link>https://owasp.org/Top10/2025/A01_2025-Broken_Access_Control/</link>
    <guid isPermaLink="true">https://owasp.org/Top10/2025/A01_2025-Broken_Access_Control/</guid>
    <description>OWASP Top 10 2025 — A01 Broken Access Control</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sun, 19 Apr 2026 02:22:11 +0000</pubDate>
  </item>
  <item>
    <title>Enhancing OAuth 2.0 Security with PKCE: Deep Dive</title>
    <link>https://engineering.omnissa.com/story/2025-07-15-enhancing-oauth-2-0-security-with-pkce</link>
    <guid isPermaLink="true">https://engineering.omnissa.com/story/2025-07-15-enhancing-oauth-2-0-security-with-pkce</guid>
    <description>Enhancing OAuth 2.0 Security with PKCE: Deep Dive</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:11 +0000</pubDate>
  </item>
  <item>
    <title>Attacks via OAuth Authorization Code Injection</title>
    <link>https://medium.com/@anador/attacks-via-a-new-oauth-flow-authorization-code-injection-and-whether-httponly-pkce-and-bff-3db1624b4fa7</link>
    <guid isPermaLink="true">https://medium.com/@anador/attacks-via-a-new-oauth-flow-authorization-code-injection-and-whether-httponly-pkce-and-bff-3db1624b4fa7</guid>
    <description>Attacks via OAuth Authorization Code Injection</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:11 +0000</pubDate>
  </item>
  <item>
    <title>Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA</title>
    <link>https://goteleport.com/blog/benchmarking-policy-languages/</link>
    <guid isPermaLink="true">https://goteleport.com/blog/benchmarking-policy-languages/</guid>
    <description>Security Benchmarking Authorization Policy Engines: Rego, Cedar, OpenFGA</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:10 +0000</pubDate>
  </item>
  <item>
    <title>Privilege Escalation by JWT Token Manipulation</title>
    <link>https://medium.com/@kisna1993yadav/privilege-escalation-by-jwt-token-manipulation-e91d3c54d1e4</link>
    <guid isPermaLink="true">https://medium.com/@kisna1993yadav/privilege-escalation-by-jwt-token-manipulation-e91d3c54d1e4</guid>
    <description>Privilege Escalation by JWT Token Manipulation</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:09 +0000</pubDate>
  </item>
  <item>
    <title>JWTs Under the Microscope: Exploiting Auth Weaknesses - Traceable</title>
    <link>https://www.traceable.ai/blog-post/jwts-under-the-microscope-how-attackers-exploit-authentication-and-authorization-weaknesses</link>
    <guid isPermaLink="true">https://www.traceable.ai/blog-post/jwts-under-the-microscope-how-attackers-exploit-authentication-and-authorization-weaknesses</guid>
    <description>JWTs Under the Microscope: Exploiting Auth Weaknesses - Traceable</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:08 +0000</pubDate>
  </item>
  <item>
    <title>Privilege Escalation via IDOR and ACL Bypass in SaaS</title>
    <link>https://medium.com/@kumarmohank889/privilege-escalation-via-idor-and-acl-bypass-in-a-saas-application-e079bcd2cc4a</link>
    <guid isPermaLink="true">https://medium.com/@kumarmohank889/privilege-escalation-via-idor-and-acl-bypass-in-a-saas-application-e079bcd2cc4a</guid>
    <description>Privilege Escalation via IDOR and ACL Bypass in SaaS</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:08 +0000</pubDate>
  </item>
  <item>
    <title>Organization Takeover via Privilege Escalation (IDOR)</title>
    <link>https://ehteshamulhaq198.medium.com/organization-takeover-via-privilege-escalation-idor-14786a2fa174</link>
    <guid isPermaLink="true">https://ehteshamulhaq198.medium.com/organization-takeover-via-privilege-escalation-idor-14786a2fa174</guid>
    <description>Organization Takeover via Privilege Escalation (IDOR)</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:07 +0000</pubDate>
  </item>
  <item>
    <title>Horizontal Privilege Escalation via IDOR</title>
    <link>https://scriptjacker.medium.com/horizontal-privilege-escalation-via-idor-viewing-editing-and-deleting-b10936ad4eb1</link>
    <guid isPermaLink="true">https://scriptjacker.medium.com/horizontal-privilege-escalation-via-idor-viewing-editing-and-deleting-b10936ad4eb1</guid>
    <description>Horizontal Privilege Escalation via IDOR</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:06 +0000</pubDate>
  </item>
  <item>
    <title>Fine-Grained Authorization: Technical Guide for Microservices</title>
    <link>https://grabtheaxe.com/fine-grained-authorization-guide-microservices/</link>
    <guid isPermaLink="true">https://grabtheaxe.com/fine-grained-authorization-guide-microservices/</guid>
    <description>Fine-Grained Authorization: Technical Guide for Microservices</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:06 +0000</pubDate>
  </item>
  <item>
    <title>RBAC vs ABAC vs ReBAC: How to Choose Access Control Models</title>
    <link>https://dev.to/kanywst/rbac-vs-abac-vs-rebac-how-to-choose-and-implement-access-control-models-3i2d</link>
