Api Security

  • Input Validation and Sanitization
  • Monitoring and Logging
  • Data Encryption
  • Regular Database Audits
  • Penetration Testing
  • Authentication and Authorization

JWT

  • Secure Client Storage
    • To avoid XSS, CSRF
  • Token Expiration
  • Validate