{"id":3311,"date":"2021-08-28T10:32:44","date_gmt":"2021-08-28T05:02:44","guid":{"rendered":"https:\/\/navveenbalani.dev\/?p=3311"},"modified":"2021-08-28T11:07:34","modified_gmt":"2021-08-28T05:37:34","slug":"microservices-api-security-and-best-practices","status":"publish","type":"post","link":"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/","title":{"rendered":"Microservices API Security and Best Practices"},"content":{"rendered":"\n<p>API ha become the de facto standard by making business functions available as open interoperable services that can be called by required application &#8211; be it mobile, web or IoT device and so on. <\/p>\n\n\n\n<p>As these APIs are generally publicly available for integration, there is a greater need to ensure the APIs are secured, protected and most importantly any sensitive data that is transferred by these APIs calls needs to be encrypted, protected and in some cases compliant, for instance PCI for credit cards transactions. <\/p>\n\n\n\n<p>In this week video, we would go over how to secure APIs and Best practices for Microservices API security. Topics covered &#8211; Security by design, penetration testing, api gateway security, OWAS Top 10 API guidelines, api security and compliance best practices<\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Microservices API Security and Best Practices\" width=\"1170\" height=\"878\" src=\"https:\/\/www.youtube.com\/embed\/N_8-F9lFYac?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>API ha become the de facto standard by making business functions available as open interoperable services that can be called by required application &#8211; be it mobile, web or IoT device and so on. As these APIs are generally publicly available for integration, there is a greater need to ensure the APIs are secured, protected [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[302],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.0.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microservices API Security and Best Practices - Current and Future Technology Trends by Navveen Balani<\/title>\n<meta name=\"description\" content=\"Microservices API Security and Best Practices - Technology Videos\" \/>\n<link rel=\"canonical\" href=\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microservices API Security and Best Practices - Current and Future Technology Trends by Navveen Balani\" \/>\n<meta property=\"og:description\" content=\"Microservices API Security and Best Practices - Technology Videos\" \/>\n<meta property=\"og:url\" content=\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Current and Future Technology Trends by Navveen Balani\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-28T05:02:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-28T05:37:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"1 minute\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/navveenbalani.dev\/#website\",\"url\":\"https:\/\/navveenbalani.dev\/\",\"name\":\"Current and Future Technology Trends by Navveen Balani\",\"description\":\"Current and Future Technology Trends by Navveen Balani\",\"publisher\":{\"@id\":\"https:\/\/navveenbalani.dev\/#\/schema\/person\/51f7ab14b20611d95e3c7fd4ea0950bf\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/navveenbalani.dev\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/#webpage\",\"url\":\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/\",\"name\":\"Microservices API Security and Best Practices - Current and Future Technology Trends by Navveen Balani\",\"isPartOf\":{\"@id\":\"https:\/\/navveenbalani.dev\/#website\"},\"datePublished\":\"2021-08-28T05:02:44+00:00\",\"dateModified\":\"2021-08-28T05:37:34+00:00\",\"description\":\"Microservices API Security and Best Practices - Technology Videos\",\"breadcrumb\":{\"@id\":\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/navveenbalani.dev\/\",\"url\":\"https:\/\/navveenbalani.dev\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/\",\"url\":\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/\",\"name\":\"Microservices API Security and Best Practices\"}}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/#webpage\"},\"author\":{\"@id\":\"https:\/\/navveenbalani.dev\/#\/schema\/person\/51f7ab14b20611d95e3c7fd4ea0950bf\"},\"headline\":\"Microservices API Security and Best Practices\",\"datePublished\":\"2021-08-28T05:02:44+00:00\",\"dateModified\":\"2021-08-28T05:37:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/navveenbalani.dev\/index.php\/technology-videos\/microservices-api-security-and-best-practices\/#webpage\"},\"publisher\":{\"@id\":\"https:\/\/navveenbalani.dev\/#\/schema\/person\/51f7ab14b20611d95e3c7fd4ea0950bf\"},\"articleSection\":\"Technology Videos\",\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/navveenbalani.dev\/#\/schema\/person\/51f7ab14b20611d95e3c7fd4ea0950bf\",\"name\":\"Navveen\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/navveenbalani.dev\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/navveenbalani.dev\/wp-content\/uploads\/2019\/07\/navveen_balani.jpeg\",\"width\":200,\"height\":200,\"caption\":\"Navveen\"},\"logo\":{\"@id\":\"https:\/\/navveenbalani.dev\/#personlogo\"},\"sameAs\":[\"http:\/\/naveenbalani.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/posts\/3311"}],"collection":[{"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/comments?post=3311"}],"version-history":[{"count":4,"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/posts\/3311\/revisions"}],"predecessor-version":[{"id":3315,"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/posts\/3311\/revisions\/3315"}],"wp:attachment":[{"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/media?parent=3311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/categories?post=3311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/navveenbalani.dev\/index.php\/wp-json\/wp\/v2\/tags?post=3311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}