Apigee Up Close: Protecting APIs with OWASP Best Practices
Apigee Up Close is a webcast series featuring the Apigee Edge platform and live demos on select topics that users have been asking about.
Do you know how to protect your APIs from malformed client payloads? Do you have a solid grasp of how your application layer is exposing the underlying database?
In this webcast replay, you’ll learn how Apigee Edge can be configured to protect your APIs and backend resources from common OWASP security vulnerabilities and other threats.
We’ll look at an example that uses injection flaw and input validation protections to mitigate the risk of a malicious attacker compromising your API and backend resources.
When we’re done, you'll have a clearer picture of how to:
- Create an API that protects against injection flaws and input validation from malicious clients
- Keep it as simple as possible to make adoption easy
- Report on usage
Register now for the next webcast in this series. It will help you build an API using composite resources.