Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New Rule: PII in Response (OWASP API3) #3

Open
3 tasks
philsturgeon opened this issue Sep 23, 2022 · 0 comments
Open
3 tasks

New Rule: PII in Response (OWASP API3) #3

philsturgeon opened this issue Sep 23, 2022 · 0 comments
Labels
enhancement New feature or request good first issue Good for newcomers hacktoberfest help wanted Extra attention is needed

Comments

@philsturgeon
Copy link
Contributor

philsturgeon commented Sep 23, 2022

User Story Description

As an API governance team
I want to detect PII in the response
So I can justify its use, or remove it.

Acceptance Criteria

  • Has a decent list of PII fields, not all encompassing but something to get this started
  • Checks responses and schemas whether inline or $ref.
  • Warning

More Information: https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure

Identify all the sensitive data or Personally Identifiable Information (PII), and justify its use.

@philsturgeon philsturgeon changed the title New Rule: Identify all the sensitive data or Personally Identifiable Information, justify its use New Rule: PII in Response Oct 3, 2022
@philsturgeon philsturgeon added enhancement New feature or request help wanted Extra attention is needed good first issue Good for newcomers labels Oct 3, 2022
@philsturgeon philsturgeon changed the title New Rule: PII in Response New Rule: PII in Response (OWASP API3) Oct 3, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request good first issue Good for newcomers hacktoberfest help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

2 participants