YoVDO

OWASP API Security: Sufficient Logging and Monitoring for API Protection

Offered By: OWASP Foundation via YouTube

Tags

API Security Courses Cybersecurity Courses Auditing Courses Data Privacy Courses Observability Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about the critical importance of sufficient logging and monitoring for API security in this informative conference talk. Explore real-world examples and discover five effective strategies to implement robust logging and monitoring practices for APIs. Gain insights into creating a verifiable trail of API calls for auditing, security, and observability purposes. Understand the challenges of working with sensitive data, learn about security and privacy techniques, and identify common antipatterns to avoid. Discover how proper logging and monitoring can benefit various stages of the software development lifecycle and help prevent potential security breaches.

Syllabus

Introduction
What is A10
Why does this matter
Is this problem getting worse
A10 Official Recommendations
Challenges
Best practices
Benefits across the software development lifecycle
Why is sufficient logging and monitoring important
Triggering feelings
Challenges of working with PHI
Security and privacy techniques
Software development life cycle
Antipatterns
No PII here strategy
Strategies


Taught by

OWASP Foundation

Related Courses

Designing RESTful APIs
Udacity
API Design and Fundamentals of Google Cloud's Apigee API Platform
Google Cloud via Coursera
API Development on Google Cloud's Apigee API Platform
Google Cloud via Coursera
API Security on Google Cloud's Apigee API Platform
Google Cloud via Coursera
Developing APIs with Google Cloud's Apigee API Platform
Google Cloud via Coursera