• Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly
Facebook Twitter Instagram
Tuesday, May 17
Facebook Twitter Instagram
The Zine Weekly
  • Zine

    Apex Legends Mobile Review: The Resemblance Is Uncanny

    May 16, 2022

    Eurovision 2022: Russian hackers targeted contest, say Italian police

    May 16, 2022

    How to download YouTube videos

    May 16, 2022

    Food Truck Festival Giveaway Rules

    May 16, 2022

    Why Build in Web3

    May 16, 2022
  • Anonymous

    Eurovision 2022: Russian hackers targeted contest, say Italian police

    May 16, 2022

    How Netflix Is a Joke Addresses a Film Distribution Flaw

    May 14, 2022

    How to Fight Foreign Hackers With Civil Litigation

    May 14, 2022

    Former hacktivist provides security advice

    May 13, 2022

    Anonymous appears to slam Elon Musk’s ‘left wing bias’ comment with new Twitter post

    May 11, 2022
  • Green

    Scientists create renewable biocement made entirely from waste materials

    May 16, 2022

    Proposed improvements to SiC MOSFET power converter technology overcome existing challenges

    May 14, 2022

    Emerging hydrogen storage technology could increase energy resilience

    May 11, 2022

    Microgrid demo to lend a helping hand in India’s green energy transition

    May 9, 2022

    California prepares for energy shortfalls in hot, dry summer

    May 7, 2022
  • IT

    How to download YouTube videos

    May 16, 2022

    Roe v. Wade reversal could hinder data privacy rights

    May 16, 2022

    Bumper blast! Apple’s smartphone is available for less than 50,000.

    May 15, 2022

    Aura Review | PCMag

    May 14, 2022

    Policymaker proposes commission to oversee digital platforms

    May 13, 2022
  • Gadgets

    Apex Legends Mobile Review: The Resemblance Is Uncanny

    May 16, 2022

    Our study suggests they boost intelligence in children

    May 16, 2022

    Realme TechLife Watch SZ100 India Launch Date Set for May 18, Teased to Offer Up to 12-Day Battery Life

    May 15, 2022

    These high-tech must-have products have actually gotten cheaper

    May 14, 2022

    Musk-Twitter Deal Expected to Close, but Prepared for All Scenarios, Says CEO Parag Agrawal

    May 14, 2022
  • Tech

    Two Twitter bosses ousted ahead of Elon Musk $44bn takeover

    May 13, 2022

    4D composite printing could improve the wings of drones

    May 11, 2022

    How to delete unused styles using VBA in Word

    May 9, 2022

    Best Gas Credit Cards in May 2022

    May 6, 2022

    Eshoo faces rivals from left, right and center in bid to retain Congress seat | News

    May 4, 2022
  • Cloud

    To Drive Technological Progress, We Need Worker Power

    May 16, 2022

    The age of discontinuity | The Manila Times

    May 15, 2022

    Alibaba Cloud-UCSI to support digital economy

    May 15, 2022

    The Matter of Everything, Twelve Experiments that Changed our World: Rich rewards

    May 14, 2022

    VMware sovereign cloud initiative grows to 14 partners

    May 12, 2022
  • Data

    Real-time Analytics News for Week Ending May 14

    May 16, 2022

    Greatest REIT Wannabes Of All-Time: Part I

    May 15, 2022

    Metaverse: ‘Train your robots in the virtual world’ (CXOTalk interview)

    May 15, 2022

    Evoque Partners with Archer Datacenters to Develop 61 Acre

    May 14, 2022

    A Recipe to Migrate and Scale Monoliths in the Cloud

    May 13, 2022
  • Network

    Why Build in Web3

    May 16, 2022

    Broadband Nutrition Labels and Deployment See Renewed Focus in Washington

    May 15, 2022

    BHO Network announces its partnership with ConsenSys

    May 15, 2022

    Twitter’s Parag Agrawal after firing top execs: ‘Expect more change for the better’

    May 14, 2022

    The TRON Grand Hackathon 2022 returns for season 2

    May 13, 2022
  • Security

    Food Truck Festival Giveaway Rules

    May 16, 2022

    Tricity grapples with a new epidemic: Cyber crime

    May 15, 2022

    The foreign diplomatic contingent – Kaieteur News

    May 15, 2022

    What happened when I tried virtual coworking.

