Postman Enterprise Hardening Guide
API platform security hardening for Postman Enterprise including SSO, team policies, and API key management
Overview
Postman is the leading API platform used by over 30 million developers for API design, testing, documentation, and collaboration. Enterprise deployments store sensitive API endpoints, authentication tokens, and test data. Proper security configuration prevents credential leakage and unauthorized access to development resources.
Intended Audience
- Security engineers managing developer tools
- IT administrators configuring Postman Enterprise
- GRC professionals assessing API development security
- DevOps engineers implementing secure API workflows
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Postman Enterprise security configurations including team management, SSO, API key management, and workspace security.
Table of Contents
- Authentication & SSO
- Team & Workspace Security
- API Key & Secret Management
- Monitoring & Compliance
- Compliance Quick Reference
1. Authentication & SSO
1.1 Configure SAML Single Sign-On
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO to centralize authentication and enforce organizational security policies.
Rationale
Why This Matters:
- Centralizes identity management
- Enables enforcement of corporate MFA policies
- Provides seamless sign-in experience
- Supports regulatory compliance requirements
Prerequisites
- Postman Enterprise plan
- SAML 2.0 compatible identity provider
ClickOps Implementation
Step 1: Access Authentication Settings
- Navigate to: Organization or Team Settings → Authentication
- Click Add Authentication Method
- Select SAML authentication type
Step 2: Configure SAML
- Enter authentication name (identifiable to your organization)
- Click Continue to configure IdP details
- Note Postman SAML details:
- ACS URL
- Entity ID
- Relay State
Step 3: Configure Identity Provider
- Create SAML application in your IdP
- Configure attribute mappings:
- Email (required)
- Name (optional)
- Upload IdP metadata to Postman or enter manually:
- SSO URL
- Certificate
Step 4: Configure Enhanced Security (Optional)
- For stricter security requirements:
- Enable SAML signing certificates
- Enable encryption certificates
- Note: Not supported by all IdPs
Step 5: Enforce SSO
- Test SSO authentication
- Enable Enforce SSO after successful testing
- Configure recovery options for admin access
Time to Complete: ~1 hour
1.2 Configure SCIM Provisioning
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.3 |
| NIST 800-53 | AC-2 |
Description
Configure SCIM for automatic user provisioning and deprovisioning synced with your identity provider.
Rationale
Why This Matters:
- Automates user lifecycle management
- Quick offboarding when employees leave
- Reduces manual user management errors
- Syncs group memberships
ClickOps Implementation
Step 1: Enable SCIM
- Navigate to: Organization Settings → Authentication → SCIM provisioning
- Generate SCIM API key
- Note SCIM endpoint URL
Step 2: Configure IdP SCIM
- In your IdP, enable SCIM provisioning
- Enter Postman SCIM endpoint
- Enter SCIM API key
- Configure provisioning settings:
- Create users
- Update users
- Deactivate users
- Sync groups
Step 3: Configure JIT Provisioning (Alternative)
- If SCIM not available, enable JIT provisioning
- Navigate to: Authentication → SSO Settings
- Enable Just-in-Time provisioning
- Users auto-provisioned on first SSO login
1.3 Enforce Multi-Factor Authentication
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require MFA for team members accessing Postman.
ClickOps Implementation
Step 1: Enforce MFA via SSO
- Configure MFA enforcement in your IdP
- All users authenticating via SSO will require MFA
- Verify MFA is enforced before SSO login
Step 2: Enforce MFA for Non-SSO Users
- Navigate to: Team Settings → Authentication
- Enable Require MFA for team members
- Set compliance deadline
Step 3: Communicate Requirements
- Notify team members of MFA requirement
- Provide setup documentation
- Monitor compliance status
2. Team & Workspace Security
2.1 Configure Workspace Permissions
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Configure workspace-level permissions following least privilege principles.
ClickOps Implementation
Step 1: Create Workspace Structure
- Navigate to: Workspaces → Create Workspace
- Create workspaces by:
- Team/project
- Security level (public APIs, internal APIs, sensitive APIs)
Step 2: Configure Workspace Visibility
- Personal: Only owner can access
- Private: Invited members only
- Team: All team members can view
- Public: Anyone can view (avoid for sensitive work)
Step 3: Configure Member Roles
- Navigate to: Workspace Settings → Members
- Assign roles:
- Viewer: Can only send requests
- Editor: Can add and modify elements
- Admin: Full workspace control
- Apply principle of least privilege
2.2 Configure Team Member Roles
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Implement role-based access control for team administration.
