Often viewed as the backbone of an application security program,
security testing is a significant focus area of many organizations’ API
security strategies. The emphasis on investing in security testing
tooling and integrating it as part of development and release processes
has only grown as industry has pushed the ideal of shift-left more
heavily. While it is possible to scan for certain types of security issues
automatically, particularly known vulnerabilities in published software,
this type of scanning is less useful for the world of APIs. Traditional
scanning technologies struggle with parsing custom developed code,
since design patterns and coding practices vary per developer. As a
result, organizations often struggle with high false positive and false
negative rates. No scanner is adept at parsing business logic, which
also leaves organizations exposed to major forms of API abuse. Use
traditional security testing tools to verify certain elements of an API
implementation such as well-known misconfigurations or
vulnerabilities, but you must operate these tools with awareness of the
limitations. Traditional testing tools often fail to identify flaws, or
zero-day vulnerabilities, in the application and API code you create.
Best practices for security testing include:
1.
Dostları ilə paylaş: