Feb. 22, 2024, 9:02 a.m. | Nicolas Frankel

DEV Community dev.to

A couple of months ago, I stumbled upon this list of 16 practices to secure your API:




  1. Authentication 🕵️️ - Verifies the identity of users accessing APIs.

  2. Authorization 🚦 - Determines permissions of authenticated users.

  3. Data Redaction 🖍️ - Obscures sensitive data for protection.

  4. Encryption 🔒 - Encodes data so only authorized parties can decode it.

  5. Error Handling ❌ - Manages responses when things go wrong, avoiding revealing sensitive info.

  6. Input Validation & Data Sanitization 🧹 - Checks input …

apache api apis authentication authorization data encryption identity list permissions practices protection redaction sensitive sensitive data

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden