Use HTTPS π
Implement HTTPS to encrypt the communication between the client and server.
public class SecureApiController : ApiController
{
    // Use attribute to enforce HTTPS
    [RequireHttps]
    public HttpResponseMessage GetSensitiveData()
    {
        // Fetch sensitive data logic
        var sensitiveData = new { /* ... */ };
        return Request.CreateResponse(HttpStatusCode.OK, sensitiveData);
    }
}
// Custom attribute to enforce HTTPS
public class RequireHttpsAttribute : AuthorizationFilterAttribute
{
    public override void OnAuthorization(HttpActionContext actionContext)
    {
        if (actionContext.Request.RequestUri.Scheme != Uri.UriSchemeHttps)
        {
            actionContext.Response = new HttpResponseMessage(System.Net.HttpStatusCode.Forbidden)
            {
                ReasonPhrase = "HTTPS Required"
            };
        }
        else
        {
            base.OnAuthorization(actionContext);
        }
    }
}
Enforce HTTPS in the Startup.cs.
public void ConfigureServices(IServiceCollection services)
{
    services.AddHttpsRedirection(options =>
    {
        options.RedirectStatusCode = StatusCodes.Status308PermanentRedirect;
        options.HttpsPort = 443;
    });
}
public void Configure(IApplicationBuilder app, IWebHostEnvironment env) 
{
    app.UseHttpsRedirection();
}
Use OAuth2 π
Implement OAuth2, a protocol for authorization, to provide secure restricted access tokens to clients.
// OAuth2 configuration in Startup.cs
public void ConfigureAuth(IAppBuilder app)
{
    // Configure the application for OAuth based flow
    PublicClientId = "self";
    OAuthOptions = new OAuthAuthorizationServerOptions
    {
        TokenEndpointPath = new PathString("/Token"),
        Provider = new ApplicationOAuthProvider(PublicClientId),
        AuthorizeEndpointPath = new PathString("/api/Account/Authorize"),
        AccessTokenExpireTimeSpan = TimeSpan.FromDays(14),
        // In production mode set AllowInsecureHttp = false
        AllowInsecureHttp = true
    };
    // Enable the application to use bearer tokens to authenticate users
    app.UseOAuthBearerTokens(OAuthOptions);
}
Implement the OAuth 2.0 authorization framework.
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
    .AddMicrosoftIdentityWebApi(Configuration, "AzureAd");
services.AddAuthorization(options =>
{
    options.AddPolicy("RequireAdminRole", policy => 
    {
        policy.RequireRole("Admin");
    });
});
Implementing JWT Authentication
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
            .AddJwtBearer(options =>
            {
                options.TokenValidationParameters = new TokenValidationParameters
                {
                    ValidateIssuer = true,
                    ValidateAudience = true,
                    ValidateLifetime = true,
                    ValidateIssuerSigningKey = true,
                    ValidIssuer = Configuration["Jwt:Issuer"],
                    ValidAudience = Configuration["Jwt:Issuer"],
                    IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(Configuration["Jwt:Key"]))
                };
            });
Use Rate Limiting π¦
Use middleware to enforce rate limiting rules based on IP, user, or action group.
// Middleware for rate limiting
public class RateLimitingMiddleware : OwinMiddleware
{
    public RateLimitingMiddleware(OwinMiddleware next) : base(next) { }
    public override async Task Invoke(IOwinContext context)
    {
        if (RateLimitReached(context))
        {
            context.Response.StatusCode = (int)HttpStatusCode.TooManyRequests;
            return;
        }
        await Next.Invoke(context);
    }
    private bool RateLimitReached(IOwinContext context)
    {
        // Implement your rate limiting logic here based on the context
        // For instance, check the IP address and limit the number of requests per minute
        return false;
    }
}
Implement rate limiting to cap the number of requests a client can make in a given time window. You can define rate limits based on various factors like client IP, user ID, API route, etc.
public void ConfigureServices(IServiceCollection services)
{
    services.AddOptions();
    services.AddMemoryCache();
    services.Configure<ClientRateLimitOptions>(options =>
    {
        options.GeneralRules = new List<RateLimitRule>
        {
            new RateLimitRule
            {
                Endpoint = "*",
                Period = "1m",
                Limit = 30,
            }
        };
    });
    services.AddSingleton<IClientPolicyStore, MemoryCacheClientPolicyStore>();
    services.AddSingleton<IRateLimitCounterStore, MemoryCacheRateLimitCounterStore>();
}
public void Configure(IApplicationBuilder app)
{
    app.UseClientRateLimiting();
}
Use API Versioning π
Implement versioning in your API routes to allow clients to specify the version they are designed to work with.
// Web API Route configuration
public static class WebApiConfig
{
    public static void Register(HttpConfiguration config)
    {
        config.Routes.MapHttpRoute(
            name: "VersionedApi",
            routeTemplate: "api/v{version}/{controller}/{id}",
            defaults: new { id = RouteParameter.Optional }
        );
    }
}
public class UsersController : ApiController
{
    [HttpGet]
    public string GetV1(int id)
    {
        // Version 1 specific processing
        return "Data from version 1";
    }
    [HttpGet, Route("api/v2/users/{id}")]
    public string GetV2(int id)
    {
        // Version 2 specific processing
        return "Data from version 2";
    }
}
Implement API versioning to maintain backwards compatibility. Include a version indicator (like βv1β) in the API route and optionally in the request/response headers.
services.AddApiVersioning(options =>
{
    options.DefaultApiVersion = new ApiVersion(1, 0);
    options.AssumeDefaultVersionWhenUnspecified = true;
    options.ReportApiVersions = true;
    options.ApiVersionReader = new UrlSegmentApiVersionReader();
});
[ApiVersion("1.0")]
[Route("api/v{version:apiVersion}/[controller]")]
public class UsersController : ControllerBase
{
    // Controller implementation
}
Input Validation β
Use data annotations and the [ApiController] attribute for basic validations.
public class LoginModel
{
    [Required]
    [EmailAddress]
    public string Email { get; set; }
        
    [Required]
    [StringLength(100, MinimumLength = 6)]
    public string Password { get; set; }
}
[HttpPost("login")]
public IActionResult Login([FromBody] LoginModel model)
{
    if (!ModelState.IsValid)
    {
        return BadRequest(ModelState);
    }
    
    // Authenticate user
}
Implement input validation at the API gateway level to ensure that only valid requests are processed.
public class ValidateModelAttribute : ActionFilterAttribute
{
    public override void OnActionExecuting(HttpActionContext actionContext)
    {
        if (!actionContext.ModelState.IsValid)
        {
            actionContext.Response = actionContext.Request.CreateErrorResponse(
                HttpStatusCode.BadRequest, actionContext.ModelState);
        }
    }
}
// Usage in a Controller
public class MyModel
{
    [Required]
    public string Property1 { get; set; }
    // Other properties and validation attributes
}
public class MyApiController : ApiController
{
    [ValidateModel]
    public IHttpActionResult Post(MyModel model)
    {
        // Proceed knowing the model is valid
        ProcessData(model);
        return Ok();
    }
    private void ProcessData(MyModel model)
    {
        // Processing logic
    }
}
Use Leveled API Keys ποΈ
Implement a system of leveled API keys with different access permissions. Each client gets their own unique key associated with specific roles or scopes.
