• Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly
Facebook Twitter Instagram
Wednesday, May 18
Facebook Twitter Instagram
The Zine Weekly
  • Zine

    Cloudways Review 2022: Features, Pricing & More

    May 18, 2022

    Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

    May 18, 2022

    Qualcomm and AMD collaborate to optimize FastConnect platform

    May 18, 2022

    Aqua Security creates first unified scanner for cloud native security

    May 18, 2022

    Elon University / Today at Elon / #ElonGrad 2022 spotlight: Grace Holmes, exercise science

    May 18, 2022
  • Anonymous

    Buffalo shooting suspect kept plans from family, he wrote

    May 18, 2022

    Femcels: The ‘involuntarily celibate’ women who say they are barred from sex and romance | Society

    May 17, 2022

    Eurovision 2022: Russian hackers targeted contest, say Italian police

    May 16, 2022

    How Netflix Is a Joke Addresses a Film Distribution Flaw

    May 14, 2022

    How to Fight Foreign Hackers With Civil Litigation

    May 14, 2022
  • Green

    Environmentalists oppose more life for California nuke plant

    May 18, 2022

    Scientists create renewable biocement made entirely from waste materials

    May 16, 2022

    Proposed improvements to SiC MOSFET power converter technology overcome existing challenges

    May 14, 2022

    Emerging hydrogen storage technology could increase energy resilience

    May 11, 2022

    Microgrid demo to lend a helping hand in India’s green energy transition

    May 9, 2022
  • IT

    Cloudways Review 2022: Features, Pricing & More

    May 18, 2022

    Query event logs with PowerShell to find malicious activity

    May 18, 2022

    Indian Tablet Market Grew 68 Percent in Q1 2022 With Lenovo on Top: Cybermedia Research

    May 17, 2022

    How to download YouTube videos

    May 16, 2022

    Roe v. Wade reversal could hinder data privacy rights

    May 16, 2022
  • Gadgets

    Vi Data Delight Offer With Monthly Extra Data Launched for Hero Unlimited Prepaid Plans: Details

    May 18, 2022

    Google is remaking search, maps for the TikTok generation

    May 17, 2022

    Apex Legends Mobile Review: The Resemblance Is Uncanny

    May 16, 2022

    Our study suggests they boost intelligence in children

    May 16, 2022

    Realme TechLife Watch SZ100 India Launch Date Set for May 18, Teased to Offer Up to 12-Day Battery Life

    May 15, 2022
  • Tech

    My Favorite Things on the Internet

    May 17, 2022

    Two Twitter bosses ousted ahead of Elon Musk $44bn takeover

    May 13, 2022

    4D composite printing could improve the wings of drones

    May 11, 2022

    How to delete unused styles using VBA in Word

    May 9, 2022

    Best Gas Credit Cards in May 2022

    May 6, 2022
  • Cloud

    Aqua Security creates first unified scanner for cloud native security

    May 18, 2022

    Innovatrics, Blaize partner on AI ready-to-deploy facial recognition technology

    May 17, 2022

    To Drive Technological Progress, We Need Worker Power

    May 16, 2022

    The age of discontinuity | The Manila Times

    May 15, 2022

    Alibaba Cloud-UCSI to support digital economy

    May 15, 2022
  • Data

    Elon University / Today at Elon / #ElonGrad 2022 spotlight: Grace Holmes, exercise science

    May 18, 2022

    1547 adds capacity to Orangeburg, NY, data center

    May 17, 2022

    Real-time Analytics News for Week Ending May 14

    May 16, 2022

    Greatest REIT Wannabes Of All-Time: Part I

    May 15, 2022

    Metaverse: ‘Train your robots in the virtual world’ (CXOTalk interview)

    May 15, 2022
  • Network

    Qualcomm and AMD collaborate to optimize FastConnect platform

    May 18, 2022

    U.N. and advocates raise concerns of abortion access for Ukrainian refugees in Poland

    May 17, 2022

    Ansible vs Puppet | Compare DevOps Tools

    May 17, 2022

    Why Build in Web3

    May 16, 2022

    Broadband Nutrition Labels and Deployment See Renewed Focus in Washington

    May 15, 2022
  • Security

    Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

    May 18, 2022

    Is a Social Credit System Coming for Us?

