Replies: 4 comments 1 reply
-
|
Hello, |
Beta Was this translation helpful? Give feedback.
-
|
@alpaycetin74 I was thinking the case with channel partner(s) on 'the road' between the MNO and the API consumer. For 'direct' API consumption yes https is good enough. |
Beta Was this translation helpful? Give feedback.
-
|
Thanks to @rartych : camaraproject/IdentityAndConsentManagement#310 |
Beta Was this translation helpful? Give feedback.
-
|
Your approach of end-to-end encryption using public key infrastructure is solid, but there are some important security considerations to think through. The idea of the consumer providing a public key during onboarding is good, but make sure you're also thinking about key rotation, key compromise scenarios, and how you handle certificate validation. One thing I'd recommend is implementing perfect forward secrecy if you're not already. This means even if a private key is compromised, past traffic remains secure. Also consider adding additional layers like mutual TLS for API communication to ensure both client and server authentication. For location data specifically, which is indeed sensitive, you might also want to consider implementing rate limiting and anomaly detection around location queries. An attacker with stolen credentials could enumerate locations or identify patterns. Think about adding audit logging for all location data access requests. Also ensure you're following location privacy standards like GDPR requirements around data minimization. Only request the precision level needed by the application, not maximum precision by default. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi everyone,
I am currently thinking on securing our API, which contains sensitive data. My idea is to encrypt the response body before sending it to the client, so that any intermediaries between our server and the consumer cannot read the content. I'm thinking first on the Location-retrieval API as this where we have the most sensitive data.
During onboarding, the consumer could provide a public key. The server would then encrypt the response using this key, ensuring that only the intended recipient can decrypt and access the data.
I would like to get your thoughts on this approach:
WDYT?
Thanks,
Beta Was this translation helpful? Give feedback.
All reactions