The API Security Ebook - 2022 - Ebook
The API Security Ebook - 2022 - Ebook
The API
Security eBook
Introduction
Introduction
The Numbers Behind
Automated Threats to APIs APIs are the quintessential double-edged sword. They are the API Security
cement that interconnects systems and applications, but they add À “By 2023, API abuses will move
Four Assumptions that Prevent security vulnerabilities and complicate protection strategies and from infrequent to the most
Effective API Protection application development. frequent attack vector, resulting
in data breaches for enterprise
API development and usage has increased astronomically in recent web applications.”
Key Capabilities for Comprehensive
Application and API Security years, fueled by digital transformation and the central role APIs play in À Unmanaged and unsecure APIs
create vulnerabilities that can
both mobile apps and IoT. According to recent market research, API accelerate multimillion-dollar
API Security Checklist attack traffic has tripled in growth compared to overall API traffic. security incidents.
As a result, securing APIs and safeguarding them from data theft, manipulation, À By 2025, more than 50% of
About Radware DDoS attacks and more has never been more critical. This requires data theft will be due to
ensuring APIs are protected against all threat vectors, but more importantly, unsecure APIs.
understanding the role that various security solutions play in securing APIs and
why API protection must now be part of a holistic application security strategy. Source: “Predicts 2022: APIs Demand Improved
Security and Management,” Gartner Research,
No matter how many APIs your organization chooses to share publicly, your December 6, 2021.
ultimate goal should be to establish a comprehensive API and application
security strategy that proactively manages API security over time.
Account Takeover
Account takeover (ATO) is a form of identity theft where a fraudster illegally uses bots to get access to a victim’s
bank, e-commerce site or other types of accounts. A successful ATO attack leads to fraudulent transactions and
unauthorized shopping from the victim’s compromised account. Fraudsters use two primary methods to hijack
accounts: credential stuffing and credential cracking.
Additionally, most WAF solutions only leverage negative security models, thereby limiting their protection
API Security Checklist
against zero-day attacks. The OWASP API Security – Top 10 includes numerous attack vectors that negative
security models do not mitigate. Rather, these attack vectors must be stopped using a positive security model
and behavioral analysis that identifies whether an API call is malicious or not.
About Radware
Finally, malicious bots and other automated threats present one of the gravest threats to APIs. It’s critical to
have advanced bot management capabilities to distinguish between legitimate and malicious bots to stop
account take over attacks, data scraping and application DoS attacks. WAFs do not provide these sorts of
advanced capabilities.
They also provide important security functionality, such as application and user authentication, access
control (ACL or JWT), encryption tunnels, rate limiting and others. Some API gateways incorporate a basic
signature protection engine as well.
Four Assumptions that Prevent Read Why API Gateways Are Not Enough to
Secure APIs to Learn More
Effective API Protection
Additionally, while API calls are centralized to pass through API gateways, this only applies to documented APIs.
API Security Checklist
API gateways don’t provide auto discovery capabilities, thereby leaving undocumented APIs unprotected.
However, in most cases, not all APIs are documented. And even if they are, APIs change more frequently than
applications. As a result, API documentation and security policies must be updated regularly, which can be a
resource intensive, time-consuming task when performed manually.
Effective API protection must include auto discovery of APIs. This includes discovering their existence,
structure (that is, schema), possible parameters, type of parameters and their value ranges. A good discovery
engine can also automatically generate and apply a tailored security policy to match the discovered APIs. This
is the best way to effectively protect an API throughout its lifecycle.
If you can manage these solutions from a single pane of glass and synchronize
About Radware them, you’ll ensure comprehensive application and API protection.
About Radware
Frictionless API Auto Discovery
In many organizations, not all API documentations are properly detailed, updated or actually created. To tailor a
dedicated security policy for these types of APIs, automated API discovery algorithms should be leveraged to
continuously discover APIs, their endpoints and undocumented changes. Based on the discovered API catalogs,
a tailored security policy is generated to protect these APIs. The result is frictionless, optimized protection for
documented and undocumented APIs.
About Radware
Monitor and manage API calls coming from automated scripts (bots) Bot Management Solution
Key Capabilities for Comprehensive Implement measures to prevent API access by sophisticated human-like bots Bot Management Solution
Application and API Security
Ensure each API call is authenticated and authorized API Gateway
Enable robust encryption Application Delivery Controller
API Security Checklist
Deploy token-based rate limiting equipped with features to limit API access API Gateway/API Protection Solution
based on the number of IPs, sessions and tokens
About Radware Enable comprehensive logging of requests and responses API Gateway/API Protection Solution
Scan incoming requests for malicious intent API Protection Solution/Bot Management
Scan all parts of the API (header, body and parameters) API Protection Solution
Support clustered API implementation to handle fault tolerance and scalability Application Delivery Controller
Use positive and negative security models to protect against zero-day attacks WAF/API Protection Solution
Track usage and journey of API calls to find anomalies Bot Management/API Protection Solution
Ensure API infrastructure security and management is scalable Application Delivery Controller
Follow a methodology to eliminate false positives using automated tools (preferred) API Protection Solution/WAF
Enable API endpoints quota management API Gateway/API Protection
About Radware
About Radware
© 2022 Radware Ltd. All rights reserved. The Radware products and solutions mentioned in this document are protected by trademarks, patents and pending patent applications
of Radware in the U.S. and other countries. For more details, please see: https://www.radware.com/LegalNotice/. All other trademarks and names are property of their respective owners.
Prev