Each API call must contain a HMAC SHA256 signature which is generated based on the path, URL parameters, and payload, signed with the API key and secret. This signature is validated for every API call. Additionally, API calls are rate limited based on the resource type.
What security measures does the CloudSploit API use? Print
Created by: Matt Fuller
Modified on: Sun, 10 Nov, 2019 at 11:55 AM
Did you find it helpful?Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.