public class ApiKey
{
    public int Id { get; set; }
    public string Key { get; set; }
    public string ClientName { get; set; }
    public List<string> Scopes { get; set; }
}
public class AuthorizationMiddleware
{
    private readonly RequestDelegate _next;
    public AuthorizationMiddleware(RequestDelegate next)
    {
        _next = next;
    }
    public async Task Invoke(HttpContext context, IApiKeyRepository apiKeyRepository)
    {
        string apiKey = context.Request.Headers["X-API-KEY"];
        
        if (apiKey == null)
        {
            context.Response.StatusCode = 401;
            await context.Response.WriteAsync("API key is missing.");
            return;
        }
        ApiKey key = await apiKeyRepository.GetApiKey(apiKey);
        
        if (key == null)
        {
            context.Response.StatusCode = 401;
            await context.Response.WriteAsync("Invalid API key.");
            return;
        }
        
        if (!key.Scopes.Contains(context.Request.Path.ToString()))
        {
            context.Response.StatusCode = 403;
            await context.Response.WriteAsync("Not authorized to access this resource.");
            return;
        }
        await _next(context);
    }
}
Implement leveled API keys with varying access rights.
public class ApiKeyHandler : DelegatingHandler
{
    protected override async Task<HttpResponseMessage> SendAsync(HttpRequestMessage request, CancellationToken cancellationToken)
    {
        // Validate API key
        if (!ValidateApiKey(request.Headers, out var apiKey))
        {
            return request.CreateResponse(HttpStatusCode.Forbidden, "Invalid API Key");
        }
        // Check access level of API key and set user's role
        SetUserRoleBasedOnApiKey(apiKey);
        // Continue down the pipeline
        return await base.SendAsync(request, cancellationToken);
    }
    private bool ValidateApiKey(HttpRequestHeaders headers, out string apiKey)
    {
        // Logic to validate API key
        apiKey = /* ... */;
        return true;
    }
    private void SetUserRoleBasedOnApiKey(string apiKey)
    {
        // Logic to set user role based on API key level
    }
}
Authorization π
Implement role-based access control (RBAC) and check user permissions on each API endpoint before allowing the request to proceed.
[Authorize(Roles = "Admin")]
[HttpDelete("users/{id}")]
public async Task<IActionResult> DeleteUser(int id)
{
    // Delete user logic
    return NoContent();
}
Implement authorization checks within your API to distinguish between different levels of access rights for users.
[Authorize(Roles = "Admin, Viewer")]
public class DataController : ApiController
{
    public IHttpActionResult GetData()
    {
        // Only users with role "Admin" or "Viewer" can access data
        var data = GetDataFromService();
        return Ok(data);
    }
    [Authorize(Roles = "Admin")]
    public IHttpActionResult UpdateData(MyDataModel model)
    {
        // Only users with role "Admin" can update data
        UpdateDataService(model);
        return Ok();
    }
    // Separate methods to get and update data
    private object GetDataFromService() { /*...*/ }
    private void UpdateDataService(MyDataModel model) { /*...*/ }
}
Allowlist β
Use an allowlist (or whitelist) to explicitly define the permitted values for sensitive parameters.
[HttpGet("articles")]
public IActionResult GetArticles([FromQuery] string category)
{
    string[] allowedCategories = { "science", "technology", "business" };
    
    if (!allowedCategories.Contains(category))
    {
        return BadRequest("Invalid category.");
    }
    
    // Fetch and return articles in the specified category
}
Implement an IP allowlist that permits requests only from known and trusted IP addresses.
public class IPAllowlistHandler : DelegatingHandler
{
    private readonly string[] _trustedIPs;
    public IPAllowlistHandler(string[] trustedIPs)
    {
        _trustedIPs = trustedIPs ?? throw new ArgumentNullException(nameof(trustedIPs));
    }
    protected override Task<HttpResponseMessage> SendAsync(HttpRequestMessage request, CancellationToken cancellationToken)
    {
        var context = ((HttpContextBase)request.Properties["MS_HttpContext"]);
        var requestIP = context.Request.UserHostAddress;
        if (!_trustedIPs.Contains(requestIP))
        {
            return Task.FromResult(request.CreateResponse(HttpStatusCode.Forbidden, "Access denied from this IP address"));
        }
        return base.SendAsync(request, cancellationToken);
    }
}
OWASP API Security Risks π
// Example of checking for broken user authentication, which is a common OWASP risk
public class AuthenticationMiddleware : OwinMiddleware
{
    public AuthenticationMiddleware(OwinMiddleware next) : base(next) {}
    public override async Task Invoke(IOwinContext context)
    {
        if (!UserIsAuthenticated(context))
        {
            context.Response.StatusCode = 401; // Unauthorized
            await context.Response.WriteAsync("User authentication failed.");
            return;
        }
        await Next.Invoke(context);
    }
    private bool UserIsAuthenticated(IOwinContext context)
    {
        // Implement your authentication logic here
        // Make sure it's in line with OWASP recommendations
        return true; // Placeholder for actual authentication check
    }
}
Use an API Gateway π
Use an API Gateway to act as a single-entry point for all client requests.
// Configure API Gateway routes
var routes = new List<RouteConfiguration>
{
    new RouteConfiguration
    {
        RouteId = "users-route",
        UpstreamPathTemplate = "/api/users/{everything}",
        DownstreamPathTemplate = "/api/users/{everything}",
        DownstreamScheme = "https",
        DownstreamHostAndPorts = new List<DownstreamHostAndPort>
        {
            new DownstreamHostAndPort
            {
                Host = "users-service",
                Port = 443
            }
        }
    },
    // Additional route configurations
};
var config = new OcelotPipelineConfiguration
{
    Routes = routes
};
// Configure authentication middleware
services.AddAuthentication()
    .AddJwtBearer("users-service", options =>
    {
        // JWT bearer configuration for users service
    })
    .AddJwtBearer("products-service", options =>
    {
        // JWT bearer configuration for products service
    });
await ocelotBuilder.AddOcelot(config)
    .AddDelegatingHandler<AuthenticationDelegatingHandler>()
    .Build()
    .StartAsync();
Implement an API Gateway as the single entry point to your microservices.
public class ApiGatewayHandler : DelegatingHandler
{
    protected override async Task<HttpResponseMessage> SendAsync(HttpRequestMessage request, CancellationToken cancellationToken)
    {
        // Pre-processing: authentication, logging, etc.
        AuthenticateRequest(request);
        // Route to the appropriate service
        var response = RouteToService(request);
        // Post-processing: modify response, add headers, etc.
        return await ProcessResponse(response);
    }
    private void AuthenticateRequest(HttpRequestMessage request)
    {
        // Authentication logic
    }
    private Task<HttpResponseMessage> RouteToService(HttpRequestMessage request)
    {
        // Logic to route to specific services
        // This is a placeholder for actual routing logic
        return Task.FromResult(new HttpResponseMessage());
    }
    private async Task<HttpResponseMessage> ProcessResponse(HttpResponseMessage response)
    {
        // Response processing logic
        return response;
    }
}
Error Handling π¨
Default error handler
public class ErrorDetails
{
    public int StatusCode { get; set; }
    public string Message { get; set; }
}
public class GlobalExceptionFilter : IExceptionFilter
{
    private readonly ILogger<GlobalExceptionFilter> _logger;
    public GlobalExceptionFilter(ILogger<GlobalExceptionFilter> logger)
    {
        _logger = logger;
    }
    public void OnException(ExceptionContext context)
    {
        int statusCode = StatusCodes.Status500InternalServerError;
        string message = "An unexpected error occurred.";
        if (context.Exception is ArgumentException)
        {
            statusCode = StatusCodes.Status400BadRequest;
