組織の IT チームは、API プロキシを使用して必要な認証および承認ポリシーを適用することにより、統合ソリューション内のすべての内部 API を保護する必要があります。他のすべての関連要因が同じである場合、チームはこれらの要件を満たすために、意図された目的で使用するときにどの統合テクノロジを選択する必要がありますか?
正解:B
Securing internal APIs within an integration solution is critical for protecting sensitive data and ensuring proper access controls. The use of API proxies to apply authentication and authorization policies is a best practice in API security. Here's a detailed explanation:
* API Management (APIM):
* Purpose: API Management platforms are designed specifically to manage, secure, and monitor APIs. They provide tools for designing, publishing, securing, and analyzing APIs.
* Key Features:
* Security: APIM platforms offer robust security features such as OAuth, JWT, API keys, and IP whitelisting to authenticate and authorize API consumers.
* API Proxies: They allow the creation of API proxies which act as intermediaries between the client and the backend service. This enables enforcing security policies without modifying the backend API.
* Implementation:
* Authentication and Authorization Policies: Using APIM, the IT team can easily configure policies for authentication (e.g., OAuth 2.0) and authorization to control access to APIs.
* Policy Enforcement: These policies are enforced at the API proxy level, ensuring that only authenticated and authorized requests reach the backend services.
* Monitoring and Analytics: APIM platforms provide detailed analytics and monitoring capabilities to track API usage, detect anomalies, and ensure compliance.
References
* MuleSoft Documentation: API Security
* API Management Overview: What is API Management