ClickOps Implementation
Step 1: Review Team Roles
- Navigate to: Team Settings → Members
- Review available roles:
- Admin: Full team management
- Billing: Billing management only
- Developer: Standard access
Step 2: Assign Minimum Required Roles
- Limit Admin role to essential personnel (2-3)
- Use Developer role for most team members
- Separate billing responsibilities
Step 3: Create Custom Roles (Enterprise)
- For Enterprise plans with custom roles
- Create role-based on specific needs
- Apply to members as appropriate
2.3 Control Invitation Settings
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.3 |
| NIST 800-53 | AC-2 |
Description
Control who can invite new members to the team.
ClickOps Implementation
Step 1: Configure Invitation Policies
- Navigate to: Team Settings → Security → Invitations
- Configure:
- Restrict who can send invitations (Admins only)
- Allow invitations only to specific email domains
- Require admin approval for new members
Step 2: Domain Capture (Enterprise)
- Navigate to: Organization Settings → Domains
- Claim and verify your organization’s domain
- Enable domain capture to consolidate all users
2.4 Restrict Public Workspaces
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.3 |
| NIST 800-53 | AC-3 |
Description
Restrict the creation of public workspaces to prevent accidental data exposure.
ClickOps Implementation
Step 1: Configure Workspace Policies
- Navigate to: Team Settings → Security
- Under workspace settings:
- Restrict public workspace creation
- Require approval for public workspaces
Step 2: Audit Existing Public Workspaces
- Review all existing public workspaces
- Verify no sensitive data is exposed
- Convert to private if necessary
3. API Key & Secret Management
3.1 Configure API Key Expiration
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Configure Postman API key expiration to limit credential lifetime.
Rationale
Why This Matters:
- API keys give access to all Postman data
- Shorter expiration limits exposure from compromised keys
- Encourages regular key rotation
ClickOps Implementation
Step 1: Configure Personal API Key Expiration
- Navigate to: Account Settings → Postman API keys
- When generating new key, set expiration:
- 30 days: Most secure
- 60 days: Balanced
- 180 days: Maximum (not recommended)
Step 2: Enforce Team Key Policies (Enterprise)
- Navigate to: Team Settings → Security
- Enable Manage Postman Keys feature
- Configure team-wide expiration policies
- Set maximum key lifetime
3.2 Centralize API Key Management
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Centrally manage team API keys with visibility and revocation capabilities.
Prerequisites
- Postman Enterprise plan
ClickOps Implementation
Step 1: Enable Central Key Management
- Navigate to: Team Settings → Security → API Keys
- Enable Manage Postman Keys
- View all team member API keys
Step 2: Configure Key Policies
- Set maximum key duration
- Configure approval requirements
- Enable notifications for key creation
Step 3: Audit and Revoke Keys
- Regularly review active keys
- Revoke keys for departed employees
- Revoke compromised keys immediately
3.3 Use Postman Vault for Secrets
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Use Postman Local Vault to store sensitive credentials locally, never syncing to cloud.
Rationale
Why This Matters:
- Vault secrets remain local only
- Never synced to Postman cloud servers
- Enables safe API testing with real credentials
ClickOps Implementation
Step 1: Configure Postman Vault
- Navigate to: Settings → Vault
- Add secrets to local vault
- Reference secrets using
{{vault:secret_name}}
Step 2: Configure Vault Integrations
- Available integrations:
- 1Password
- AWS Secrets Manager
- Azure Key Vault
- HashiCorp Vault
- Configure integration for enterprise secrets
Step 3: Train Team on Vault Usage
- Document vault best practices
- Never store secrets in environment variables (synced)
- Use vault for all sensitive credentials
3.4 Enable Secret Scanner
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 16.4 |
| NIST 800-53 | IA-5 |
Description
Use Postman’s Secret Scanner to detect exposed credentials in public workspaces.
