This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP API Security Project"
From OWASP
PauloASilva (talk | contribs) (Update with 2019 Stable version contents) |
PauloASilva (talk | contribs) (→Contributors) |
||
(5 intermediate revisions by the same user not shown) | |||
Line 13: | Line 13: | ||
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs). | API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs). | ||
− | ==API Security Top 10 | + | ==API Security Top 10 is Here!== |
Here is a sneak peek of the 2019 version: | Here is a sneak peek of the 2019 version: | ||
Line 21: | Line 21: | ||
| API1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object level authorization checks should be considered in every function that accesses a data source using an input from the user. | | API1 || Broken Object Level Authorization || APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object level authorization checks should be considered in every function that accesses a data source using an input from the user. | ||
|- | |- | ||
− | | API2 || Broken User Authentication || | + | | API2 || Broken User Authentication || Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall. |
|- | |- | ||
| API3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. | | API3 || Excessive Data Exposure || Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. | ||
Line 62: | Line 62: | ||
[https://github.com/OWASP/API-Security GitHub] | [https://github.com/OWASP/API-Security GitHub] | ||
− | [https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf | + | [https://github.com/OWASP/API-Security/raw/master/2019/en/dist/owasp-api-security-top-10.pdf API Security Top 10 2019 (PDF)] |
− | + | == News == | |
− | == | + | === Dec 26, 2019 === |
+ | |||
+ | OWASP API Security Top 10 2019 stable version release. | ||
=== Sep 30, 2019 === | === Sep 30, 2019 === | ||
Line 118: | Line 120: | ||
==Contributors== | ==Contributors== | ||
− | + | 007divyachawla, Abid Khan, Adam Fisher, anotherik, bkimminich, caseysoftware, Chris Westphal, dsopas, DSotnikov, emilva, ErezYalon, flascelles, Guillaume Benats, IgorSasovets, Inonshk, JonnySchnittger, jmanico, jmdx, Keith Casey, kozmic, LauraRosePorter, Matthieu Estrade, nathanawmk, PauloASilva, pentagramz, philippederyck, pleothaud, r00ter, Raj kumar, Sagar Popat, Stephen Gates, thomaskonrad, xycloops123 | |
− | |||
= Join = | = Join = |