💻
Software Development
Ctrlk
  • Everything anyone should know
    • Fundamental
    • Advanced
    • Comparison
  • Design Pattern
    • Overview
    • Creational Design Patterns
    • Structural Design Patterns
    • Behavior Design Patterns
    • Use cases
    • More
    • Some design patterns contradictory
  • Architect
    • Clean Architecture
    • Layered (n-tier) Architecture
    • Microservices Architecture
    • Monolithic Architecture
    • Service-Oriented Architecture (SOA)
    • Domain-Driven Design (DDD)
    • Blackboard Architecture
    • Object-Oriented Architecture
  • Microservices Design Pattern
    • Saga Pattern
    • Strangler Fig Pattern
    • API Gateway Pattern
    • Backends For Frontends (BFF) Pattern
    • Service Discovery Pattern
    • Circuit Breaker Pattern
    • Bulk Head Pattern
    • Retry Pattern
    • Sidecar Pattern
    • Event Driven Architecture Pattern
    • CQRS (Command and Query Responsibility Segregation)
    • Configuration Externalization Pattern
  • Design and development principles
    • SOLID aka Design Principles
    • Cohesion Principles
    • Coupling principle
    • Some fundamental principles
  • Authentication and Authorization Standards
    • SAML
    • OAuth
    • OIDC
    • SCIM
    • SSO
    • Tools
    • More
  • .NET TECHNOLOGY
    • .NET MVC
    • Fundamental
    • Advanced
    • Tutorial Coding
    • ServiceStack
    • POCO
  • System Design
    • Blueprint
    • Fundamental
    • Use cases
  • DBMS
    • Fundamental
    • Advanced
    • Comparation
  • Javascript
    • ES6 Techniques
    • Basic
    • 5 ways to define a function
  • Clean code
    • Page 2
  • Search Engine
    • Elastic Search
    • Solr
    • IBM Watson Discovery
    • Google Cloud Search
    • Coveo Relevance Cloud
  • Cloud Service
    • Overview
    • Azure
    • AWS
    • GCP
    • OCI
    • Object Storage Server
    • Comparison
  • Front End
    • Basic
    • Modern Framework
    • Compile & Module
    • TypeScript
    • Blazor
    • UI Library
    • Security
    • Some notices
  • Microservices
    • Service Mesh
    • Service Registry
    • Service Discovery
    • Composition
    • Orchestration
    • Transformation
    • Dapr
  • Network
    • Protocols
    • OSI Model
  • Cache
    • Redis
    • Hazelcast
    • Memcached
  • Message Broker
    • RabbitMQ
    • Kafka
    • ActiveMQ
    • Masstransit
  • Bash Script
    • Linux file system
    • Cheat sheet
    • 18 Most-used Linux Commands
    • Interview Question
  • Devops
    • Overview
    • Azure Pipeline
    • Docker
    • Kubernetes
    • Openshift
    • IaC
    • Jenkin
    • GitOps
    • Monitoring
  • Web Server
    • Apache
    • Nginx
    • IIS
  • Security
    • How to prevent crawl data
    • SQL Injection
    • OWASP
      • Web Application Security Risks
      • API Security Risks
        • Broken Object Level Authorization
        • Broken Authentication
        • Broken Object Property Level Authorization
        • Unrestricted Resource Consumption
        • Broken Function Level Authorization
        • Unrestricted Access to Sensitive Business Flows
        • Server Side Request Forgery
        • Security Misconfiguration
        • Improper Inventory Management
        • Unsafe Consumption of APIs
    • Security headers
  • Data Change Capture (CDC)
    • Debezium
  • Software Development Life Cycle (SDLF)
    • Waterfall
    • V Model
    • Agile
  • Secure Software Development Framework (SSDF)
    • Page 1
  • Source Control
    • Git
    • SVN
    • TFS
  • Integration Systems
    • Stripe
    • Salesforce
    • TaxJar
    • Zendesk
  • Enterprise Service Bus (ESB)
    • Mulesoft
  • Data
    • 5 type of analytics
  • SOFTWARE QUALITY STANDARDS – ISO 5055
    • Standard
    • All about ISO 5055
  • Interview Question
    • Overview
    • Technical
    • Behavior
    • Question back to the interviewer
  • Roadmap
    • .NET
    • Java
  • English
    • Phát âm ed
    • Many vs much
    • Most vs most of vs almost vs the most
    • Quy tắc thêm s,es vào danh từ và cách phát âm s,es chuẩn xác nhất
  • Those will be seen later
    • Note
    • Interview
  • Programming Language
    • Python
    • Javascript
    • C#
    • Java
Powered by GitBook
On this page
  1. Security
  2. OWASP

API Security Risks

Broken Object Level AuthorizationBroken AuthenticationBroken Object Property Level AuthorizationUnrestricted Resource ConsumptionBroken Function Level AuthorizationUnrestricted Access to Sensitive Business FlowsServer Side Request ForgerySecurity MisconfigurationImproper Inventory ManagementUnsafe Consumption of APIs
PreviousServer-Side Request ForgeryNextBroken Object Level Authorization