    May 18, 2022

    Venezuelan doctor accused of selling computer programs to steal data in the US

    May 17, 2022

    Food Truck Festival Giveaway Rules

    May 16, 2022

    Tricity grapples with a new epidemic: Cyber crime

    May 15, 2022
  • Hosting
    1. Sunset Host Co
    2. Radio Host Co
    Featured

    Announcing Reliable VPS Server Hosting Provider with Thailand Bangkok based IP – TheServerHost – IT Industry Today

    By Sunset Host CoMay 18, 20220
    Recent

    Announcing Reliable VPS Server Hosting Provider with Thailand Bangkok based IP – TheServerHost – IT Industry Today

    May 18, 2022

    Announcing Reliable Dedicated Server Hosting Provider with Australia, Sydney, Melbourne based IP – TheServerHost – IT Industry Today

    May 17, 2022

    Announcing Reliable Dedicated Server Hosting Provider with USA, US, New York, California, Texas based IP – TheServerHost – IT Industry Today

    May 16, 2022
  • Media
    1. WSCA News
    2. Sunset Crypto
    3. Sustainable Action Now
    4. Life.Style Magazine
    5. Sunset Daily
    6. Sunset Music News
    7. Pro Merch Sports News
    8. Explore New Jersey
    9. Explore NJ News
    10. The Zine Weekly
    Featured
    Recent

    Cloudways Review 2022: Features, Pricing & More

    May 18, 2022

    Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

    May 18, 2022

    Qualcomm and AMD collaborate to optimize FastConnect platform

    May 18, 2022
The Zine Weekly
You are at:Home » A Search for API Security in the Operator’s Tool Box
Network

A Search for API Security in the Operator’s Tool Box

Sunset Host CoBy Sunset Host CoMarch 22, 2022No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Much has been written about modern application security tools and solutions from the provider’s perspective about their functionality and security features. When I was asked to write a blog about API Gateways and API Security, I felt it may be more useful to think about the subject from the user’s perspective. Specifically, what problem the app operators are looking to solve and with what tool? Although the topic is security-focused, it can also be helpful to discuss the need of Dev and DevOps as it is an increasing business imperative for any security operations not to slow down the applications and the application development process.

From ADC to API Gateway. From WAF to WAAP.

Operators of web applications have long been familiar with gateways and proxies. A load balancing proxy has been used by app operators to ensure performance and reliability of the application. Over time, more sophisticated proxies are made into Application Delivery Controllers (ADCs). To protect against website attacks (e.g. OWASP Web Security Top 10) against the application, Web Application Firewalls (WAFs) are attached in front of a typical ADC. WAFs are usually managed by security operators while the ADCs are managed by application operators though ADCs, arguably to implement security functions such as authentication and verification of incoming calls. A typical example is AWS’s Application Load Balancer (ALB) and WAF architecture.

As conventional web applications are being replaced by API-driven applications, organizations are either converting their applications to leverage the flexible cloud native-architecture or front-ending their legacy applications with API gateways. API gateways, often deployed as part of an API Management solution, are replacing the role of ADC as the prime application-aware access gateway to an API enabled application. In the AWS example, AWS offers API Management Gateway service, front-ended by an Elastic Load Balancer (ELB) which in turn is protected by a WAF.

Unlike the relatively simplistic HTTP protocol, APIs are highly customizable. App developers can pretty much define their own APIs and change them in any way they want. API gateways are therefore designed to be a flexible and extensible platform, one that typically includes an extensive list of API management functions, such as data transformation, call routing and queuing, and custom message handling etc. Among these, security related features are typically limited to access management. Here are some specifics:

  • Verifying the identity associated with API requests through credential and token validation. This is not unlike an ADC that can authenticate web requests.
  • Determining which traffic is authorized to pass through the API to backend service endpoints. This feature is also very similar to an ADC managing access to web hosts/URLs.
  • Metering the traffic flowing through the APIs using rate limiting and throttling.

As a platform, extensions can be added to most API Management gateways to implement other security features but they shouldn’t be treated as security offered by an API Gateway. As an ADC, most API Gateways in use are being managed by Dev/DevOps.

As organizations are rapidly adopting APIs, web transactions that go through a Web Application Firewall (WAF) have also increasingly become APIs (according to some estimates, more than 70% of web traffic in a WAF process are APIs). It is worth pointing out that the vast majority of APIs are web APIs. Therefore, they can be affected by many of the same attacks against a web app. For example, injection attacks are common among the OWASP Web Top 10 and OWASP API Top 10. Log4j injection attempts have been observed as often in web form input as in API inputs. In addition, bad bots have found APIs an attractive target as APIs are designed to enable automation without human intervention and therefore lacking some of the common anti-bot measures such as CAPTCHA challenges. A WAF with advanced bot protections against API abuses is therefore an important part of API Security.

In recognition of the important role WAF plays in protecting APIs, WAF is changing its name to Web Application and API Protection (WAAP). Besides the WAF features such as Bot Protection, DDoS prevention, an API-specific feature implemented in today’s WAAP is API Schema Validation. For a security operator who can obtain up-to-date API specifications, the operator can upload the specifications to a WAAP to validate API requests. The problem is that not many operators can find accurate API specifications, let alone having them updated by developers as they are changing their API implementations at an increasingly rapid pace. Consequently, in practice most operators today are implementing a WAF+API Gateway combination, not a true WAAP.

