Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Security Guidelines for Providing and Consuming APIs
Security Guidelines for Providing and Consuming APIs

Security Guidelines for Providing and Consuming APIs

Release Date: 04/30/2021

This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

In modern application workloads, organizations are often required to integrate their application with other parties such as Software-as-a-Service (SaaS) providers, customers applications, and business partners. These integrations may vary from granting one-time read access to ongoing static data consumption, to exposure of APIs or application components to a 3rd party provider. 

The purpose of this document is to provide a framework for securely connecting external entities such as customers or third parties. The document provides a usable list of security considerations in order to estimate the risk involved with the specific connectivity (first part of the document) and a technical checklist for the implementation of security controls (second part of the document).

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
IoT Controls Matrix v3
IoT Controls Matrix v3
Guide to the IoT Controls Matrix v3
Guide to the IoT Controls Matrix v3
Disaster Recovery as a Service
Disaster Recovery as a Service
What is Cloud Workload in Cloud Computing?
What is Cloud Workload in Cloud Computing?
Published: 11/13/2024
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Published: 11/04/2024
To Secure the AI Attack Surface, Start with Fundamental Cyber Hygiene
To Secure the AI Attack Surface, Start with Fundamental Cyber Hygiene
Published: 10/10/2024
How to Set Up Your First Security Program
How to Set Up Your First Security Program
Published: 09/26/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Frank Guanco
Frank Guanco
Research Program Manager, CSA

Frank Guanco

Research Program Manager, CSA

Moshe Ferber
Moshe Ferber
Chairman at Cloud Security Alliance, Israel

Moshe Ferber

Chairman at Cloud Security Alliance, Israel

Moshe Ferber is a recognized industry expert and popular public speaker, with over 20 years’ experience at various positions ranging from the largest enterprises to innovative startups. Currently Ferber focuses on cloud security as certified instructor for CCSK & CCSP certification and participate in various initiative promoting responsible cloud adoption.

Read more

Shahar Geiger Maor Headshot Missing
Shahar Geiger Maor

Shahar Geiger Maor

Marius Aharonovich Headshot Missing
Marius Aharonovich

Marius Aharonovich

Oz Avenstein Headshot Missing
Oz Avenstein

Oz Avenstein

Reuven Harrison Headshot Missing
Reuven Harrison

Reuven Harrison

Ofer Maor Headshot Missing
Ofer Maor

Ofer Maor

Eitan Satmary Headshot Missing
Eitan Satmary

Eitan Satmary

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training