[ISM] Web API security (OWASP API Security Top 10):

The OWASP API Security Top 10 are mitigated in the development of web APIs.

[OWASP] Implement secure API authentication (SSS-02-15-02)

Ensure API authentication mechanisms are securely implemented to prevent unauthorized access and identity compromise. For example, enforce strong authentication using multi-factor authentication (MFA) and secure password policies to reduce the risk of credential theft; Protect authentication tokens by using short expiration times, secure storage, and proper revocation mechanisms to prevent token hijacking; Implement rate limiting and account lockouts to mitigate brute force and credential stuffing attacks; Use secure transport protocols (TLS 1.2+) to protect authentication data in transit; Continuously monitor authentication attempts and log anomalies to detect and respond to suspicious activity.

[OWASP] Strengthen authentication mechanisms (SSS-02-15-02-01)

Ensure secure authentication practices by thoroughly understanding and implementing industry-standard mechanisms. For example, identify and document all authentication flows (mobile, web, deep links, etc.) to prevent overlooked vulnerabilities; Recognize that OAuth and API keys are not authentication mechanisms and ensure proper authentication protocols are in place; Avoid custom authentication implementations, relying instead on well-established standards for token generation and password storage; Apply strict security controls to credential recovery and password reset endpoints, treating them as login endpoints with brute force, rate limiting, and lockout protections; Require re-authentication for sensitive operations such as email or multi-factor authentication (MFA) changes to prevent unauthorized modifications; Follow the OWASP Authentication Cheatsheet for best practices; Enforce multi-factor authentication (MFA) where possible to strengthen user security; Implement anti-brute force mechanisms stricter than regular rate limits to mitigate credential stuffing and dictionary attacks; Apply account lockout and CAPTCHA mechanisms to prevent targeted brute force attacks and enforce weak-password checks; Ensure API keys are used solely for API client authentication, never for user authentication.

Operations

ID Operation Description Phase Agent
SSS-02-15-02-01-01 Identify all authentication flows Ensure all possible authentication flows (e.g., mobile, web, deep links) are accounted for and understood by the development team. Ask engineers to review and identify any overlooked flows. Preparation Security Engineers, Development Teams
SSS-02-15-02-01-02 Understand authentication mechanisms Familiarize yourself with the authentication mechanisms used in the system. Ensure you understand the differences between authentication and authorization (e.g., OAuth, API keys) and how each is implemented. Development Security Engineers, Software Architects
SSS-02-15-02-01-03 Use standard authentication methods Do not reinvent the wheel for authentication. Use established standards for token generation and password storage (e.g., bcrypt, OAuth) to ensure secure implementations. Development Security Engineers, Software Developers
SSS-02-15-02-01-04 Implement rate limiting and lockout on credential recovery Treat credential recovery endpoints (e.g., forgot password) with the same security controls as login endpoints, including brute force protection, rate limiting, and account lockout mechanisms. Development Backend Developers, Security Engineers
SSS-02-15-02-01-05 Require re-authentication for sensitive operations Enforce re-authentication for sensitive actions, such as changing critical account details (e.g., email address, 2FA phone number), to ensure actions are legitimate. Development Backend Developers, Security Engineers
SSS-02-15-02-01-06 Implement multi-factor authentication and anti-brute force mechanisms Implement multi-factor authentication (MFA) where possible and apply anti-brute force mechanisms (e.g., stricter rate limiting, account lockouts, captchas) to prevent credential stuffing and brute force attacks. Development Security Engineers, DevOps Teams

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1851)
OWASP Top 10 API Security Risk
OWASP Top 10 API Security Risk