7.1 Unprotected APIs Overview

  • OWASP Top 10+ 2017 new topic (draft version)
  • REST API architecture growing (mobile, SPA, IoT,…)
  • Restrict access to API for authenticated/authorized users/clients
  • This area impacts or is related to many others potential vulnerabilities :
    • Broken Authentication & Session Management
    • Broken Access Control
    • Sensitive data exposure,
    • Insufficient Attack Protection
    • Cross-Site Request Forgery
    • JSONP vulnerability
    • Service Availability Threats

Authorization

  • Used with strong authentication : JWT OAuth, multi-factor authentication, …
  • Web address request security: approach to secure your request URIs
  • Implement Service layer and Domain object security: separation of concerns, reusability, support for rich clients and web services
  • Define a realm: user, group, role, permission, right management …
Last Updated:
Contributors: Nourredine K