ClickOps Implementation
Step 1: Verify Secret Scanner Status
- Navigate to: Team Settings → Security
- Verify Secret Scanner is enabled
- Review scanner findings
Step 2: Configure Alerts
- Configure notification recipients
- Set up incident response procedures
- Respond promptly to detected secrets
Step 3: Rotate Detected Secrets
- When secret detected, rotate immediately
- Document incident
- Update storage practices
4. Monitoring & Compliance
4.1 Review Audit Logs
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Regularly review audit logs for security events and compliance.
ClickOps Implementation
Step 1: Access Audit Logs
- Navigate to: Team Settings → Audit logs
- Review logged events:
- User sign-in events
- Team membership changes
- Workspace changes
- API key events
- Billing events
Step 2: Configure SIEM Integration
- Navigate to: Integrations → Audit Logs
- Configure audit log export via API
- Stream to SIEM for alerting
Key Events to Monitor:
- Failed login attempts
- API key creation/revocation
- Public workspace creation
- Admin role changes
- SSO configuration changes
4.2 Configure Allowed Domains
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 12.8 |
| NIST 800-53 | AC-20 |
Description
Restrict API requests to approved domains to prevent data exfiltration.
ClickOps Implementation
Step 1: Configure Domain Allowlist
- Navigate to: Team Settings → Security → Allowed Domains
- Add approved API domains
- Block requests to unapproved domains
Step 2: Test Configuration
- Verify approved domains work
- Verify blocked domains are denied
- Document exception process
4.3 Implement Data Governance
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.1 |
| NIST 800-53 | AC-3 |
Description
Implement data governance policies for collections and workspaces.
ClickOps Implementation
Step 1: Define Data Classification
- Establish data classification levels:
- Public
- Internal
- Confidential
- Restricted
- Document handling requirements
Step 2: Implement Workspace Policies
- Create workspaces by classification level
- Apply appropriate access controls
- Regular data reviews
Step 3: Training
- Train team on data handling
- Document approved workflows
- Regular compliance reminders
5. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | Postman Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/MFA | 1.1 |
| CC6.2 | Role-based access | 2.2 |
| CC6.6 | Workspace permissions | 2.1 |
| CC7.2 | Audit logging | 4.1 |
| CC6.7 | Vault secrets | 3.3 |
NIST 800-53 Rev 5 Mapping
| Control | Postman Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 1.1 |
| IA-2(1) | MFA | 1.3 |
| AC-2 | SCIM provisioning | 1.2 |
| AC-6 | Least privilege | 2.1 |
| SC-12 | Key management | 3.1 |
| AU-2 | Audit logging | 4.1 |
Appendix A: Plan Compatibility
| Feature | Free | Basic | Professional | Enterprise |
|---|---|---|---|---|
| SSO | ❌ | ❌ | ❌ | ✅ |
| SCIM | ❌ | ❌ | ❌ | ✅ |
| Central API Key Management | ❌ | ❌ | ❌ | ✅ |
| Audit Logs | ❌ | ❌ | ❌ | ✅ |
| Domain Capture | ❌ | ❌ | ❌ | ✅ |
| Workspace Roles | Basic | Basic | ✅ | ✅ |
| Postman Vault | ✅ | ✅ | ✅ | ✅ |
| Secret Scanner | ✅ | ✅ | ✅ | ✅ |
Appendix B: References
Official Postman Documentation:
- Trust Center (Compliance)
- Customer Trust Portal
- Postman Security Features
- Learning Center
- Postman Enterprise Overview
- Configure SSO
- Intro to SSO
- Team Security
- How to Securely Deploy Postman at Scale
API Documentation:
Security Resources:
Compliance Frameworks:
- SOC 2 Type II, SOC 3, ISO 27001, PCI DSS, CSA STAR, GDPR — via Compliance Page
Security Incidents:
- December 2024: CloudSEK researchers discovered over 30,000 publicly accessible Postman workspaces leaking API keys, access tokens, and refresh tokens across organizations in healthcare, finance, and other industries. The root cause was user misconfiguration (improper workspace visibility settings), not a platform vulnerability. Postman responded by introducing secret-protection policies to prevent public workspaces from exposing sensitive information. — CloudSEK Report
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with SSO, team security, and API key management | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide