1 Why authorization matters: Securing access in a digital world
This chapter covers
- The importance of digital identity in modern applications
- Challenges with traditional access control
- Why authorization matters
- The rise of dynamic, policy-driven access
- Business benefits of policy-based access control
In 2013, poor access control practices led to one of the largest data breaches in history. Over a three-week period, hackers stole 40 million credit and debit card accounts from retail giant Target by exploiting the account of an HVAC contractor. The attack began with a phishing email that tricked an employee at the HVAC company into revealing their credentials. As a vendor, the HVAC company had legitimate access to Target’s systems for tasks like billing and project tracking, but not to payment infrastructure. Using the stolen credentials, the attackers infiltrated Target’s internal network and ultimately installed malware on point-of-sale systems to harvest customer data. The breach resulted in direct costs to Target of nearly $300 million, along with reputational damage that’s difficult to quantify.