Skip to content
The Algorithm
The Algorithm/Knowledge Base/OWASP API Security Top 10 (2023) for Financial and Health APIs
Application Security

OWASP API Security Top 10 (2023) for Financial and Health APIs

The OWASP API Security Top 10 2023 reflects a threat landscape where APIs — not web applications — are now the primary attack surface for regulated data exfiltration and unauthorized transaction execution.

What You Need to Know

The OWASP API Security Top 10 2023 supersedes the 2019 edition, updating risk categories to reflect the evolution of API architectures and exploitation patterns observed in the intervening years. The 2023 list introduces three new entries — API8:2023 Security Misconfiguration (elevated in prominence), API9:2023 Improper Inventory Management, and API10:2023 Unsafe Consumption of APIs — while retaining and refining existing categories. API1:2023 Broken Object Level Authorization (BOLA) remains the top risk: it occurs when an API endpoint returns objects based on a client-supplied identifier without verifying that the authenticated user is authorized to access that specific object. BOLA is the API equivalent of IDOR (Insecure Direct Object Reference) and is the most exploited API vulnerability in financial services and healthcare, enabling attackers to enumerate and access other users' account data, transaction histories, or medical records.

Regulated industries face acute exposure to specific OWASP API Security categories. API2:2023 Broken Authentication applies directly to Open Banking APIs under PSD2 and UK Open Banking Standards, where OAuth 2.0 PKCE implementations, token binding, and mTLS client certificate authentication must be correctly implemented to prevent token theft and session hijacking. API3:2023 Broken Object Property Level Authorization (new in 2023, splitting from 2019's Excessive Data Exposure) is critical for GDPR compliance: APIs that return excessive properties in responses — for example, returning a full patient record when only demographic data was requested — violate the data minimization principle of GDPR Article 5(1)(c) and HIPAA minimum necessary standard. API5:2023 Broken Function Level Authorization is particularly dangerous in financial APIs where function-level controls separate read and write operations on customer accounts.

API9:2023 Improper Inventory Management reflects a systemic risk in large regulated organizations: the existence of undocumented, unpatched "shadow APIs" — legacy endpoints, test environments exposed to production networks, and deprecated API versions still accepting traffic. These shadow APIs bypass the security controls applied to documented API surface and are a primary initial access vector. Remediating this requires API discovery tooling (traffic analysis-based, not just documentation-based) and API gateway enforcement that rejects traffic to undocumented paths. API10:2023 Unsafe Consumption of APIs addresses the third-party API risk — where a regulated firm's application blindly trusts data returned by an external API (e.g., a credit bureau, identity verification service, or market data provider) without validation, enabling injection attacks through compromised third-party APIs.

How We Handle It

We assess client API landscapes against the OWASP API Security Top 10 2023 using automated discovery, traffic analysis for shadow API identification, and authenticated penetration testing of documented endpoints. Our remediation programs address API gateway policy configuration, OAuth 2.0 implementation review, and object-level authorization logic across financial and healthcare API ecosystems.

Services
Service
Compliance Infrastructure
Service
AI Platform Engineering
Service
Data Engineering & Analytics
Service
Regulatory Intelligence
Related Frameworks
OWASP API Security Top 10 2023
PSD2 RTS on Strong Customer Authentication
GDPR Article 5
HIPAA §164.312
OAuth 2.0 RFC 6749
OpenAPI Specification 3.x
DECISION GUIDE

Compliance-Native Architecture Guide

Design principles and a structured checklist for building software that is compliant by default — not compliant by retrofit. Covers data architecture, access controls, audit trails, and vendor due diligence.

§

Compliance built at the architecture level.

Deploy a team that knows your regulatory landscape before they write their first line of code.

Start the conversation
Related
Service
Compliance Infrastructure
Service
AI Platform Engineering
Service
Data Engineering & Analytics
Service
Regulatory Intelligence
Related Framework
OWASP API Security Top 10 2023
Related Framework
PSD2 RTS on Strong Customer Authentication
Related Framework
GDPR Article 5
Platform
ALICE Compliance Engine
Service
Compliance Infrastructure
Engagement
Surgical Strike (Tier I)
Why Switch
vs. Accenture
Get Started
Start a Conversation
Engage Us