From the course: The OWASP API 2023 Top 10: An Overview

Unlock the full course today

Join today to access over 24,000 courses taught by industry experts.

API4:2023 Unrestricted Resource Consumption

API4:2023 Unrestricted Resource Consumption

From the course: The OWASP API 2023 Top 10: An Overview

API4:2023 Unrestricted Resource Consumption

- [Instructor] Next on the OWASP API Security Top 10 is unrestricted resource consumption. Here's how OWASP describes it. Satisfying API requests requires resources such as network bandwidth, CPU, memory, and storage. Other resources, such as emails, SMS, phone calls, or biometric validation, are made available by service providers via API integrations and paid for per request. Successful attacks can lead to Denial of Service or an increase of operational costs. Now, I know that was a mouthful, but let's break it down. You see, just like other vulnerabilities, this vulnerability occurs when APIs don't have proper safeguards in place to limit how they're used or accessed. But what makes this a tough one is that there are several ways the API can be vulnerable. For example, your API may be vulnerable if just one of these limits is missing or misconfigured. These can be the maximum number of processes, the maximum allocable…

Contents