DES 362 – Mitigating LCNC (Low-Code/No-Code) Authorization Misuse
Course Overview
Most no-code/low-code platforms leverage connections as first-class objects. This means connections between applications, other users, or entire organizations. Applications can also be shared with users who shouldn’t have access to their underlying data. This course is designed to educate NICE Workforce’s Software Developer, Cyber Defense Infrastructure Support Specialist, Vulnerability Assessment Analyst, and Systems Requirements Planner roles to mitigate the risks associated with LCNC Authorization Misuse.
Upon successful completion of this course, learners will have the knowledge and skills to:
- Understand how to disable or monitor the use of implicitly shared connections
- Carefully review the scope an application requires and adhere to the principle of least privilege
- Properly provide access to environments that can contain shared connections
- Monitor no-code/low-code platforms for over-shared connections
- Educate business users on the risks of connection sharing and its relation to credential sharing
- Explicitly refresh OAuth tokens on a regular basis by re-authenticating connections
Looking To Learn More?
Request more information on our courses and labs.
* required
Course Details
Course Number: DES 362
Course Duration: 20 minutes
Course CPE Credits: .5
NICE Work Role Category
StandardTechnologyPlatformType
Available Languages
- English