    <guid isPermaLink="true">https://dev.to/kanywst/rbac-vs-abac-vs-rebac-how-to-choose-and-implement-access-control-models-3i2d</guid>
    <description>RBAC vs ABAC vs ReBAC: How to Choose Access Control Models</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Thu, 16 Apr 2026 21:03:05 +0000</pubDate>
  </item>
  <item>
    <title>RBAC vs ABAC vs PBAC - Styra</title>
    <link>https://www.styra.com/blog/what-is-rbac-vs-abac-vs-pbac/</link>
    <guid isPermaLink="true">https://www.styra.com/blog/what-is-rbac-vs-abac-vs-pbac/</guid>
    <description>RBAC vs ABAC vs PBAC - Styra</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:39 +0000</pubDate>
  </item>
  <item>
    <title>Policy as Code: Fine-Grained Authorization</title>
    <link>https://www.permit.io/blog/policy-as-code-or-from-infrastructure-to-fine-grained-authorization</link>
    <guid isPermaLink="true">https://www.permit.io/blog/policy-as-code-or-from-infrastructure-to-fine-grained-authorization</guid>
    <description>Policy as Code: Fine-Grained Authorization</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:37 +0000</pubDate>
  </item>
  <item>
    <title>Policy Engine Showdown: OPA vs OpenFGA vs Cedar</title>
    <link>https://www.permit.io/blog/policy-engine-showdown-opa-vs-openfga-vs-cedar</link>
    <guid isPermaLink="true">https://www.permit.io/blog/policy-engine-showdown-opa-vs-openfga-vs-cedar</guid>
    <description>Policy Engine Showdown: OPA vs OpenFGA vs Cedar</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:36 +0000</pubDate>
  </item>
  <item>
    <title>ReBAC Authorization Academy - Oso</title>
    <link>https://www.osohq.com/academy/relationship-based-access-control-rebac</link>
    <guid isPermaLink="true">https://www.osohq.com/academy/relationship-based-access-control-rebac</guid>
    <description>ReBAC Authorization Academy - Oso</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:35 +0000</pubDate>
  </item>
  <item>
    <title>RBAC vs ABAC vs PBAC - Oso</title>
    <link>https://www.osohq.com/learn/rbac-vs-abac-vs-pbac</link>
    <guid isPermaLink="true">https://www.osohq.com/learn/rbac-vs-abac-vs-pbac</guid>
    <description>RBAC vs ABAC vs PBAC - Oso</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:34 +0000</pubDate>
  </item>
  <item>
    <title>RBAC vs ABAC vs ReBAC - Oso</title>
    <link>https://www.osohq.com/learn/rbac-vs-abac-vs-rebac-what-is-the-best-access-policy-paradigm</link>
    <guid isPermaLink="true">https://www.osohq.com/learn/rbac-vs-abac-vs-rebac-what-is-the-best-access-policy-paradigm</guid>
    <description>RBAC vs ABAC vs ReBAC - Oso</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:33 +0000</pubDate>
  </item>
  <item>
    <title>Fine Grained Authorization using SpiceDB for RAG</title>
    <link>https://authzed.com/blog/fine-grained-authorization-using-spicedb-for-retrieval-augmented-generation-rag</link>
    <guid isPermaLink="true">https://authzed.com/blog/fine-grained-authorization-using-spicedb-for-retrieval-augmented-generation-rag</guid>
    <description>Fine Grained Authorization using SpiceDB for RAG</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:31 +0000</pubDate>
  </item>
  <item>
    <title>Relationship-Based Permissions in SpiceDB</title>
    <link>https://authzed.com/blog/writing-relationships-to-spicedb</link>
    <guid isPermaLink="true">https://authzed.com/blog/writing-relationships-to-spicedb</guid>
    <description>Relationship-Based Permissions in SpiceDB</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:30 +0000</pubDate>
  </item>
  <item>
    <title>Introduction to Google Zanzibar</title>
    <link>https://authzed.com/learn/google-zanzibar</link>
    <guid isPermaLink="true">https://authzed.com/learn/google-zanzibar</guid>
    <description>Introduction to Google Zanzibar</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:30 +0000</pubDate>
  </item>
  <item>
    <title>OpenFGA: Open-Source Engine for Access Control</title>
    <link>https://www.helpnetsecurity.com/2025/10/22/openfga-open-source-access-control/</link>
    <guid isPermaLink="true">https://www.helpnetsecurity.com/2025/10/22/openfga-open-source-access-control/</guid>
    <description>OpenFGA: Open-Source Engine for Access Control</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:29 +0000</pubDate>
  </item>
  <item>
    <title>Announcing OpenFGA</title>
    <link>https://auth0.com/blog/auth0s-openfga-open-source-fine-grained-authorization-system/</link>
    <guid isPermaLink="true">https://auth0.com/blog/auth0s-openfga-open-source-fine-grained-authorization-system/</guid>
    <description>Announcing OpenFGA</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:28 +0000</pubDate>
  </item>
  <item>
    <title>Authorization Concepts - OpenFGA</title>
    <link>https://openfga.dev/docs/authorization-concepts</link>
    <guid isPermaLink="true">https://openfga.dev/docs/authorization-concepts</guid>
    <description>Authorization Concepts - OpenFGA</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:27 +0000</pubDate>
  </item>
  <item>
    <title>Cedar Policy Language Complete Guide</title>
    <link>https://www.strongdm.com/cedar-policy-language</link>
    <guid isPermaLink="true">https://www.strongdm.com/cedar-policy-language</guid>
    <description>Cedar Policy Language Complete Guide</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:27 +0000</pubDate>
  </item>
  <item>
    <title>Amazon Verified Permissions - Cedar</title>
    <link>https://aws.amazon.com/verified-permissions/</link>
    <guid isPermaLink="true">https://aws.amazon.com/verified-permissions/</guid>
    <description>Amazon Verified Permissions - Cedar</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:26 +0000</pubDate>
  </item>
  <item>
    <title>Cedar Policy Language Reference</title>
    <link>https://docs.cedarpolicy.com/</link>
    <guid isPermaLink="true">https://docs.cedarpolicy.com/</guid>
    <description>Cedar Policy Language Reference</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:25 +0000</pubDate>
  </item>
  <item>
    <title>Basic ABAC with OPA and Rego - AWS</title>
    <link>https://docs.aws.amazon.com/prescriptive-guidance/latest/saas-multitenant-api-access-authorization/opa-abac-examples.html</link>
    <guid isPermaLink="true">https://docs.aws.amazon.com/prescriptive-guidance/latest/saas-multitenant-api-access-authorization/opa-abac-examples.html</guid>
    <description>Basic ABAC with OPA and Rego - AWS</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:25 +0000</pubDate>
  </item>
  <item>
    <title>OPA Rego Language Tutorial</title>
    <link>https://spacelift.io/blog/open-policy-agent-rego</link>
    <guid isPermaLink="true">https://spacelift.io/blog/open-policy-agent-rego</guid>
    <description>OPA Rego Language Tutorial</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:24 +0000</pubDate>
  </item>
  <item>
    <title>What is Open Policy Agent (OPA)?</title>
    <link>https://www.wiz.io/academy/application-security/open-policy-agent-opa</link>
    <guid isPermaLink="true">https://www.wiz.io/academy/application-security/open-policy-agent-opa</guid>
    <description>What is Open Policy Agent (OPA)?</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:23 +0000</pubDate>
  </item>
  <item>
    <title>OPA: Best Practices for Secure Deployment - CNCF</title>
    <link>https://www.cncf.io/blog/2025/03/18/open-policy-agent-best-practices-for-a-secure-deployment/</link>
    <guid isPermaLink="true">https://www.cncf.io/blog/2025/03/18/open-policy-agent-best-practices-for-a-secure-deployment/</guid>
    <description>OPA: Best Practices for Secure Deployment - CNCF</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:22 +0000</pubDate>
  </item>
  <item>
    <title>Kubernetes RBAC Best Practices</title>
    <link>https://www.wiz.io/academy/container-security/kubernetes-rbac-best-practices</link>
    <guid isPermaLink="true">https://www.wiz.io/academy/container-security/kubernetes-rbac-best-practices</guid>
    <description>Kubernetes RBAC Best Practices</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:22 +0000</pubDate>
  </item>
  <item>
    <title>Kubernetes RBAC Good Practices</title>
    <link>https://kubernetes.io/docs/concepts/security/rbac-good-practices/</link>
    <guid isPermaLink="true">https://kubernetes.io/docs/concepts/security/rbac-good-practices/</guid>
    <description>Kubernetes RBAC Good Practices</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:21 +0000</pubDate>
  </item>
  <item>
    <title>NIST SP 800-162: Guide to ABAC</title>
    <link>https://csrc.nist.gov/pubs/sp/800/162/upd2/final</link>
    <guid isPermaLink="true">https://csrc.nist.gov/pubs/sp/800/162/upd2/final</guid>
    <description>NIST SP 800-162: Guide to ABAC</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:20 +0000</pubDate>
  </item>
  <item>
    <title>Authorization Testing Automation Cheat Sheet - OWASP</title>
    <link>https://cheatsheetseries.owasp.org/cheatsheets/Authorization_Testing_Automation_Cheat_Sheet.html</link>
    <guid isPermaLink="true">https://cheatsheetseries.owasp.org/cheatsheets/Authorization_Testing_Automation_Cheat_Sheet.html</guid>
    <description>Authorization Testing Automation Cheat Sheet - OWASP</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:19 +0000</pubDate>
  </item>
  <item>
    <title>Access Control Cheat Sheet - OWASP</title>
    <link>https://cheatsheetseries.owasp.org/cheatsheets/Access_Control_Cheat_Sheet.html</link>
    <guid isPermaLink="true">https://cheatsheetseries.owasp.org/cheatsheets/Access_Control_Cheat_Sheet.html</guid>
    <description>Access Control Cheat Sheet - OWASP</description>
    <category>Authorization / Broken Access Control</category>
    <pubDate>Sat, 11 Apr 2026 16:47:19 +0000</pubDate>
  </item>
</channel>
</rss>