DES 362 – Mitigating LCNC (Low-Code/No-Code) Authorization Misuse

Course Overview


Most no-code/low-code platforms leverage connections as first-class objects. This means connections between applications, other users, or entire organizations. Applications can also be shared with users who shouldn’t have access to their underlying data. This course is designed to educate NICE Workforce’s Software Developer, Cyber Defense Infrastructure Support Specialist, Vulnerability Assessment Analyst, and Systems Requirements Planner roles to mitigate the risks associated with LCNC Authorization Misuse.

Upon successful completion of this course, learners will have the knowledge and skills to:

  • Understand how to disable or monitor the use of implicitly shared connections
  • Carefully review the scope an application requires and adhere to the principle of least privilege
  • Properly provide access to environments that can contain shared connections
  • Monitor no-code/low-code platforms for over-shared connections
  • Educate business users on the risks of connection sharing and its relation to credential sharing
  • Explicitly refresh OAuth tokens on a regular basis by re-authenticating connections

Looking To Learn More?

Request more information on our courses and labs.

* required

Course Details

Course Number: DES 362
Course Duration: 20 minutes
Course CPE Credits: .5

NICE Work Role Category

Available Languages

  • English