@@ -413,7 +413,7 @@ Or use role inheritance to avoid duplication:
413413- ** Never use header-based RBAC for public APIs** - Use JWT-based RBAC
414414- ** Always validate JWT tokens** - Use proper JWKS endpoints with HTTPS
415415- ** Use HTTPS in production** - Protect tokens and headers
416- - ** Monitor audit logs** - Track authorization decisions
416+ - ** Monitor logs** - Track authorization decisions
417417
418418### Configuration
419419- ** Use role inheritance** - Avoid duplicating permissions (only specify additional ones)
@@ -438,13 +438,13 @@ Or use role inheritance to avoid duplication:
438438** Permission always denied**
439439- Check role assignment - verify user's role has the required permission
440440- Review role permissions - ensure ` roles[].permissions ` includes the required permission
441- - Enable debug logging - check audit logs for authorization decisions
441+ - Enable debug logging - check debug logs for authorization decisions
442442
443443** Permission always allowed**
444444- Check if endpoint is in RBAC config - routes not in config are allowed to proceed
445445- Check public endpoints - verify endpoint is not marked as ` public: true `
446446- Review endpoint configuration - ensure ` endpoints[].requiredPermissions ` is set correctly
447- - Verify permission check - check audit logs to see if permission check is being performed
447+ - Verify permission check - check logs to see if permission check is being performed
448448
449449** JWT role extraction failing**
450450- Ensure OAuth middleware is enabled before RBAC
@@ -519,7 +519,7 @@ RBAC middleware implements industry-standard security practices to protect sensi
519519- ✅ Status (allowed/denied) included
520520- ❌ Roles excluded (avoid high cardinality and PII concerns)
521521
522- ** Audit Logs:**
522+ ** Logs:**
523523- ✅ Roles included (required for compliance: SOC 2, PCI-DSS, NIST)
524524- ✅ HTTP method, route, status, and reason included
525525- ❌ No authorization tokens, headers, or request bodies logged
0 commit comments