Download Publication

Security Guidelines for Providing and Consuming APIs
Release Date: 04/30/2021
In modern application workloads, organizations are often required to integrate their application with other parties such as Software-as-a-Service (SaaS) providers, customers applications, and business partners. These integrations may vary from granting one-time read access to ongoing static data consumption, to exposure of APIs or application components to a 3rd party provider.
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Frank Guanco
Operations Director, CSA
Moshe Ferber
CCSK, CCSP, CCAK official instructor, Chairman at Cloud Security Alliance, Israel

Shahar Geiger Maor

Marius Aharonovich

Oz Avenstein

Reuven Harrison

Ofer Maor

Eitan Satmary
Related Certificates & Training

Learn more