Mohammed,
the steps appear to be the same as in your post at https://community.ibm.com/community/user/discussion/missing-access-control#bmd2c22511-3831-4719-b950-019960970819
While the other post is titled "missing access control", this one talks about tampering traffic in transit. I strongly recommend, you connect with your penetration testing team and find out, what their exact concern is: missing access control or tampering with traffic.
Regarding missing access control, you must ensure that your server side code only accepts parameter values that the current user is entitled to send. You can use BAW's JavaScript APIs to determine the current user name, group memberships and even team memberships. You can call out to backend systems and look up database tables to implement your custom implementation logic. The product as such cannot have any built-in access control which users are authorized to post requests for "TestAgency" as this agency concept is not a product concept.
Regarding tampering with traffic: This only works after the end user carelessly clicked away the browser warning that said: "Your traffic is insecure. Attackers may read or modify...". This is because burp suite will not have a trusted certificate for the target hostname. This behavior is the same for all web applications. If you cannot trust your HTTPS infrastructure, your traffic is not safe.