Verify Secure API Access and Maintain

After configuring IP allowlisting, it’s critical to confirm that only trusted systems can reach iMaintenance services and to keep the rules updated as environments evolve. Verification ensures the setup is working as intended, while regular maintenance keeps access aligned with changing business and IT requirements.

To verify:
  1. From an allowed client IP, call an iMaintenance API → request should succeed.
  2. From a non-allowed IP, repeat the call → request should be blocked (HTTP 403 or connection refused).
  3. Review logs for confirmation:
    • AWS WAF / perimeter → blocked or allowed request entries

    • SAP Gateway / API Management → proxy access logs

    • Application → unauthorized or denied attempts

Maintain

  1. Revalidate allowlists during major releases or quarterly reviews.
  2. Update entries when client subnets, VPN egress IPs, or cloud endpoints change.
  3. Remove decommissioned IPs/domains to keep rules minimal.
  4. Document each entry with owner, change date, and business justification.
Avoid Common Pitfalls
  • NAT or proxy may mask the client IP → ensure headers preserve the real source IP.

  • Overly broad CIDRs (e.g., /16) expand attack surface → prefer /32 or the smallest viable range.