Deep security audit of authentication flows and Role-Based Access Control (RBAC) enforcement.
Identify the authentication boundaries and role-protected resources.
Do NOT audit general business logic or data layer efficiency.
Evaluate how users are identified and how secrets are handled.
Verify the "Least Privilege" principle.
HttpOnly, Secure (in prod), and SameSite=Strict?token-expiration-check).backend-code-review).List of identified security risks categorized by severity (CRITICAL, HIGH, MEDIUM, LOW).
Table showing checked endpoints and whether they correctly enforce the required role.
| Endpoint | Required Role | Enforcement Found | Status |
|---|---|---|---|
| ... | ... | ... | [OK/FAIL] |
Immediate actions to mitigate identified risks.