UsefulLinks
Computer Science
Cybersecurity
API Security
1. Introduction to API Security
2. Fundamental Security Principles
3. OWASP API Security Top 10
4. Authentication Mechanisms
5. Authorization and Access Control
6. Data Protection and Encryption
7. Traffic and Request Management
8. API Security in Development Lifecycle
9. API Security Testing
10. Monitoring and Incident Response
11. Advanced Security Architectures
12. Specialized API Security
13. Compliance and Governance
11.
Advanced Security Architectures
11.1.
API Gateway Security
11.1.1.
Centralized Security Enforcement
11.1.2.
Authentication Offloading
11.1.3.
Authorization Policies
11.1.4.
Traffic Management
11.1.5.
Request Transformation
11.1.6.
Response Filtering
11.2.
Service Mesh Security
11.2.1.
East-West Traffic Protection
11.2.2.
Mutual TLS Implementation
11.2.3.
Service Identity Management
11.2.4.
Policy Enforcement
11.2.5.
Traffic Encryption
11.2.6.
Zero Trust Networking
11.3.
Cloud-Native Security
11.3.1.
Container Security
11.3.2.
Kubernetes Security
11.3.3.
Serverless Security
11.3.4.
Cloud Provider Security Services
11.4.
Microservices Security Patterns
11.4.1.
Service-to-Service Authentication
11.4.2.
Distributed Authorization
11.4.3.
Security Token Propagation
11.4.4.
Circuit Breaker Patterns
11.4.5.
Bulkhead Isolation
Previous
10. Monitoring and Incident Response
Go to top
Next
12. Specialized API Security