New research reveals API security issues are widespread

0 22
API security covers all the practices and measures taken to identify vulnerabili...

API security covers all the practices and measures taken to identify vulnerabilities in Application Programming Interfaces (APIs) and protect them from malicious attacks. API’s are critical to enable software applications to share data – so they’re widespread. And that makes them an appealing target for threat actors.  

New research by Salt Labs found that 95% of the organisations surveyed have experienced security problems in production APIs, and 23% have experienced a breach. Two thirds of organisations are managing more than 100 APIs across their networks, and API threats are on the rise – but only 7.5% of organisations describe their API security programs as ‘advanced’.

What are the key components of API security?

New research reveals API security issues are widespread

API security isn’t just one thing – it’s every aspect that contributes to the overall security posture of Application Programming Interfaces (and by extension, everything else that those interfaces interact with). 

This includes:

  • Authentication and authorisation to ensure that API requests are legitimate.
  • Data encryption (including data in transit, and data at rest) to protect data from access by unauthorised parties.
  • Rate limited and throttling to control the number of API requests a client can make in a certain timeframe.
  • Input validation to ensure that data is legitimate and sanitised.
  • API gateways to restrict different entry point vulnerabilities.
  • Monitoring and logging of API activity in order to detect and respond to suspicious behaviour.

APIs are inextricable from the functionality of most digital services today – and they facilitate the transfer of sensitive data from one place to another, as well as enabling different pieces of software to interact with one another. So when an API is exposed, it can allow significant data breaches to occur; with the potential to expose information that could cause severe damage to the data provider. 

Threat actors leverage diverse tactics to breach APIs

The Salt Labs report found that API security incidents more than doubled year on year. And attackers are leveraging a diverse range of tactics – with many bypassing authentication protocols completely (61%, in fact). 

So authentication protocols are not enough to protect against API attacks. Threat actors bypass them by exploiting vulnerabilities (including Broken Object Level Authorisation, OAuth, and insecure API endpoints) to gain unauthorised access. 

Surprisingly, 13% of attack attempts explicitly target internal APIs; so security has to be comprehensive, and not limited to public-facing APIs. 

It’s also worth noting that 80% of API attack attempts leverage one or more of the OWASP API Top 10 methods. But in spite of this, only 58% of Salt Labs’ survey respondents focus on this list in order to strengthen API security. It’s a valuable resource for security professionals, detailing the most vulnerabilities that attackers are most likely to exploit. It’s clear that criminals are using this list to identify vulnerabilities they can exploit – so security teams have to match that awareness, and protect against those vulnerabilities. 

Organisations must invest in API security 

The API threat landscape will continue to grow, and organisations that don’t step up and invest in robust protection are putting their networks at risk. Now is the time to put API security measures at the top of your priority list – to protect sensitive data (and the future of your business) in today’s fast-paced digital ecosystem. 

Join us at MEA 2024 and discover how to improve your organisation’s cyber resilience.

REGISTER NOW
你可能想看:

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Enterprises have insufficient response capabilities, and the cybersecurity of the manufacturing industry faces severe challenges

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

Different SRC vulnerability discovery approach: Practical case of HTTP request splitting vulnerability

最后修改时间:
admin
上一篇 2025年03月22日 20:12
下一篇 2025年03月22日 20:35

评论已关闭