About me/ Notes/ Api Security/ Api Security 15 August 2024·1 min· Table of Contents JWT Table of Contents JWT Input Validation and Sanitization Monitoring and Logging Data Encryption Regular Database Audits Penetration Testing Authentication and Authorization JWT # Secure Client Storage To avoid XSS, CSRF Token Expiration Validate