Unit 10 - API Security Requirements



Task

Evaluate the security requirements of an API of your choice and write a brief security requirements specification which mitigates against any risks associated with the API for enabling data sharing, scraping and connectivity between a program code written in Python and any of the following file formats/management systems (XML, JSON and SQ. This activity aligned with learning outomes 1, 2 and 4.

Module Learning Outcomes

Process

This was a suggested team task and the work was undertaken together with Andreea Nicoara.

To initiate the work I developed a bullet point check list based on potential risks and mitigations in a broad term. Andreea reviewed, added to these and supplied technical detail and expertise based on her background experience.

Learnings

Working as part of a team provided an excellent opportunity to develop my learning through knowledge sharing with Andreea, whose background in computer science gave her a broader overview of technical solutions. Drawing on her expertise, I was able to identify areas for further development and undertook additional reading to deepen my understanding of SQL injection attacks, mutual TLS, and authentication solutions.



Risks and mitigation strategies

Risk Area Security Requirements / Controls
Unauthorised Access - Enforce strong authentication and authorisation.
- Regularly review and update access rights.
- Monitor access logs and unsuccessful login attempts; flag suspicious patterns for immediate review and action.
Scraping Abuse / Bots - Set limits on the amount of data that can be scraped or shared.
- Monitor for unusual data transfer patterns (e.g., large exports or rapid-fire queries).
Data Protection - Store data redundantly to maintain availability and minimise loss.
- Encrypt data in transit (using HTTPS) and at rest for sensitive information.
Database Security - Prevent blanket or unrestricted access to the database.
- Limit user access to only the specific data elements or tables required.




Final overview


API Security Requirements Specification - IBM QRadar DMS API

1. Introduction

The IBM QRadar Device Support Module (DSM) API supports event log gathering and normalization across networks and security devices (IBM, 2025). Within a large data infrastructure such as a Security Information and Event Management (SIEM) solution, the DSM API delivers a connector between sources of data and analytic modules. Due to the DSM API’s handling of potentially sensitive operational data, it must be developed with a high level of confidentiality, integrity, and availability (NIST, 2023).

2. Security threats and primary risks

3. Security Requirements

Transport & Network Security

Authentication and Authorization

Data Validation and Integrity

Rate Limiting and Availability

Monitoring and Logging

Data Protection and Privacy

Versioning and Change Control

4. Conclusion

The deployment of these specifications helps ensure that the QRadar DSM API is resilient against typical security threats while facilitating effective data parsing and correlation between interconnected devices. Through considerations of authentication, input validation, and logging, both technological robustness and regulatory adherence are addressed (NIST, 2023) and these measures help retain the confidentiality, integrity, and availability of information being processed within the extensive QRadar ecosystem (IBM, 2025).

References


⬅️ Return to Deciphering Big Data