A security analyst is generating a list of recommendations for the company's insecure API. Which of the following is the BEST parameter mitigation recommendation?
A.
Use TLS for all data exchanges.
B.
Use effective authentication and authorization methods.
Answer is D - Using effective authentication and authorization methods (option B) is important for ensuring that only authorized users can access the API, but it does not specifically address the issue of insecure API parameters.
I think all of them are good recommendations, but B is more important for me due to with a proper authorization and authentication mechanism you are ensuring that only trusted sources/destinations get involved with the exchange of information. After this, you can set other security controls such as validate the incoming data and establish a secure channel with TLS.
Reference: https://www.techtarget.com/searchapparchitecture/tip/10-API-security-guidelines-and-best-practices
Access related attack would require authentication as a mitigation measure
Parameter attacks like an injection requires code validation as a security measure
Answer is D
Validating all incoming data would be the BEST parameter mitigation recommendation for an insecure API. This is because validating incoming data helps to prevent injection attacks, such as SQL injection or cross-site scripting (XSS), by ensuring that the data is in the expected format and does not contain malicious code or unexpected characters. While TLS, authentication and authorization methods, and parameterized queries are also important security measures, they do not specifically address parameter validation and would not be the BEST parameter mitigation recommendation in this case.
The question says "parameter mitigation", which I admit is not very clear, but makes me want to choose D instead of B.
Of course B is always required when building an API, but I don't think that is what the question is asking for.
Also: https://www.esecurityplanet.com/applications/how-to-control-api-security-risks/
API Security Top 10 2019
Here is a sneak peek of the 2019 version:
API1:2019 Broken Object Level Authorization
APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object level authorization checks should be considered in every function that accesses a data source using an input from the user. Read more.
API2:2019 Broken User Authentication
Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user’s identities temporarily or permanently. Compromising a system’s ability to identify the client/user, compromises API security overall. Read more.
Authentication and Authorization
Both authentication and authorization are core to the security of APIs. They play different roles but together they ensure that the right legitimate consumer has the right permissions to access an API.
A reasonable and simple answer. I support this.
I also found this other reference: https://www.techtarget.com/searchapparchitecture/tip/10-API-security-guidelines-and-best-practices
One common reason is that access to the APIs is often uncontrolled; insufficient permissions or authentication may be involved in accessing the API by unauthorized personnel.
Broken object-level authorization Failure to authorize access on an object basis
• Broken user authentication Failure to account for all the different ways a user could authenticate to the API, such as through other applications
https://learning.oreilly.com/library/view/comptia-cysa
I also would honestly want to belive C is the answer as the question is "BEST parameter mitigation recommendation", wouldnt that be implementing parameterized queries?
This section is not available anymore. Please use the main Exam Page.CS0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
encxorblood
Highly Voted 2 years, 4 months ago2Fish
2 years, 3 months agodb97
Highly Voted 2 years, 4 months agoedro
Most Recent 1 year, 7 months agokumax
1 year, 9 months agoKaynem
1 year, 9 months agokmordalv
1 year, 9 months agoSimonR2
2 years, 2 months agokiduuu
2 years, 2 months ago10cccordrazine
2 years, 4 months agoabsabs
2 years, 4 months agoStiobhan
2 years, 5 months agoTeyMe
2 years, 7 months agoMortG7
2 years, 8 months agoAdrian831
2 years, 9 months agodb97
2 years, 4 months agoR00ted
2 years, 9 months agoR00ted
2 years, 8 months agoEVE12
2 years, 9 months agoamateurguy
2 years, 9 months agof3lix
2 years, 6 months ago