<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=3298628&amp;fmt=gif">


Mitigating OWASP Top 10 API Security Threats

Mitigating OWASP Top 10  API Security Threats

The OWASP Top 10 is a standard awareness document and is the closest approximation of a set of rules for how to build secure applications that the development and web application security community has. We created this ebook to provide an overview of the OWASP top 10 API security vulnerabilities, and the methodologies used to mitigate them.

Vulnerabilities covered in this ebook include:

API1 - Broken Object Level Authorization
API2 - Broken User Authentication
API3 - Excessive Data Exposure
API4 - Lack of Resource & Rate Limiting
API5 - Broken Function Level Authorization
API6 - Mass Assignment
API7 - Security Misconfiguration
API8 - Injection
API9 - Improper Assets Management
API10 - Insufficient Logging and Monitoring