API Security Checklist
API Security Checklist
Checklist
The practical guide to secure your APIs
Not sure where you stand with API security? This checklist is for you. We
share common API security issues, their implications, and mitigation
strategies. The checklist can serve as a starting point for Engineering and
Security teams looking to keep APIs compliant and secure.
API Checklist
Improper API asset management and discovery 3
API abuse, lack of resources and rate limiting 4
Injections 5
Broken object level authorization (BOLA) / Insecure Direct Object Reference (IDOR) 6
Broken user authentication 7
Excessive data exposure 8
Broken function level authorization 9
Mass assignment 10
Security misconfiguration 11
Insufficient logging & monitoring 12
Identify and document all paths that can be used to authenticate with your
API and ensure they are reviewed for possible credential leaks;
Protect all login, password recovery, and registration paths using rate
limiting, brute force protection, and by adding lockout measures for abusive
traffic sources;
Limit all client interactions with your API and any other resources (such as
linked media) to secure, authorized channels;
Only allow API access using necessary HTTP verbs to reduce attack
surfaces;
Set CORS policies for APIs that are publicly accessible from browser-based
clients;