    May 14, 2022

    Contest Rules for Dine with Crusher, Wild Florida’s largest gator!

    May 13, 2022
  • Hosting
    1. Sunset Host Co
    2. Radio Host Co
    Featured

    Announcing Reliable Dedicated Server Hosting Provider with USA, US, New York, California, Texas based IP – TheServerHost – IT Industry Today

    By Sunset Host CoMay 16, 20220
    Recent

    Announcing Reliable Dedicated Server Hosting Provider with USA, US, New York, California, Texas based IP – TheServerHost – IT Industry Today

    May 16, 2022

    Elon Musk Takes a Stand in Controversial Disney Copyright Case

    May 15, 2022

    Announcing Reliable Dedicated Server Hosting Provider with Dubai based IP – TheServerHost – IT Industry Today

    May 14, 2022
  • Media
    1. WSCA News
    2. Sunset Crypto
    3. Sustainable Action Now
    4. Life.Style Magazine
    5. Sunset Daily
    6. Sunset Music News
    7. Pro Merch Sports News
    8. Explore New Jersey
    9. Explore NJ News
    10. The Zine Weekly
    Featured
    Recent

    Apex Legends Mobile Review: The Resemblance Is Uncanny

    May 16, 2022

    Eurovision 2022: Russian hackers targeted contest, say Italian police

    May 16, 2022

    How to download YouTube videos

    May 16, 2022
The Zine Weekly
You are at:Home » API Security 101 – 6 Things You Need to Know
Security

API Security 101 – 6 Things You Need to Know

Sunset Host CoBy Sunset Host CoJanuary 16, 2022No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

How do you secure your organization’s APIs? This is a hot topic and will become even more important as the number of APIs and API traffic continues to grow. Noname Security recently hosted a webinar on API Security. Click here for an on-demand replay. 

Here are 6 key takeaways on API security.

  • APIs are an essential part of the modern IT world. You are well aware that APIs are a powerful and widely adopted technology integration tool. You know that APIs enable different programs to talk to each other in an efficient, developer-friendly way, even if they weren’t written in the same programming language. In most modern applications, APIs communicate using REST, webhooks, gRPC, or GraphQL. 

Historically, organizations had to decide whether to build or buy new technologies. APIs offer a third option: integrating with a partner’s technology applications. As a result, APIs are everywhere in the modern IT world. They are used in cloud migrations, micro services, partner integrations, Kubernetes, DevSecOps, DevOps, and automation. 

The volume of API traffic today is already large and will continue to grow. Akamai estimates that in 2019, APIs initiated 83% of global web traffic. Meanwhile, Google Apigee’s data shows that in 2020, API volume increased 49% compared to 2019. 

APIs have become the core for modern business.

  • To deliver APIs, API management and API gateways are needed. Two critical elements needed to deliver APIs are:
  • API management. This includes versioning, publishing, and sharing a schema that describes the methods and data available from an API. 
  • API gateways. Most deployments have an API gateway that offers a single security control point to handle authentication, authorization, and traffic management.

API management and gateways

 

  • APIs present several (often unique) security challenges. Some security issues related to APIs are similar to those associated with traditional application security, while others are completely different. 

 

Challenges

Solutions

Few businesses have a good handle on their API or application inventory.   

Create an API or application inventory 

This inventory helps teams identify high-priority security risks. 

Security suffers when each app sec team member is responsible for lots of APIs or applications. API sprawl exacerbates this—a single product may be composed of hundreds or thousands of APIs. 

Identify the ratio of staff to APIs or applications

Measuring this ratio helps an organization determine if more resources are needed.
Alternatively, utilize automation to help your staff go faster.

App security teams lack good preventive controls to identify problems.  

Deploy the right tools to evaluate security across applications

A proactive approach using good tools is far preferable to being reactive.

