The specification is updated automatically to API gateway and documentation site / developer portal when changes are done to API (API9:2023 Improper Inventory Management)
Specification for endpoints is validated on every change against standards
The specification contains the schema for the requests and responses
Request and response schema and examples pass schema validation
API uses HTTPS (or, in special cases, other stateless protocols with encryption) (API10:2023 Unsafe Consumption of APIs)
The API published under the organization's official domain (API8:2023 Security Misconfiguration)
All endpoints are protected by authentication (API2:2023 Broken Authentication, API4:2023 Unrestricted Resource Consumption)
API has token-based authentication
API is protected against Cross Site Request Forgery (CFRS) (API8:2023 Security Misconfiguration)
Inputs are validated automatically by the coding framework used (API8:2023 Security Misconfiguration)
Outputs are escaped automatically by the coding framework used (API8:2023 Security Misconfiguration)
Encryption of data in transit and data in storage is implemented according to the evaluated need (API8:2023 Security Misconfiguration)
Message integrity has been implemented according to the evaluated need (API6:2023 Unrestricted Access to Sensitive Business Flows, API7:2023 Server Side Request Forgery)
UUID or other pseudoidentifiers are used to identify objects instead of internal database identifiers (API7:2023 Insecure Direct Object References)
Direct object references to sensitive information like bank account numbers, social security numbers, person names are not used in URLs (API7:2023 Insecure Direct Object References)
Specific HTTP Methods are only available for resources where intended (e.g. whitelisting, automatically based on OpenAPI specification) (API5:2023 Broken Function Level Authorization)