More is Needed for Complete API Security

It is increasingly clear that the WAF+API Gateway is, at best, incomplete. Many API-related data breach incidents are proofs demonstrating the potential risks posed by application specific, business logic or data level vulnerabilities. Take Broken Object Level Authorization, number 1 category of OWASP API Security Top 10, for example: an typical attack against a vulnerable application uses a series of API calls within an authenticated session, switching input request fields meant for user A to user B in an attempt to leverage user A’s session to get to user B’s data. All the calls in question would pass API Gateway authentication. The same calls are also in perfect compliance with the API schema.

In order to protect API-driven applications from these application specific attacks, a new approach is needed to complement an operator’s WAF+API Gateway. Specifically, this new tool needs to automatically adapt to the APIs it is protecting, not only the schema/structure, but also, more importantly, the behavior of the applications especially that manifest itself as data flows in APIs.

New Full Lifecycle API Security Tool for a Complete WAAP

In order for the API security tool to learn the application behavior, the tool must first gain visibility into the APIs. As mentioned previously, most security operators do not even have an inventory of APIs and their specifications. Naturally, the first tool in a security operator’s tool box for API security is an automatic API inventory builder to discover all API endpoints, their schema, and data input/output of these APIs. It is critical for such a tool to be completely automatic as APIs change at a rapid pace. In addition, it is also critical for the inventory to include not just endpoints and schema, but also data which are the key assets that need protection. It is also critical for the inventory tool to function without dependency on developer input. Any dependency on developer input, such as an API specification, would significantly slow down the application development process.

One easily overlooked factor in the implementation of API discovery is the deployment of the API inspection. For APIs already going through a WAAP, the operator can use it for API discovery if the WAAP in question has implemented advanced API discovery. For all the other APIs, operators must find tools that can be easily deployed to extract API calls for inspection. For example, Imperva’s API Security solution supports a wide variety of API sensors that can be easily deployed without change to codes, platforms, or the application packaging.

With an extensive network of API sensors enabling always up-to-date API inventories, automatic anomaly detection and remediation actions can be implemented to protect APIs from sophisticated business logic and data level attacks.

In summary, modern API-driven applications make it necessary to introduce a new API security solution to complement existing WAF+API Gateway in order to implement a complete WAAP.

Imperva API Security provides continuous protection of all APIs using deep discovery and classification of sensitive data to detect all public, private and shadow APIs to empower security teams to implement a positive security model. Learn more.

The post A Search for API Security in the Operator’s Tool Box appeared first on Blog.

*** This is a Security Bloggers Network syndicated blog from Blog authored by Lebin Cheng. Read the original post at: https://www.imperva.com/blog/a-search-for-api-security-in-the-operators-tool-box/

Share this:

  • Twitter
  • Facebook

Related

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAWS: Digital skills in the workforce are now needed to cope with pandemic changes
Next Article CPP cybersecurity team hacks their way to 1st place in international cybersecurity competition
Sunset Host Co
  • Website
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • Tumblr
  • LinkedIn

Related Posts

Qualcomm and AMD collaborate to optimize FastConnect platform

May 18, 2022

U.N. and advocates raise concerns of abortion access for Ukrainian refugees in Poland

May 17, 2022

Ansible vs Puppet | Compare DevOps Tools

May 17, 2022

Leave A Reply Cancel Reply

Categories
  • Anonymous (98)
  • Cloud (153)
  • Data Center (136)
  • Gadgets (176)
  • Green Tech (40)
  • Hosting solutions (98)
  • IT News (100)
  • Network (145)
  • Security (138)
  • Tech (97)
  • Web hosting (58)
  • Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly

Subscribe to Updates

Get the latest tech news from the Zine at the Sunset Host Co. and the Radio Host Co.

Cloudways Review 2022: Features, Pricing & More

May 18, 2022

Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

May 18, 2022

Qualcomm and AMD collaborate to optimize FastConnect platform

May 18, 2022

Aqua Security creates first unified scanner for cloud native security

May 18, 2022

Elon University / Today at Elon / #ElonGrad 2022 spotlight: Grace Holmes, exercise science

May 18, 2022

Announcing Reliable VPS Server Hosting Provider with Thailand Bangkok based IP – TheServerHost – IT Industry Today

May 18, 2022

Vi Data Delight Offer With Monthly Extra Data Launched for Hero Unlimited Prepaid Plans: Details

May 18, 2022

Environmentalists oppose more life for California nuke plant

May 18, 2022
Copyright © 2022. The Zine Weekly, an SCA Entertainment & Media Company. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.