Mapping layered security with AA ecosystem APIs

Category

AA

FIP

FIU

Layered Security consideration for Request and Response

Account Discovery and Linking

Χ

  • Account Discover [SR1]

Χ

  • Application Layer Security

  • Protocol Layer Security

  • Account Linking/Delink [SR2]

  • Application Layer Security

  • Protocol Layer Security

  • Authenticating Link/Delink Request [SR3]

  • Application Layer Security

  • Protocol Layer Security

Consent

  • Consent Request

  • Posting Consent

Χ

  • Application Layer Security

  • Protocol Layer Security

Consent Handle Management

  • Consent Status Request

Χ

Χ

  • Application Layer Security

  • Getting Consent

  • Application Layer Security

FI Data Flow

  • FI Data – Request

  • FI Data – Request

Χ

  • Application Layer Security

  • Protocol Layer Security

  • FI Data - Fetch

  • FI Data - Fetch

  • Business Layer Security

  • Application Layer Security

  • Protocol Layer Security

Notification

  • Linking Status

  • Consent Status

  • FI Data Status

  • Consent Status

  • Consent Status

  • FI Data Status

  • Application Layer Security

  • Protocol Layer Security

Monitoring

  • Heartbeat API

  • Heartbeat API

Χ

  • Application Layer Security

  • Security Requirement 1 [SR1]: The Account discovery request and response implements the application layer security and protocol layer security. The security goals of implementing the application layer security are authenticating the sender, overcome the man-in-the-middle attack, preserve the integrity of the request and response data. Along with application layer security, the protocol layer security encrypts the request and response body while in transit by using TLSv1.2. In this way, the encryption of payload ensures that the data including PII is a secure during data-in-transit without any additional encryption mechanism for PII.

  • Security Requirement 2 [SR2]: The Account linking/delinking follows the same security requirements as defined in Security Requirement 1[SR1].

  • Security Requirement 3 [SR3]: The Authenticating link/delink uses GET API call to submit the token for verifying the customer based on industry standard RESTful API design principle. The Application layer security by generating the x-jws-signature on GET URL request ensures that the OTP is submitted by authentic customer and overcome the replay attack. The time-bounded space of OTP is restricted to access only for short time for OTP submission and validation. The payload encryption with api key also ensure that the only authentic requester can call this API to submit the OTP which is non-PII data.

Last updated