Owasp Api Security Checklist - Updated
Owasp Api Security Checklist - Updated
OWASP TOP 10
API Security
Risks - 2023
Also, Understand Best Practices
to prevent it!
practical-devsecops.com | #certifiedapisecurityprofessional
1. Broken Object
Level Authorization
Attackers can exploit vulnerable API endpoints by
manipulating object IDs within requests. Object IDs
can be sequential integers, UUIDs, or generic
strings and are easily identifiable in the request
target, headers, or payload.
practical-devsecops.com | #certifiedapisecurityprofessional
2. Broken Authentication
Broken authentication and session management
can enable attackers to impersonate valid users
and compromise data privacy and infrastructure.
practical-devsecops.com | #certifiedapisecurityprofessional
3. Broken Object Property Level
Authorization
Broken object property level authorization allows
unauthorized access to sensitive object properties,
which can lead to data exposure, loss, corruption,
and potential privilege escalation or account
takeover.
practical-devsecops.com | #certifiedapisecurityprofessional
4. Unrestricted Resource
Consumption
Unrestricted resource consumption occurs when an
API allows excessive or uncontrolled use of system
resources, leading to a degradation of service or a
complete service disruption for legitimate users.
practical-devsecops.com | #certifiedapisecurityprofessional
5. Broken Function-Level
Authorization
Broken function-level authorization involves
unauthorized access to sensitive functions or data
due to misconfigured or weak access controls. This
potentially allows actors to perform escalated
actions, leading to data breaches or application
hijacking.
practical-devsecops.com | #certifiedapisecurityprofessional
6. Unrestricted Access to
Sensitive Business Flows
Unrestricted access to sensitive business flows is a
significant API security vulnerability, enabling
unauthorized users to manipulate critical
operations, bypass business rules, and compromise
sensitive data.
practical-devsecops.com | #certifiedapisecurityprofessional
7. Server Side Request Forgery
Server-Side Request Forgery (SSRF) is an API
security vulnerability where attackers manipulate a
server to make unintended requests to internal or
external resources. It can lead to unauthorized data
exposure, service disruption, and further
exploitation.
practical-devsecops.com | #certifiedapisecurityprofessional
8. Security Misconfiguration
Improperly configured systems and software pose
risks to APIs. Common security misconfigurations
include insufficiently secured cryptography
protocols, incorrect file permission configuration,
and poor endpoint protection.
practical-devsecops.com | #certifiedapisecurityprofessional
9. Improper Inventory
Management
Improper inventory management in an API creates
security vulnerabilities, allowing attackers to breach
data, manipulate inventory, and cause financial
losses by exploiting weaknesses like insufficient
validation and access controls.
practical-devsecops.com | #certifiedapisecurityprofessional
10. Unsafe Consumption of APIs
Unsafe API consumption occurs when developers
trust third-party API data more than user input,
leading to weaker security standards. Attackers
exploit this vulnerability by targeting integrated
third-party services instead of directly attacking the
API.
practical-devsecops.com | #certifiedapisecurityprofessional
Become an API Security Expert with Us!
practical-devsecops.com | #certifiedapisecurityprofessional
Making Product Security Accessible to Everyone