Topic Area
Domain
Organization
Link
API security
Secure design
CSA
Security Guidelines for Providing
and Consuming
APIs | CSA
Credential stuffing
Authentication and
authorization
OWASP
OWASP Credential Stuffing
Prevention Cheat Sheet
GraphQL
API protocols and data
formats
OWASP
OWASP GraphQL Security Cheat
Sheet
Incident response
Security Operations
NIST
Computer Security Incident
Handling Guide
Injection
Input validation and
filtering
OWASP
OWASP Injection Prevention Cheat
Sheet
OWASP SQL Injection Prevention
Cheat Sheet
JSON Web Token
JWT
Authentication and
authorization
OWASP
OWASP JWT Cheat Sheet for Java
Mass assignment
Input validation and
filtering
OWASP
OWASP Mass Assignment Cheat
Sheet
Microservices and API
security
Security architecture
NIST
Security Strategies for
Microservices-based Application
Systems
Microservice security
Security architecture
OWASP
OWASP Microservices Security
Cheat Sheet
Mobile app and API
security
Security verification
NIST
Vetting the Security of Mobile
Applications
Salt I API Security Best Practices I 28
Mobile app security
Security verification
OWASP
OWASP Mobile Security Testing
Guide
Redirects and
forwarding
Input validation and
filtering
OWASP
OWASP Redirects and Forwards
Cheat Sheet
REST
API protocols and data
formats
OWASP
OWASP REST Assessment Cheat
Sheet
OWASP REST Security Cheat Sheet
Server-side request
forgery SSRF
Input validation and
filtering
OWASP
OWASP SSRF Prevention Cheat
Sheet
Threat modeling
Secure design
OWASP
OWASP Abuse Case Cheat Sheet
Threat Modeling Manifesto
Web services
API protocols and data
formats
OWASP
OWASP Web Service Security
Cheat Sheet
XML
API protocols and data
formats
OWASP
OWASP XML Security Cheat Sheet
OWASP XML External Entity
Injection Prevention Cheat Sheet
Salt Security
– Securing your innovation
Salt Security protects the APIs that form the core of every modern application. Its patented API Protection Platform is
the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and
prevent API attacks. By correlating activities across millions of APIs and users over time, Salt delivers deep context with
real-time analysis and continuous insights for API discovery, attack prevention, and shift-left practices. Deployed in
minutes and seamlessly integrated within existing systems, the Salt platform gives customers immediate value and
protection, so they can innovate with confidence and accelerate their digital transformation initiatives.
Request a Demo today!
info@salt.security
www.salt.security
WP 235 092622
Salt I API Security Best Practices I 29
Securing your
Innovation.
Dostları ilə paylaş: |