Securing an Apigee API Proxy
In a perfect world, you wouldn't have to worry about unknown persons attacking your data services via SQL injection attacks. But we live in the real world, where such assaults are all too common. In this hands-on lab, we'll first see how a SQL injection attempt can reach the backend server. Then, we'll incorporate the Regular Expression Protection policy – with all the necessary regex patterns – to guard against this form of destructive access.