Many API communication patterns exist. An API may be called by a web app, a command line client, cURL, a continuous integration and continuous development (CI/CD) system, or another API. 

Be prepared to handle diverse API communication patterns

Understand all of the various communication patterns that are relevant to your APIs and how to protect them.

Test tooling is only starting to mature. Although the Swagger and OpenAPI specifications have made tooling better, it’s still quite weak. 

Deploying robust tooling 

While it is early days, particularly for dynamic tooling for API testing, tooling is maturing.

 

  • Traditional application security controls offer only partial protection for APIs. API gateways provide some visibility into security issues, since they serve as a central choke point for protection and policy enforcement. But, not all API calls go through the gateway, making organizations blind to API-to-API calls, as well as to microservice calls that don’t pass through the gateway. 

Logging and monitoring usually aren’t very effective. Organizations typically discover authentication threats in APIs only after a breach. In addition, API testing is different from application testing. 

  • API security requires common controls, in conjunction with dynamic and static testing. To protect APIs, teams must implement several common controls. These include:
  • Encryption of network traffic
  • Authentication to identify who is calling the API
  • Authorization to determine if the caller’s request should be permitted
  • Rate limiting as a blunt filter for abuse
  • Audit logging to capture a picture of normal operations 

Dynamic and static testing are also essential, since the earlier that security vulnerabilities and misconfigurations are caught in the development cycle, the less expensive they are to fix. 

  • Organizations must address security across the API ecosystem, from code to production. Three recommended strategies for API security are: 
  • API security posture. Assess every API, including legacy and shadow APIs, with data classification. Determine which ones are critical to the business. Based on that inventory, identify misconfigurations and vulnerabilities in the source code, network configuration, and policy. Focus security interventions on the highest-risk areas. 
  • Detection and response. Deploy behavioral-based models for runtime API threat detection. Implement automated and semi-automated blocking and remediation of threats. 
  • Continuous testing. Continuously test API endpoints to identify API risks before they emerge. Use automated and dynamic test development and incorporate that into CI/CD pipelines. 

Understanding the unique challenges associated with API security and having strategies and tools for addressing API security, including automation and continuous testing, can go a long way toward securing APIs.

*** This is a Security Bloggers Network syndicated blog from Noname API Security Blog authored by Matt Tesauro. Read the original post at: https://nonamesecurity.com/blog/api-security-101-6-things-you-need-to-know

Share this:

  • Twitter
  • Facebook

Related

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWeb 3.0 Meets Venture Capital
Next Article Apple allegedly working on an iPad Pro prototype with MagSafe charging glass logo
Sunset Host Co
  • Website
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • Tumblr
  • LinkedIn

Related Posts

Food Truck Festival Giveaway Rules

May 16, 2022

Tricity grapples with a new epidemic: Cyber crime

May 15, 2022

The foreign diplomatic contingent – Kaieteur News

May 15, 2022

Leave A Reply Cancel Reply

Categories
  • Anonymous (96)
  • Cloud (151)
  • Data Center (134)
  • Gadgets (174)
  • Green Tech (39)
  • Hosting solutions (96)
  • IT News (97)
  • Network (142)
  • Security (135)
  • Tech (96)
  • Web hosting (58)
  • Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly

Subscribe to Updates

Get the latest tech news from the Zine at the Sunset Host Co. and the Radio Host Co.

Apex Legends Mobile Review: The Resemblance Is Uncanny

May 16, 2022

Eurovision 2022: Russian hackers targeted contest, say Italian police

May 16, 2022

How to download YouTube videos

May 16, 2022

Food Truck Festival Giveaway Rules

May 16, 2022

Why Build in Web3

May 16, 2022

To Drive Technological Progress, We Need Worker Power

May 16, 2022

Real-time Analytics News for Week Ending May 14

May 16, 2022

Announcing Reliable Dedicated Server Hosting Provider with USA, US, New York, California, Texas based IP – TheServerHost – IT Industry Today

May 16, 2022
Copyright © 2022. The Zine Weekly, an SCA Entertainment & Media Company. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.