繁中版 | 简中版 | Português (Brasil) | Français | 한국어 | Nederlands | Indonesia | ไทย | Русский | Українська | Español | Italiano | 日本語 | Deutsch | Türkçe | Tiếng Việt | Монгол | हिंदी | العربية | Polski | Македонски | ລາວ | Ελληνικά
Checklist of the most important security countermeasures when designing, testing, and releasing your API.
-  Don't use 
Basic Auth. Use standard authentication instead (e.g. JWT, OAuth). -  Don't reinvent the wheel in 
Authentication,token generation,password storage. Use the standards. -  Use 
Max Retryand jail features in Login. - Use encryption on all sensitive data.
 
-  Use a random complicated key (
JWT Secret) to make brute forcing the token very hard. -  Don't extract the algorithm from the header. Force the algorithm in the backend (
HS256orRS256). -  Make token expiration (
TTL,RTTL) as short as possible. - Don't store sensitive data in the JWT payload, it can be decoded easily.
 
-  Always validate 
redirect_uriserver-side to allow only whitelisted URLs. -  Always try to exchange for code and not tokens (don't allow 
response_type=token). -  Use 
stateparameter with a random hash to prevent CSRF on the OAuth authentication process. - Define the default scope, and validate scope parameters for each application.
 
- Limit requests (Throttling) to avoid DDoS / brute-force attacks.
 - Use HTTPS on server side to avoid MITM (Man in the Middle Attack).
 -  Use 
HSTSheader with SSL to avoid SSL Strip attack. 
-  Use the proper HTTP method according to the operation: 
GET (read),POST (create),PUT/PATCH (replace/update), andDELETE (to delete a record), and respond with405 Method Not Allowedif the requested method isn't appropriate for the requested resource. -  Validate 
content-typeon request Accept header (Content Negotiation) to allow only your supported format (e.g.application/xml,application/json, etc.) and respond with406 Not Acceptableresponse if not matched. -  Validate 
content-typeof posted data as you accept (e.g.application/x-www-form-urlencoded,multipart/form-data,application/json, etc.). -  Validate user input to avoid common vulnerabilities (e.g. 
XSS,SQL-Injection,Remote Code Execution, etc.). -  Don't use any sensitive data (
credentials,Passwords,security tokens, orAPI keys) in the URL, but use standard Authorization header. -  Use an API Gateway service to enable caching, Rate Limit policies (e.g. 
Quota,Spike Arrest, orConcurrent Rate Limit) and deploy APIs resources dynamically. 
- Check if all the endpoints are protected behind authentication to avoid broken authentication process.
 -  User own resource ID should be avoided. Use 
/me/ordersinstead of/user/654321/orders. -  Don't auto-increment IDs. Use 
UUIDinstead. -  If you are parsing XML files, make sure entity parsing is not enabled to avoid 
XXE(XML external entity attack). -  If you are parsing XML files, make sure entity expansion is not enabled to avoid 
Billion Laughs/XML bombvia exponential entity expansion attack. - Use a CDN for file uploads.
 - If you are dealing with huge amount of data, use Workers and Queues to process as much as possible in background and return response fast to avoid HTTP Blocking.
 - Do not forget to turn the DEBUG mode OFF.
 
-  Send 
X-Content-Type-Options: nosniffheader. -  Send 
X-Frame-Options: denyheader. -  Send 
Content-Security-Policy: default-src 'none'header. -  Remove fingerprinting headers - 
X-Powered-By,Server,X-AspNet-Version, etc. -  Force 
content-typefor your response. If you returnapplication/json, then yourcontent-typeresponse isapplication/json. -  Don't return sensitive data like 
credentials,Passwords, orsecurity tokens. -  Return the proper status code according to the operation completed. (e.g. 
200 OK,400 Bad Request,401 Unauthorized,405 Method Not Allowed, etc.). 
- Audit your design and implementation with unit/integration tests coverage.
 - Use a code review process and disregard self-approval.
 - Ensure that all components of your services are statically scanned by AV software before pushing to production, including vendor libraries and other dependencies.
 - Design a rollback solution for deployments.
 
- yosriady/api-development-tools - A collection of useful resources for building RESTful HTTP+JSON APIs.
 
Feel free to contribute by forking this repository, making some changes, and submitting pull requests. For any questions drop us an email at [email protected].