            message = "Invalid request data.";
        }
        else if (context.Exception is UnauthorizedAccessException)
        {
            statusCode = StatusCodes.Status401Unauthorized;
            message = "Authentication required.";
        }
        // Handle other specific exception types
        _logger.LogError(context.Exception, "Unhandled exception occurred.");
        context.Result = new ObjectResult(new ErrorDetails
        {
            StatusCode = statusCode,
            Message = message
        })
        {
            StatusCode = statusCode
        };
        context.ExceptionHandled = true;
    }
}
// Register the global exception filter
services.AddControllers(options =>
{
    options.Filters.Add<GlobalExceptionFilter>();
});
Custom error handler
public class GlobalExceptionHandler : ExceptionHandler
{
    public override void Handle(ExceptionHandlerContext context)
    {
        // Log the exception details for internal use
        LogException(context.Exception);
        // Provide a friendly error message to the client
        var result = new HttpResponseMessage(HttpStatusCode.InternalServerError)
        {
            Content = new StringContent("An unexpected error occurred. Please try again later."),
            ReasonPhrase = "Critical Exception"
        };
        context.Result = new ErrorMessageResult(context.Request, result);
    }
    private void LogException(Exception exception)
    {
        // Implement logging logic
    }
}
public class ErrorMessageResult : IHttpActionResult
{
    private readonly HttpRequestMessage _request;
    private readonly HttpResponseMessage _httpResponseMessage;
    public ErrorMessageResult(HttpRequestMessage request, HttpResponseMessage httpResponseMessage)
    {
        _request = request;
        _httpResponseMessage = httpResponseMessage;
    }
    public Task<HttpResponseMessage> ExecuteAsync(CancellationToken cancellationToken)
    {
        return Task.FromResult(_httpResponseMessage);
    }
}
// Register in WebApiConfig
config.Services.Replace(typeof(IExceptionHandler), new GlobalExceptionHandler());
Input Validation π‘οΈ
Use data annotations and the [ApiController] attribute for basic validations.
public class CreateUserModel
{
    [Required]
    [StringLength(50)]
    public string Username { get; set; }
    [Required]
    [EmailAddress]
    public string Email { get; set; }
    [Required]
    [StringLength(100, MinimumLength = 6)]
    public string Password { get; set; }
}
[HttpPost]
public IActionResult CreateUser([FromBody] CreateUserModel model)
{
    if (!ModelState.IsValid)
    {
        return BadRequest(ModelState);
    }
    // Create user logic
    return CreatedAtAction(nameof(GetUser), new { id = user.Id }, user);
}
For more complex validation scenarios, consider using a dedicated validation library like FluentValidation.
public class CreateUserValidator : AbstractValidator<CreateUserModel>
{
    public CreateUserValidator()
    {
        RuleFor(x => x.Username)
            .NotEmpty()
            .MaximumLength(50);
        RuleFor(x => x.Email)
            .NotEmpty()
            .EmailAddress();
        RuleFor(x => x.Password)
            .NotEmpty()
            .Length(6, 100);
    }
}
[HttpPost]
public IActionResult CreateUser([FromBody] CreateUserModel model)
{
    var validator = new CreateUserValidator();
    var validationResult = validator.Validate(model);
    if (!validationResult.IsValid)
    {
        return BadRequest(validationResult.Errors);
    }
    // Create user logic
    return CreatedAtAction(nameof(GetUser), new { id = user.Id }, user);
}
Implement input validation at the API gateway level to ensure that only valid requests are processed.
public class ValidateModelAttribute : ActionFilterAttribute
{
    public override void OnActionExecuting(HttpActionContext actionContext)
    {
        if (!actionContext.ModelState.IsValid)
        {
            actionContext.Response = actionContext.Request.CreateErrorResponse(
                HttpStatusCode.BadRequest, actionContext.ModelState);
        }
    }
}
// Usage in a Controller
public class MyModel
{
    [Required]
    public string Property1 { get; set; }
    // Other properties and validation attributes
}
public class MyApiController : ApiController
{
    [ValidateModel]
    public IHttpActionResult Post(MyModel model)
    {
        // Proceed knowing the model is valid
        ProcessData(model);
        return Ok();
    }
    private void ProcessData(MyModel model)
    {
        // Processing logic
    }
}