Many systems today are designed to operate without verifying user authentication, leaving them vulnerable to exploits and breaches.The recent zero-day vulnerability in Fortinet's system highlights the ongoing issue of systems having unchecked authority over sensitive data.Historical vulnerabilities in Fortinet's systems have showcased the risk of having 'login-optional' bugs that allow unauthorized access.Proposing a shift from 'access control' to 'authority control' to enhance security measures and prevent unauthorized access to sensitive data.