My usecase is to check for the data validity from hacking perspective. i.e.
1.XSS
2.CSRF
3.SQL Injection
Can anyone please share the sample doc or reference link for each of the threat protection techniques mentioned above?
Solved! Go to Solution.
Hi @maivizhi you may also want to check out:
- This Article: API Vulnerabilites and their mitigation in Apigee Edge.
- This Slideshare: Deep-Dive: Secure API Management
If our responses have helped answer your question, please click the "Accept" link or alternatively let us know how we can further answer your question.
Hi @maivizhi you may also want to check out:
- This Article: API Vulnerabilites and their mitigation in Apigee Edge.
- This Slideshare: Deep-Dive: Secure API Management
If our responses have helped answer your question, please click the "Accept" link or alternatively let us know how we can further answer your question.
These are great articles, and I have those surface areas covered. What my concern now is, my API gateway will be proxying API's in Docker and Cloud Foundry. Are there any documented:
Docker Engine Injection Attacks?
Cloud Foundry (Diego/Bosch) Engine attacks?
User | Count |
---|---|
2 | |
1 | |
1 | |
1 | |
1 |