API Compliance
The API Compliance feature helps you ensure your API adheres to regulatory requirements such as GDPR, CCPA, and PCI DSS by identifying sensitive data within API requests and responses.
Steps to Use API Compliance
Section titled “Steps to Use API Compliance”1. Check the Dashboard
Section titled “1. Check the Dashboard”- After logging into Treblle, go to the Dashboard.
- The API Compliance percentage overviews your API’s compliance status.
2. Access the Compliance Section
Section titled “2. Access the Compliance Section”- Click the Compliance tab in the left-hand menu to enter the compliance dashboard.
- You can switch between Calendar View and Graph View for tracking compliance status.
3. Use the Calendar View
Section titled “3. Use the Calendar View”- In the Calendar View, hover over a date to view the compliance percentage for that day.
- Clicking on a date shows all requests flagged as non-compliant for that day.
4. Use the Graph View
Section titled “4. Use the Graph View”- Monitor your API’s compliance trend in the Graph View to spot patterns or improvements.
5. Invite Team Members
Section titled “5. Invite Team Members”- Use the Invite option to share the compliance status with your team members.
6. View Individual Request Compliance
Section titled “6. View Individual Request Compliance”- Navigate to any specific API request to see detailed compliance checks for that request.
- Treblle performs real-time compliance validation against multiple standards:
- GDPR: Checks for personal data handling (email addresses, names, etc.)
- PCI DSS: Validates credit card data protection and payment information security
- CCPA: Monitors California consumer data privacy requirements
- HIPAA: Ensures health information privacy and security standards
- Each request displays a Request Compliance Score (percentage) and individual pass/fail status for each regulation.
- Click on any compliance standard to see specific checks performed and detailed explanations of what was validated.
7. Manage Access
Section titled “7. Manage Access”- Customize permissions for team members to control access to sensitive compliance logs, ensuring only authorized personnel can view or modify the data.