How are you assessing the security posture of third-party APIs the business relies on? What criteria do you use currently?

2.2k viewscircle icon2 Comments
Sort by:
Senior Director Of Technology in Softwarea year ago

We do internal vulnerability testing of 3rd party APIs like we do for ours.

Lightbulb on1
Director of IT in IT Servicesa year ago

We evaluate third-party API security through comprehensive risk assessments, focusing on authentication protocols, data encryption, and vendor compliance.

Content you might like

Excellent (more than enough)11%

Good (we have enough to reach our goals)52%

Acceptable (could be better but we make do)34%

Poor/unacceptable (more funding needed ASAP)3%

Unsure / other

View Results

Yes - managers must complete training47%

No - training is available but it is not required 40%

No - training is not available and not required for managers12%

Other

View Results