{"id":1884,"date":"2022-09-16T08:30:00","date_gmt":"2022-09-16T08:30:00","guid":{"rendered":"https:\/\/apimike.com\/?p=1884"},"modified":"2022-12-12T21:58:18","modified_gmt":"2022-12-12T21:58:18","slug":"owasp-api-security-top-10","status":"publish","type":"post","link":"https:\/\/apimike.com\/owasp-api-security-top-10","title":{"rendered":"OWASP API Security Top 10 – a Fresh Look"},"content":{"rendered":"\n
With continuous growth and expansion in technology. Software development teams are applying modern practices in building software. This has led to applications built on the cloud using a microservices architecture.<\/p>\n\n\n\n
While this architecture is a great tool to build applications, they have a small-sized nature and are not coupled much. Developers use application programming interfaces (APIs) to integrate the applications.<\/p>\n\n\n\n
APIs are efficient in connecting software components and have many benefits. But, these APIs have become targets of malicious attacks on applications.<\/p>\n\n\n\n
In this article, we are going to look at OWASP, and OWASP API Top 10 List and explain each one of them with examples of abuse on each of them.<\/p>\n\n\n\n