using infrastructure-as-code, but that form of code is more likely to be
owned by network engineering, infrastructure, or API operations teams, not
application development.
Data security
The top 3 recommendations for data security include:
1. Use encryption selectively and transport protection suffices for most use cases
2. Avoid sending too much data to clients and relying on the client to filter data
3. Adjust for threats like scraping or data inference where encryption is not a
mitigation
Data security approaches aim
to provide confidentiality,
integrity and authenticity of
data. If your organization still
includes privacy in the data
security bucket, then
anonymization and
pseudonymization are also in
scope. Depending on your
data security goals and
impacting regulation,
appropriate techniques for
protecting data include masking, tokenizing, or encrypting. Many data security
efforts focus on securing data at rest in a system back-end, such as database
encryption or field-level encryption. These approaches protect organizations from
attacks where the data storage is targeted directly. If your API is designed to only
send encrypted payloads as an additional level of encryption beyond transport
protection, attackers will still attempt to extract unencrypted data elsewhere, such
as in memory, from client storage, or other positions within network topology.
These encryption approaches also do not protect the organization from cases
where an attacker obtains a credential or authorized session since the data will be
decrypted for them when accessed through an API.
Best practices for data security include:
1.
Dostları ilə paylaş: