Threat Protection

My usecase is to check for the data validity from hacking perspective. i.e.

1.XSS

2.CSRF

3.SQL Injection

Can anyone please share the sample doc or reference link for each of the threat protection techniques mentioned above?

Solved Solved
1 4 1,189
1 ACCEPTED SOLUTION

Hi @maivizhi you may also want to check out:

- This Article: API Vulnerabilites and their mitigation in Apigee Edge.

- This Slideshare: Deep-Dive: Secure API Management

If our responses have helped answer your question, please click the "Accept" link or alternatively let us know how we can further answer your question.

View solution in original post

4 REPLIES 4

@maivizhi

You refer below links, might be helpful.

1) XSS

2) CSRF

3) SQL Injection

Hi @maivizhi you may also want to check out:

- This Article: API Vulnerabilites and their mitigation in Apigee Edge.

- This Slideshare: Deep-Dive: Secure API Management

If our responses have helped answer your question, please click the "Accept" link or alternatively let us know how we can further answer your question.

Not applicable

These are great articles, and I have those surface areas covered. What my concern now is, my API gateway will be proxying API's in Docker and Cloud Foundry. Are there any documented:

Docker Engine Injection Attacks?

Cloud Foundry (Diego/Bosch) Engine attacks?