ASTRA — API Security Threat & Risk Atlas¶
The structured, protocol-native threat matrix for API security.
ASTRA gives security engineers, pentesters, and developers a common language for understanding how APIs are attacked — and exactly how to detect and stop it.
Every technique includes a real breach mapping, a Sigma detection rule, a severity score, and protocol-specific guidance. Not a list. A living standard.
Quick navigation¶
- Full matrix →
- Browse by tactic →
- Detection rules →
- Real breach mappings →
- White paper →
- How to contribute →
At a glance¶
| Tactics | 5 |
| Techniques (v1.0) | 14 |
| Protocols covered | REST, GraphQL, gRPC, WebSocket, SOAP |
| Sigma rules | 14 |
| Breach mappings | 10+ |
| License | CC BY 4.0 |
Why ASTRA exists¶
MITRE ATT&CK is broad. OWASP API Top 10 is a ranked list. Neither gives you a structured, navigable, detection-ready knowledge base of API-specific attack techniques mapped to real incidents.
ASTRA fills that gap. It is protocol-native, community-driven, versioned like software, and built for practitioners — not compliance checkboxes.