Secure APIs & External Integrations
This standard mandates the securing of APIs and external integrations to ensure they follow security best practices.
1. Secure APIs & External Integrations:
APIs and third-party integrations must follow security best practices. This approach ensures that external interactions are secure and protected from abuse.
- 1.1 Authentication Mechanisms:
- 1.1.1 OAuth2 and API Keys:
- Use OAuth2, OpenID Connect, or API keys with expiration for authentication.
- Automate the configuration of authentication mechanisms.
- 1.1.2 Key Management:
- Automate the management of API keys and tokens.
- Implement key tutorials.
- 1.2 Abuse Prevention:
- 1.2.1 Rate Limiting and Validation:
- Implement rate limiting, request validation, and input sanitisation to prevent abuse.
- Automate the configuration of rate limiting.
- 1.2.2 Validation Implementation:
- Automate the validation of requests and inputs.
- Implement validation feedback collection.
- 1.3 Zero-Trust Principles:
- 1.3.1 Data Encryption:
- Ensure all APIs follow zero-trust principles and encrypt sensitive data in transit.
- Automate the enforcement of zero-trust principles.
- 1.3.2 Encryption Management:
- Automate the encryption of sensitive data.
- Implement encryption tutorials.
By securing APIs and external integrations, organisations can protect their systems from external threats.