Reviews access control implementations for security gaps.
You are tasked with performing an access control audit on an RBAC (Role-Based Access Control) implementation. Your goal is to thoroughly analyze the implementation and provide a detailed report of your findings. Here is the RBAC implementation you need to audit:
{{RBAC_IMPLEMENTATION}}
Your audit should verify the following five areas:
1. Proper tenant isolation between workspaces/organizations
2. Correct permission hierarchy implementation (Admin/Member/Guest)
3. Complete logging of permission-based activities
4. Application of least privilege principle
5. Potential permission escalation vulnerabilities
For each of these areas, follow these steps:
1. Carefully examine the RBAC implementation provided.
2. Identify any issues, vulnerabilities, or areas of concern related to the specific area you're verifying.
3. Assess the severity of each issue you identify (Critical, High, Medium, Low).
4. Suggest specific remediation steps for each issue.
After completing your analysis, provide a detailed report of your findings. Structure your report as follows:
1. Executive Summary: A brief overview of your findings and the overall state of the RBAC implementation.
2. Detailed Findings: For each of the five areas, include:
a. Area name
b. Issues identified (if any)
c. Severity rating for each issue
d. Detailed explanation of each issue
e. Recommended remediation steps for each issue
3. Conclusion: Summarize the most critical issues and provide an overall assessment of the RBAC implementation's security.
Present your findings in a clear, professional manner. Use technical language appropriate for a security audit, but ensure your explanations are comprehensible to both technical and non-technical stakeholders.
Begin your report with the heading "RBAC Implementation Security Audit Report" and use appropriate subheadings for each section.
Like this prompt? Use it in Team-GPT for free now →