Security
Cloudflare offers the following features to help secure your APIs:
Discovery & management | Posture management | Runtime protection |
---|---|---|
API Discovery | Volumetric Abuse Detection | Schema validation |
Schema learning | Authentication Posture | JWT validation |
Sequence Analytics | BOLA vulnerability detection | Sequence mitigation |
Risk labels | Mutual TLS (mTLS) | |
GraphQL query protection |
Cloudflare's API Shield — together with other compatible Cloudflare products — helps protect your API from the issues detailed in the OWASP® API Security Top 10 ↗.
The following table provides examples of how you might match Cloudflare products to OWASP vulnerabilities:
OWASP issue | Example Cloudflare solution |
---|---|
Broken Object Level Authorization | BOLA vulnerability detection, Sequence mitigation, Schema validation, JWT validation, Rate Limiting |
Broken Authentication | Authentication Posture, mTLS, JWT validation, Exposed Credential Checks, Bot Management |
Broken Object Property Level Authorization | Schema validation, JWT validation |
Unrestricted Resource Consumption | Rate Limiting, Sequence mitigation, Bot Management, GraphQL Query Protection |
Broken Function Level Authorization | Schema validation, JWT validation |
Unrestricted Access to Sensitive Business Flows | Sequence mitigation, Bot Management, GraphQL Query Protection |
Server Side Request Forgery | Schema validation, WAF managed rules, WAF custom rules |
Security Misconfiguration | Sequence mitigation, Schema validation, WAF managed rules, GraphQL Query Protection |
Improper Inventory Management | Discovery, Schema learning |
Unsafe Consumption of APIs | JWT validation, WAF managed rules |
Was this helpful?
- Resources
- API
- New to Cloudflare?
- Directory
- Sponsorships
- Open Source
- Support
- Help Center
- System Status
- Compliance
- GDPR
- Company
- cloudflare.com
- Our team
- Careers
- © 2025 Cloudflare, Inc.
- Privacy Policy
- Terms of Use
- Report Security Issues
- Trademark