Yoco API

Security

Industry best practices are followed to maintain a high level of security:

  • OAuth 2.0 authentication is supported.
  • Fine-grained access control is used to authorise access to resources.
  • The API is only accessible over HTTPS, and data is encrypted in-transit using TLS.
  • Rate limiting and throttling are applied to sensitive API endpoints to prevent abuse.
  • Encryption at rest is used to encrypt sensitive data in the database.
  • An audit log of changes to resources is maintained.
  • Logs are stored for significant events that occur within the API and systems.