Full AWS Practitioner Certification Question

According to the OWASP Top-10 list, which security flaw is characterized by inadequate protection mechanisms for user credentials and access tokens within cloud-based systems?