Source |
AlienVault Lab Blog |
Identifiant |
8331199 |
Date de publication |
2023-04-26 10:00:00 (vue: 2023-04-26 10:08:41) |
Titre |
Interface de programmation d'application (API) Test de conformité PCI DSS Application Programming Interface (API) testing for PCI DSS compliance |
Texte |
Il s'agit du quatrième blog de la série axé sur PCI DSS, écrit par un consultant AT & AMP; T Cybersecurity.Voir le premier blog relatif à IAM et PCI DSS & NBSP; ici .Consultez le deuxième blog sur PCI DSS Reporting Détails pour vous assurer lors de la contractation des tests CDE trimestriels ici .Le troisième blog sur les diagrammes de réseau et de flux de données pour la conformité PCI DSS est ici .
Exigence 6 de l'industrie des cartes de paiement (PCI) Standard de sécurité des données (DSS) V3.2.1 a été rédigé avant que les API ne deviennent une grande chose dans les applications, et les ignore donc largement.
Cependant, le standard logiciel sécurisé & nbsp;et pci-secre-slc-standard-v1_1.pdf De PCI a tous deux commencé à reconnaître l'importance de les couvrir.
Le projet Open Web Application Security Project (OWASP) a publié une liste des 10 meilleurs défauts spécifiquement pour les API de l'un de ses sous-groupes, le |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
and 000 2019 a’s able access accessible accessing account addresses adequately affect against alerting all also another any api apis application applications are areas assessment assist at&t authenticated authorized automated available b’s became because before begun being big blog both broad can card carry cde certain check company compliance consultant consulting consumer contracting control could covering creation cybersecurity dast data dealing definition destination details diagrams differently dss dss here elevated ensure especially even events example: executed exist existing expanded externally fact fields file finally firewall first flaws flow focused fourth from functions further fuzzing generating has have help here hijacking however iam identifiers ignores impervious importance including industry information integrated interface internal issued issues its job journey just keep largely least list log logging logs make manage management manipulation may methods more most multiple must need network new nor not occurring one only open out owasp paradigm paths payment pci pdf performed persons piggyback possibly potentially prevented privilege privileged programming project protected provides quarterly range recognize recorded redesign related relating relevant reporting required requirement requires responsibilities reveal risk sast scope second secure security see selection separated series servers services session sessions should siem situations slc software some specifically standard start state states subgroups such sure swagger tasks techniques test tested testing tests than them therefore thing third those through thus top traditional transcends ultimately unauthenticated unauthorized use useful userids uses validate web when where will work written your |
Tags |
|
Stories |
|
Move |
|