13 Guides

API Security

APIs Security Challenges

API vulnerabilities are common and can break down your whole system if not treated, and more API breaches occur due to these vulnerabilities.

​​API Security - Broken Object Level Authorization Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Injection Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, injection, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Broken Function Level Authorization Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Insufficient Logging & Monitoring Vulnerability

APIs may have vulnerabilities like broken authentication, insufficient logging & monitoring, lack of rate limiting, etc. Let's take a look at one of them.

API Security With Rapid

Rapid provides high level security by enforcing policies in runtime and protecting against runtime attacks.

API Security: Excessive Data Exposure Vulnerability

In Excessive Data Exposure Vulnerability, the API sends more data than required to the client. In this piece, let's look at it and some prevention measures.

​​API Security - Lack of Resources & Rate Limiting Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Misconfiguration Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, misconfiguration, lack of rate limiting, etc. Let's take a look at one of them.

API Security - Improper Assets Management Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, improper assets management, lack of rate limiting, etc. Let's take a look at one of them..

API Security - Broken User Authentication Vulnerability

APIs may have vulnerabilities like broken authentication and authorization, insufficient logging, lack of rate limiting, etc. Let's take a look at one of them.

Five Basic Practices For REST API Security

REST APIs allow you to create, read, update and delete operations between a client and a server. There are a number of ways to secure REST APIs.

What are API Injections and how to prevent them?

When the user sends malicious code (most of the time database query) with the API request, they execute an API injection. In this piece, let's take a look at it and how you can prevent it from happening.