Skip to content

Commit f466c87

Browse files
darrelmillerasbjornuralfhandllornajane
authored
Added security considerations document (#3488)
* Added security considerations document * Update SECURITY_CONSIDERATIONS.md Co-authored-by: Asbjørn Ulsberg <[email protected]> * Update SECURITY_CONSIDERATIONS.md Co-authored-by: Asbjørn Ulsberg <[email protected]> * Add note about external references being potentially on untrusted domains * Update SECURITY_CONSIDERATIONS.md Co-authored-by: Ralf Handl <[email protected]> * Update SECURITY_CONSIDERATIONS.md Co-authored-by: Lorna Jane Mitchell <[email protected]> * Added note about security schemes --------- Co-authored-by: Asbjørn Ulsberg <[email protected]> Co-authored-by: Ralf Handl <[email protected]> Co-authored-by: Lorna Jane Mitchell <[email protected]>
1 parent 6f38696 commit f466c87

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

SECURITY_CONSIDERATIONS.md

+15
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
# Security Considerations
2+
3+
OpenAPI documents use JSON, YAML, and JSON Schema, and therefore share their security considerations:
4+
- [JSON](https://datatracker.ietf.org/doc/html/rfc8259)
5+
- [YAML](https://datatracker.ietf.org/doc/html/rfc9512)
6+
- [JSON Schema Core](https://json-schema.org/draft/2020-12/json-schema-core#section-13)
7+
- [JSON Schema Validation](https://json-schema.org/draft/2020-12/json-schema-validation#name-security-considerations)
8+
9+
In addition, OpenAPI documents are processed by a wide variety of tooling for numerous different purposes, such as client code generation, documentation generation, server side routing, and API testing. OpenAPI document authors must consider the risks of the scenarios where the OpenAPI document may be used.
10+
11+
An OpenAPI document describes the security schemes used to protect the resources it defines. The security schemes available offer varying degrees of protection. Factors such as the sensitivity of the data and the potential impact of a security breach should guide the selection of security schemes for the API resources. Some security schemes, such as basic auth and OAuth Implicit flow, are supported for compatibility with existing APIs. However, their inclusion in OpenAPI does not constitute an endorsement of their use, particularly for highly sensitive data or operations.
12+
13+
OpenAPI documents may contain references to external resources that may be dereferenced automatically by consuming tools. External resources may be hosted on different domains that may be untrusted. References in an OpenAPI document, or across OpenAPI documents may cause a cycle. Tooling must detect and handle cycles to prevent resource exhaustion.
14+
15+
Certain properties allow the use of Markdown which can contain HTML including script. It is the responsibility of tooling to appropriately sanitize the Markdown.

0 commit comments

Comments
 (0)