Skip to content

Commit 7f7d768

Browse files
Spacing and minor copy edits
1 parent 658ed1a commit 7f7d768

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

src/content/changelog/api-shield/2025-03-18-api-posture-management.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ View these risks in [Endpoint Management](https://developers.cloudflare.com/api-
1515
![An example security center insight](~/assets/images/changelog/api-shield/posture-management-insight.png)
1616

1717
API Shield will scan for risks on your API inventory daily. Here are the new risks we're scanning for and automatically labelling:
18+
1819
- **cf-risk-sensitive**: applied if the customer is subscribed to the sensitive data detection ruleset and the WAF detects sensitive data returned on an endpoint in the last 7 days.
1920
- **cf-risk-missing-auth**: applied if the customer has configured a session ID and no successful requests to the endpoint contain the session ID.
2021
- **cf-risk-mixed-auth**: applied if the customer has configured a session ID and some successful requests to the endpoint contain the session ID while some lack the session ID.
@@ -24,9 +25,10 @@ API Shield will scan for risks on your API inventory daily. Here are the new ris
2425
- **cf-risk-size-anomaly**: added when an endpoint experiences a spike in response body size over the last 24 hours.
2526

2627
In addition, API Shield has two new 'beta' scans for **Broken Object Level Authorization (BOLA) attacks**. If you're in the beta, you'll see the following two labels when API Shield suspects an endpoint is suffering from a BOLA vulnerability:
28+
2729
- **cf-risk-bola-enumeration**: added when an endpoint experiences successful responses with drastic differences in the number of unique elements requested by different user sessions.
2830
- **cf-risk-bola-pollution**: added when an endpoint experiences successful responses where parameters are found in multiple places in the request.
2931

30-
We are currently accepting more customers into our beta. Please contact your account team if you are interested in BOLA attack detection for your API.
32+
We are currently accepting more customers into our beta. Contact your account team if you are interested in BOLA attack detection for your API.
3133

32-
Read our [blog post](https://blog.cloudflare.com/cloudflare-security-posture-management/) to learn more about Cloudflare's expanded posture management capabilities.
34+
Refer to the [blog post](https://blog.cloudflare.com/cloudflare-security-posture-management/) for more information about Cloudflare's expanded posture management capabilities.

0 commit comments

Comments
 (0)