Would someone be able to help clarify this for me?Thank you :)
A weak, vulnerable or poorly configured authorization system can be bypassed – sometimes it is as simple as clicking a folder you're not supposed to access and it just opens and you can read and modify all the files in it, and sometimes it's a bit more complicated - whereas a strong and properly configured authorization system will be more difficult to bypass and you won't be able to elevate your privileges so easily.
So you want to mitigate the risk of privilege escalation by implementing a strong (or stronger) authorization system or architecture, basically. At minimum, one that functions properly.You can look at some vendors web sites and their product descriptions to find out what specific mitigation elements a proper authorization system/architecture should have . You can also find some general (high level) principles in the IAM section of the Cloud Control Matrix.