API Security Weekly: Issue #17
This week, we are mostly discussing best practices and tools for API security.
Join the DZone community and get the full member experience.Join For Free
This week, we are mostly discussing best practices and tools: the best methods to pass API keys and other sensitive data, tools that attackers use to discover APIs, and why API security is never set-and-forget.
Never put API keys or other sensitive information in URLs and query parameters. These are visible to browser extensions, server logs, browser history, shared links, and the referrer. Always use headers or
POST method instead. See this article by Paris Mitton for details.
According to Akamai’s Tony Lauro, 83 percent of web traffic is API traffic. Although this may not necessarily be the best way to track API usage (traffic is significantly skewed by streaming applications like Netflix), it does show how APIs are starting to power pretty much everything we do online.
In his article, Lauro talks about how APIs are also becoming increasingly hard to hide from attackers. He discusses some of the tools that attackers are using, including:
- Certificate Transparency Logs
Andrew Useckas, CTO of ThreatX, has written a blog post that lists and explains his key points for building and connecting security-friendly APIs:
- Strong authentication
- Short-lived tokens
- TLS transport encryption
- Standard authentication and authorization on every endpoint
- Sanitized user input
ComputerWeekly has done a fascinating interview with Andrew van der Stock (Synopsys and OWASP). Andrew argues that API Security cannot be “set-and-forget”:
- API security needs to become part of API development and testing.
- Protection needs to be a part of API design.
- Full monitoring must be an integral part of runtime.
You can subscribe to this weekly newsletter at https://APISecurity.io
Published at DZone with permission of Dmitry Sotnikov, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.