API Security: The Complete Guide for Security and Compliance Teams
2026-03-08
By Emre Salmanoglu

API Security: The Complete Guide for Security and Compliance Teams

Learn how to secure APIs and satisfy ISO 27001, SOC 2, NIS2, and DORA requirements. Covers authentication, rate limiting, input validation, OWASP API Top 10, API gateways, and compliance evidence.

API security
OWASP API Top 10
authentication
rate limiting
compliance

What Is API Security?

API security is the discipline of protecting application programming interfaces from unauthorised access, data exposure, and abuse. As organisations increasingly rely on APIs to connect services, share data, and power integrations, APIs have become both the backbone of modern architecture and a primary attack surface.

Securing APIs requires a defence-in-depth approach combining strong authentication, granular authorisation, input validation, rate limiting, encryption, monitoring, and proper inventory management.

OWASP API Security Top 10 (2023)

RiskDescriptionMitigation
API1: Broken Object Level AuthorisationAccessing other users' resources by manipulating IDsCheck object ownership on every request
API2: Broken AuthenticationWeak or missing authentication mechanismsStrong authentication, token expiry, MFA
API3: Broken Object Property Level AuthorisationExposing or allowing modification of sensitive propertiesResponse filtering, property-level access control
API4: Unrestricted Resource ConsumptionNo limits on API usage leading to DoSRate limiting, pagination, resource quotas
API5: Broken Function Level AuthorisationAccessing admin functions without proper authorisationRole-based access on every endpoint
API6: Unrestricted Access to Sensitive Business FlowsAutomated abuse of business logic (scalping, spamming)Business logic rate limiting, CAPTCHA
API7: Server Side Request ForgeryAPI fetching resources from attacker-controlled URLsURL validation, allowlists, network segmentation
API8: Security MisconfigurationDefault configs, verbose errors, missing headersHardening checklists, security headers
API9: Improper Inventory ManagementUnknown or deprecated API versions still accessibleAPI inventory, version management, deprecation
API10: Unsafe Consumption of APIsTrusting data from third-party APIs without validationValidate all external API responses

API Authentication Methods

MethodSecurity LevelBest ForConsiderations
API keysLowPublic APIs, identification onlyEasy to leak, no user context
Basic authLowInternal/legacy systemsSends credentials per request
OAuth 2.0 + JWTHighUser-facing APIsIndustry standard, scoped access
mTLSVery highService-to-serviceStrong identity, complex setup
HMAC signaturesHighWebhook verificationTamper-proof, replay protection
API tokens (short-lived)HighMachine-to-machineAuto-rotation, minimal exposure

API Security Controls

Control LayerControlsPurpose
GatewayAuthentication, rate limiting, WAF, TLS terminationCentralised enforcement point
TransportTLS 1.2+, certificate pinning, mTLSProtect data in transit
AuthenticationOAuth 2.0, JWT validation, API key managementVerify caller identity
AuthorisationRBAC/ABAC, scope validation, object-level checksEnforce access policies
Input validationSchema validation, type checking, sanitisationPrevent injection attacks
Output filteringResponse filtering, data masking, field selectionPrevent data exposure
Rate limitingPer-key, per-user, per-endpoint limitsPrevent abuse and DoS
MonitoringRequest logging, anomaly detection, alertingDetect and respond to threats

API Gateway Architecture

ComponentFunctionSecurity Value
Reverse proxyRoutes requests to backend servicesHides internal architecture
Authentication serviceValidates tokens and credentialsCentralised identity verification
Rate limiterEnforces usage quotasDoS protection
Request validatorValidates against API schemaInput security
Response transformerFilters sensitive data from responsesData exposure prevention
WAF integrationInspects for common attack patternsOWASP protection
Logging/analyticsRecords all API transactionsAudit trail and monitoring

API Versioning and Lifecycle

PhaseSecurity ActivitiesControls
DesignThreat modelling, security requirementsSecure-by-design review
DevelopmentSecure coding, SAST, dependency scanningCode review with security focus
TestingDAST, fuzzing, penetration testingPre-release security validation
DeploymentGateway configuration, monitoring setupSecurity controls active
OperationMonitoring, incident response, patchingContinuous security posture
DeprecationVersion sunset, migration supportRemove access to deprecated versions
RetirementComplete decommissionVerify no residual access

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2NIS2DORA
Secure developmentA.8.25CC8.1Art. 21(2)(e)Art. 8(1)
Authentication controlsA.8.5CC6.1Art. 21(2)(d)Art. 9(4)(d)
Access controlA.5.15CC6.1Art. 21(2)(d)Art. 9(4)(a)
Encryption in transitA.8.24CC6.7Art. 21(2)(d)Art. 9(2)
Logging and monitoringA.8.15CC7.2Art. 21(2)(b)Art. 10
Input validationA.8.28CC8.1Art. 21(2)(e)Art. 8(1)
Third-party API securityA.8.30CC9.2Art. 21(2)(d)Art. 8(5)

Audit Evidence

Evidence TypeDescriptionFramework
API inventoryComplete list of all APIs with owners and classificationsAll frameworks
Authentication configurationAPI gateway auth settings and token policiesAll frameworks
Rate limiting configurationDocumented limits per endpoint and consumerISO 27001, SOC 2
API security scan reportsDAST results against API endpointsAll frameworks
API access logsLogged requests with authentication and authorisationAll frameworks
API versioning policyDocumented lifecycle and deprecation processISO 27001, DORA
Input validation rulesSchema definitions and validation configurationsAll frameworks

Common Mistakes

MistakeRiskFix
No API inventoryShadow APIs with no security controlsMaintain complete API inventory with ownership
Authentication at application onlyInconsistent enforcement across servicesCentralise auth at API gateway
No rate limitingDoS, credential stuffing, resource exhaustionImplement rate limits at gateway and application levels
Returning full objectsExcessive data exposure to clientsFilter responses to return only required fields
No input validationInjection attacks, data corruptionValidate all inputs against API schema
API keys in URLsKeys exposed in logs, browser history, referrer headersSend API keys in headers, never in URLs
No API versioningCannot deprecate insecure versionsVersion all APIs, enforce deprecation timelines

How Orbiq Supports API Security Compliance

Orbiq helps you demonstrate API security controls:

  • Evidence collection — Centralise API inventories, scan reports, and configuration evidence
  • Continuous monitoring — Track API security posture and vulnerability trends
  • Trust Center — Share your API security posture via your Trust Center
  • Compliance mapping — Map API security controls to ISO 27001, SOC 2, NIS2, and DORA
  • Audit readiness — Pre-built evidence packages for auditor review

Further Reading