Versaria + Axway

solving-the-top-11-api-threats

Issue link: https://axway.uberflip.com/i/991646

Contents of this Issue

Navigation

Page 17 of 27

BROKEN SSL/TLS CONTEXT There is no other security protocol as widely used as SSL/TLS, but this does not mean that it's always deployed correctly. In fact, checking your site against SSL Labs 11 is a wake-up call for many companies. Additionally, the client side has to build SSL/TLS protections that function correctly to avoid known vulnerabilities. VULNERABILITIES IDENTIFICATION & TRACKING BEAST and Poodle are two recent examples of SSL/TLS weaknesses. In addition, certificate naming, chain validation, and protocol issues can open up man-in-the-middle, information- disclosure, and broken-authentication vulnerabilities. Certificate authorities and key management systems can be used to shepherd, scale, and track SSL/TLS configurations. COUNTERMEASURE(S) SSL should be replaced with TLS. TLS should be upgraded to the highest level your organization can support (TLS 1.2). The provisioning, design, implementation and deployment should be carefully reviewed and tested. The API gateway can play a role as the central choke point for terminating and validating TLS traffic. ASSURANCE Excellent free testing tools exist like SSL Labs scanner, SSLyze, and most vulnerability- management scanners include checks for SSL/TLS weaknesses. However, most of these are on the server, so make sure to scan your API clients as well. 08 | The Curious Case of Broken SSL/TLS

Articles in this issue

view archives of Versaria + Axway - solving-the-top-11-api-threats