[ISM] Web API security (OWASP API Security Top 10):

The OWASP API Security Top 10 are mitigated in the development of web APIs.

[OWASP] Validate and restrict outbound requests (SSS-02-15-07)

Ensure APIs validate and restrict outbound requests to prevent SSRF attacks that exploit user-supplied URIs. For example, enforce allowlists to limit external requests to trusted domains and block unauthorized internal network access; Validate and sanitize user-provided URLs to prevent manipulation of backend requests; Restrict server-to-server communications by applying network segmentation and firewall rules; Implement least privilege access for API requests to prevent unauthorized interactions with internal systems; Continuously monitor and log outgoing API requests to detect and respond to suspicious activity in real time.

[OWASP] Secure resource fetching operations (SSS-02-15-07-01)

Ensure secure resource fetching by isolating it within the network and applying strict validation controls. For example, restrict access to internal resources by ensuring resource-fetching mechanisms only retrieve authorized remote resources; Implement allowlists to define trusted remote origins (e.g., Google Drive, Gravatar), permitted URL schemes and ports, and acceptable media types for each functionality to prevent unauthorized access; Disable HTTP redirections to prevent attackers from redirecting requests to malicious destinations; Use secure and well-maintained URL parsers to avoid inconsistencies that could lead to security vulnerabilities; Enforce input validation and sanitization on all client-supplied data to prevent injection attacks; Avoid sending raw responses directly to clients, ensuring responses are properly processed and filtered before transmission.

Operations

ID Operation Description Phase Agent
SSS-02-15-07-01-01 Isolate resource fetching mechanism Isolate the functionality responsible for fetching remote resources into a separate network segment. This minimizes the potential impact of SSRF attacks by restricting access to internal systems. Development Security Engineers, IT Operations
SSS-02-15-07-01-02 Implement allow lists for remote origins and url schemes Use allow lists to restrict the remote origins (e.g., Google Drive, Gravatar) from which resources can be fetched. Also, define allowable URL schemes (e.g., HTTP, HTTPS) and ports for safe requests. Development Security Engineers, Backend Developers
SSS-02-15-07-01-03 Enforce accepted media types Define and enforce accepted media types for each functionality to ensure that only legitimate and expected content is processed. Development Security Engineers, Backend Developers
SSS-02-15-07-01-04 Disable http redirections Disable HTTP redirection functionality to prevent attackers from redirecting requests to internal services or unintended destinations. Development Security Engineers, Web Developers
SSS-02-15-07-01-05 Use a well-structured url parser Implement a well-tested and maintained URL parser to avoid parsing inconsistencies that can lead to SSRF vulnerabilities. Development Backend Developers, Security Engineers
SSS-02-15-07-01-06 Validate and sanitize client-supplied input Validate and sanitize all client-supplied input data, including URLs, to ensure they do not contain malicious content that could exploit SSRF vulnerabilities. Development Security Engineers, Backend Developers

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1851)
OWASP Top 10 API Security Risk
OWASP Top 10 API Security Risk