6.7 Insecure Interfaces and APIs – Report

Select > Reports > Portal > Repository > Standard Content > Cloud > CSA > The Treacherous 12.

Users interact with cloud computing services through user interfaces (UIs) and application program interfaces (APIs), and the value-added services built on these services. APIs and UIs are generally the most exposed part of a system, perhaps the only asset with an IP address available outside the trusted organizational boundary. These assets will be the target of heavy attack. Use the Vulnerabilities on Interfaces and API report to identify the vulnerabilities found in your cloud-based interfaces and APIs.