10 Battle-Tested REST API Security Practices You Need to Implement Today
Picture this: You’ve just launched your shiny new API into production, feeling pretty confident about your security measures. Then, late one night, you get that dreaded alert – someone’s hammering your endpoints with suspicious requests. I’ve been there, and it’s not fun. After years of hardening APIs against real-world threats, I’ve learned that security isn’t a feature – it’s a continuous journey.
1. Authentication: Beyond Basic Auth
Let’s start with the foundation. I remember when Basic Authentication seemed “good enough” – those days are long gone. JWT (JSON Web Tokens) has become the industry standard, but even that needs proper implementation.
// DON'T do this
const token = jwt.sign({ userId: user.id }, 'secret123');
// DO this instead
const token = jwt.sign(
{
userId: user.id,
iat: Math.floor(Date.now() / 1000),
exp: Math.floor(Date.now() / 1000) + (60 * 60), // 1 hour
},
process.env.JWT_SECRET,
{ algorithm: 'RS256' }
);
2. Rate Limiting: Your First Line of Defense
After witnessing a small API get hammered with 100,000 requests per minute, I learned the hard way about rate limiting. Here’s a battle-tested Express.js implementation:
const rateLimit = require('express-rate-limit');
const apiLimiter = rateLimit({
windowMs: 15 * 60 * 1000, // 15 minutes
max: 100, // limit each IP to 100 requests per windowMs
message: 'Too many requests, please try again later.',
standardHeaders: true,
legacyHeaders: false,
});
app.use('/api/', apiLimiter);
3. Input Validation: Trust No One
One of my worst production incidents involved a NoSQL injection attack that slipped through because we weren’t validating input properly. Always validate everything that comes from the client side.
const Joi = require('joi');
const schema = Joi.object({
username: Joi.string().alphanum().min(3).max(30).required(),
email: Joi.string().email().required(),
password: Joi.string().pattern(new RegExp('^[a-zA-Z0-9]{8,30}
#039;)) }); app.post('/api/users', async (req, res) => { try { const value = await schema.validateAsync(req.body); // Process the validated data } catch (err) { res.status(400).json({ error: err.details[0].message }); } });
4. HTTPS Everywhere
This might seem obvious, but I still encounter APIs serving traffic over HTTP. Always force HTTPS, even in development environments. Here’s a simple Express.js middleware to redirect all HTTP traffic:
app.use((req, res, next) => {
if (req.header('x-forwarded-proto') !== 'https') {
res.redirect(`https://${req.header('host')}${req.url}`);
} else {
next();
}
});
5. Security Headers: The Often Forgotten Shield
Security headers are like wearing a helmet while riding a motorcycle – you might not need them until you really, really need them. Here’s my go-to security header configuration:
const helmet = require('helmet');
app.use(helmet({
contentSecurityPolicy: {
directives: {
defaultSrc: ["'self'"],
styleSrc: ["'self'", "'unsafe-inline'"],
imgSrc: ["'self'", "data:", "https:"],
scriptSrc: ["'self'"]
}
},
crossOriginEmbedderPolicy: true,
crossOriginOpenerPolicy: true,
crossOriginResourcePolicy: { policy: "same-site" }
}));
6. API Versioning: Future-Proofing Your Endpoints
Versioning isn’t strictly a security feature, but it helps maintain backward compatibility while rolling out security updates. I prefer URL versioning for its simplicity:
// api/v1/users
app.use('/api/v1', v1Router);
// api/v2/users
app.use('/api/v2', v2Router);
7. Error Handling: Don’t Leak Information
I once saw an error stack trace expose database credentials in production. Here’s a proper error handling approach:
app.use((err, req, res, next) => {
console.error(err.stack);
if (process.env.NODE_ENV === 'production') {
res.status(500).json({
error: 'An unexpected error occurred'
});
} else {
res.status(500).json({
error: err.message,
stack: err.stack
});
}
});
8. API Documentation: Security Through Clarity
Clear documentation helps prevent security misconfigurations. Use OpenAPI (Swagger) to document your security requirements:
openapi: 3.0.0
security:
- bearerAuth: []
components:
securitySchemes:
bearerAuth:
type: http
scheme: bearer
bearerFormat: JWT
9. Monitoring and Logging
You can’t protect what you can’t see. Implement comprehensive logging, but be careful not to log sensitive data:
const winston = require('winston');
const logger = winston.createLogger({
format: winston.format.json(),
transports: [
new winston.transports.File({ filename: 'error.log', level: 'error' }),
new winston.transports.File({ filename: 'combined.log' })
]
});
app.use((req, res, next) => {
logger.info({
method: req.method,
path: req.path,
ip: req.ip,
timestamp: new Date().toISOString()
});
next();
});
10. Regular Security Audits
Schedule regular dependency updates and security audits. Here’s a simple npm script to check for vulnerabilities:
{
"scripts": {
"security-check": "npm audit && snyk test"
}
}
Conclusion
Security is never “done” – it’s an ongoing process that requires constant attention and updates. Start with these practices, but remember to stay informed about new threats and solutions. Regular testing, monitoring, and updating are your best friends in keeping your API secure.
What security measures have you implemented in your APIs, and what challenges did you face along the way? I’d love to hear your experiences in the comments below.