List of questions
Related questions
Question 881 - CISA discussion
An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
A.
Replace the API key with time-limited tokens that grant least privilege access.
B.
Authorize the API key to allow read-only access by all applications.
C.
Implement a process to expire the API key after a previously agreed-upon period of time.
D.
Coordinate an API key rotation exercise with all impacted application owners.
Your answer:
0 comments
Sorted by
Leave a comment first