Insecure Interfaces and APIs

In the Reports Portal, select Repository > Standard Content > Cloud > CSA > The Treacherous 12.

Users interact with cloud computing services through user interfaces (UIs) and application program interfaces (APIs), and the value-added services built on these services. APIs and UIs are generally the most exposed part of a system, perhaps the only asset with an IP address available outside the trusted organizational boundary. These assets will be the target of heavy attack.

Dashboards

Reports

n/a

Vulnerabilities on Interfaces and API

Vulnerabilities on Interfaces and API
Reports the vulnerabilities found in your cloud-based interfaces and APIs.