7. “APIs are an attractive target for
threat actors because they act as
the glue linking different services –
they allow data to flow freely from
one area to the next, and thus
provide a rich vein of information if
they are compromised.”
8. IAM in the API driven world
- How do I seamlessly Onboard Developers, Enterprises,
Users...
- Who is using my API - Authentication
- What can they do with my API - Authorization
- API/Token security - Is my access still valid?
8