Part 1: Foundations of API Security
In this part, you will gain a foundational understanding of the key components of Application Programming Interface (API) security. You will understand the need for a holistic approach to API security as APIs become the main target for hackers. We then take a look at the core building blocks of APIs, including protocols, data formats, authentication, authorization, and their role in security. The OWASP API Security Top 10 takes you on a walk-through of the most common vulnerabilities, and finally, this part concludes with detailed post-mortems of some of the highest-profile breaches in recent times.
This part has the following chapters:
- Chapter 1, What Is API Security?
- Chapter 2, Understanding APIs
- Chapter 3, Understanding Common API Vulnerabilities
- Chapter 4, Investigating Recent Breaches