This content applies to WaaS 1.0 only. We highly recommend that you upgrade to WaaS 2.0.
- Generate and store api_key and api_secret on a trusted device. We recommend encrypting the api_secret and then decrypting it during use to ensure it is never transmitted between other servers, networks (e.g., Telegram or instant messengers), or individuals.
- Add IP whitelists. Note that Cobo only accepts requests from designated servers.
- Implement Role-Based Access Control (RBAC) to restrict permissions associated with each API key or token. Ensure that every key is assigned only the essential permissions required for its intended function, adhering to the principle of least privilege.
- Enforce a robust API key rotation policy to systematically update keys at regular intervals. This practice not only mitigates the risk of compromised keys but also guarantees the revocation of outdated or unused keys.
- Implement short-term expirations for API keys or tokens to reduce the window of opportunity for potential attackers. Short-lived keys necessitate more frequent renewal, contributing to heightened security measures by limiting access time.
- Encrypt API keys both in transit (HTTPS) and at rest. Employ encryption and robust storage mechanisms to safeguard keys on servers.
Feel free to share your feedback to improve our documentation!