Close this search box.

We are creating some awesome events for you. Kindly bear with us.

NSA and Cyber Agencies Safeguarding Sensitive Data 

Getting your Trinity Audio player ready...

The National Security Agency (NSA) has collaborated with various U.S. and international cyber agencies to issue a Cybersecurity Advisory (CSA) titled “Preventing Web Application Access Control Abuse.” This advisory serves as a warning, highlighting vulnerabilities in web applications and application programming interfaces (APIs) that malicious actors could exploit. Such exploitation can lead to unauthorised manipulation and access to sensitive data.

The potential consequences of these abuses are significant, as they could compromise the security of web applications and cloud-based services utilised by critical entities such as National Security Systems (NSS), the Department of Defense (DoD), and the Defense Industrial Base (DIB).

The Australian Cyber Security Centre (ACSC), U.S. Cybersecurity and Infrastructure Security Agency (CISA), and NSA have teamed up to provide comprehensive guidance to vendors, designers, developers, and consumer organisations on how to address insecure direct object reference (IDOR) vulnerabilities in web applications.

Neal Ziring, NSA Cybersecurity Technical Director, emphasised proactively tackling these frequently exploited vulnerabilities. Mitigating such vulnerabilities becomes challenging once the software is operational within a customer network. Hence, developers should remain vigilant and implement the checks outlined in the advisory to effectively reduce the prevalence of these flaws on a broader scale.

IDOR vulnerabilities represent access control weaknesses found in web applications, providing malicious actors with the ability to manipulate, delete, or gain unauthorised access to sensitive data.

The exploitation of such vulnerabilities can have far-reaching consequences, affecting various types of web applications, regardless of their deployment, including on-premises software installed locally within organisations, software as a Service (SaaS) used for cloud-based applications, infrastructure as a Service (IaaS) utilised for cloud-based computing resources, as well as private cloud models exclusive to an organisation’s infrastructure.

Therefore, developers and organisations must be vigilant in identifying and addressing these vulnerabilities to safeguard sensitive data and ensure the security of their web applications.

The report provides in-depth technical information regarding IDOR vulnerabilities. It offers suggested measures for individuals involved in web application development, usage, management, and administration, even for those applications intended for internal purposes.

As per the advisory, vulnerable applications or APIs permit direct access to objects (e.g., database records) using an identifier (e.g., ID number, name, or key) without adequately verifying the user’s authentication or authorisation. ACSC, CISA, and NSA advise organisations to adhere to the mitigation strategies outlined in this CSA to prevent the exploitation of IDOR vulnerabilities and safeguard sensitive data within their systems.

Furthermore, the CSA offers valuable mitigations tailored for end-user organisations to bolster the security of their web applications comprehensively. These measures are essential to ensure a robust defence against potential threats.

First, end-user organisations are encouraged to proactively select web applications that strongly commit to secure-by-design and secure-by-default principles. Secondly, the timely application of software patches for web applications is emphasised as a critical action. Swiftly addressing known security vulnerabilities through patching can safeguard against potential threats and ensure that the application remains resilient against emerging risks.

Another essential mitigation recommended in the CSA is regular penetration testing and vulnerability scanning on web applications. These proactive assessments serve as security measures, ensuring that applications are thoroughly scrutinised for potential weaknesses, including IDOR and other vulnerabilities.

Such examinations enable organisations to promptly identify and rectify vulnerabilities before malicious actors exploit them.


Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.


As a Titanium Black Partner of Dell Technologies, CTC Global Singapore boasts unparalleled access to resources.

Established in 1972, we bring 52 years of experience to the table, solidifying our position as a leading IT solutions provider in Singapore. With over 300 qualified IT professionals, we are dedicated to delivering integrated solutions that empower your organization in key areas such as Automation & AI, Cyber Security, App Modernization & Data Analytics, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Renowned for our consulting expertise and delivering expert IT solutions, CTC Global Singapore has become the preferred IT outsourcing partner for businesses across Singapore.


Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit


SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.


HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 


IBM is a leading global hybrid cloud and AI, and business services provider. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity and service.