Downloads: 3 | Views: 130 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper | Information Technology | United States of America | Volume 13 Issue 7, July 2024 | Popularity: 4.7 / 10
Beyond the Firewall: Securely Exposing Cloud Native API
Ramakrishna Manchana
Abstract: This document provides a comprehensive guide to developing and securing cloud-native APIs across major cloud providers: AWS, Azure, and GCP. It explores various architectural approaches, including serverless, containerized, virtual machine-based, and Platform as a Service (PaaS) options, along with specialized API development platforms. The document delves into the critical distinction between internal and external API access, outlining the mechanisms and best practices for controlling and securing access in each architectural approach. It also emphasizes the importance of API security, covering essential practices like input validation, authentication, authorization, data encryption, and security testing. Additionally, the document addresses the challenges and solutions for deploying APIs in hybrid and multi-cloud environments, managing API versioning and lifecycle, and fostering a positive developer experience through comprehensive documentation and support. By offering insights into these diverse aspects of cloud-native API development, this document empowers developers and architects to make informed decisions and build secure, scalable, and user-friendly APIs in the cloud.
Keywords: cloud-native APIs, API development, API security, serverless, containerization, virtual machines, PaaS, AWS, Azure, GCP, internal access, external access, authentication, authorization, API Gateway, Lambda, Azure Functions, Cloud Functions, ECS, EKS, AKS, GKE, EC2, Compute Engine, Elastic Beanstalk, App Service, App Engine, Amplify, OWASP Top 10
Edition: Volume 13 Issue 7, July 2024
Pages: 1586 - 1598
DOI: https://www.doi.org/10.21275/SR24701182415
Make Sure to Disable the Pop-Up Blocker of Web Browser