تجاوز إلى المحتوى الرئيسي

Management

  1. 3.20Institutions should consider establishing an API monitoring framework that addresses infrastructure, technology and security related incidents and events in a timely and effective manner. The monitoring framework should:
    1. a.Define what constitutes an incident/event, such as unusual activity or unauthorised changes;
    2. b.Monitor the use of APIs to rapidly and accurately detect incidents and events;
    3. c.Report incidents and events to decision makers in a timely manner commensurate with their severity; and
    4. d.Remediate the impact of the incidents and events in an effective manner.
  2. 3.21Larger Institutions with important API adoption should consider establishing a security operations centre dedicated to monitoring, assessing and defending IT systems and assets such as APIs, web sites, applications, Data servers, networks, hardware and software.
  3. 3.22Institutions should maintain an audit trail that records the appropriate metrics and security-related behavior of each API and records any breaches of security that occur. The audit trail should capture the metrics and behavior before and after such breaches to support future detection of breaches of security.
  4. 3.23Institutions should establish incident handling procedures to swiftly detect, review, report and rectify any incidents. Institutions should only provide the necessary details of any incident when reporting incidents to the public to avoid providing attack vectors for bad actors.