Api Security 1689641969
Api Security 1689641969
4 Five challenges CISOs often face with API security and management
58
deliver products faster and improve customer
experience. Now, security leaders have to balance %1
securing their APIs, on top of their web apps, without
slowing down innovation. of dynamic HTTP traffic is through APIs
Start by identifying all APIs in use Can your tools meet the visibility Check out Web Application and
within your organization. and compliance needs of your API Protection (WAAP) if you
leadership and the usage needs are looking for easy to deploy,
Many ways to discover APIs: of security teams? runtime-focused and cost-
use API discovery tools, review effective solutions for security
technical documentation and Integrate tools better to reduce teams.
agreements, speak to your data breach, data leakage,
developers and monitor your shadow API, and availability
web traffic. and resilience risks.
Challenge Shadow APIs: Modern CISOs need visibility around all the APIs in production - be
#1 it APIs developed outside of IT or legacy APIs that are still in use. The pace of API
development is only increasing in every organization.
Challenge Security breaches: Modern CISOs need to ensure their organization’s APIs ask for
#2 appropriate authentication and authorisation. Many API access control measures have
been easily exploited by attackers till date.
Challenge Data leakage: Modern CISOs need security visibility and controls over the sensitive
#3 data exchanged through APIs - be it PII/PCI/PHI data or credential or tokens.
Challenge API abuse: Modern CISOs recognise that APIs being overwhelmed with abusive traffic
#4 can be just as harmful to your organization as a threat actor exploiting a security
vulnerability.
Challenge Compliance: Modern CISOs must ensure their customer facing APIs meet industry and
#5 organization standards - be it PCI, HIPAA, GDPR, FFIEC and FCA.
• APIs exchange data between systems. Web applications are accessed by end users
through a web browser
• APIs use a different format (usually JSON) to transport data. Web apps accept user input
and visualise data from the backend (using HTML, CSS and JavaScript)
• APIs access backend systems directly, often serving as the intermediary between modern
web apps and their backend databases and servers
• Successful API transactions assume legitimate access
• APIs are easily overlooked as they are not visible to end users
Compared to web application security, API security requires significant business context,
different discovery methods, deeper access verification controls, and intelligent
abuse protection.
The detection methodology for API security differs from web app security even in overlapping
vulnerability categories such as injection attacks and access risks. For example, every API
operation must verify the caller’s identity and permissions before performing any work on the
caller’s behalf.
Cloudflare | The CISO’s Guide to API Security 5
Shadow APIs are a growing concern in modern Security teams are more pressure than ever to
organizations. Most IT and security can’t find and prevent their organizations from becoming news
manage APIs as fast as developers build the APIs. headlines with security breaches. Attackers
have started to exploit weak authentication and
Many current processes for tracking APIs are broken, authorization measures in many APIs.
consisting of manual approaches with security teams
pestering development teams for updates. Some questions to ask your teams:
Some questions to ask your teams: • How are you validating authentication and
authorization in your APIs?
• How do you discover and manage public APIs
• Do your APIs follow consistent specifications and
today?
formats?
Security considerations for teams
Security considerations for teams
Conduct regular API discovery on your environments,
Ensure your APIs are validating authentication and
just as you would for IT devices and apps.
authorization tokens on every API operation
Useful metrics to report on to leadership:
Useful metrics to report on to leadership:
• Identify the groups with the most shadow APIs,
• API asset inventory - highlight those carrying
thus posing greater risks to prioritize process
sensitive data, are out of compliance or use weak
improvements.
authentication or authorization methods
“We were facing DDoS attacks, data scrapers, and cumbersome certificate
management across all our web properties as they grew in number.
We wanted a security layer that could protect our web properties and
APIs without adding significant overhead.”
Marut Singh
CTO, CARS24
Cloudflare | The CISO’s Guide to API Security 6
APIs will often carry sensitive data by their nature. Quite often, APIs do not impose any restrictions
As a CISO, you want to ensure that your APIs are on the size or number of resources that can be
not exposing the wrong sensitive data and APIs are requested by the client/user.
transmitting the data under strong encryption.
Not only can this impact the API server’s
Some questions to ask your teams: performance, leading to Denial of Service (DoS), but
it also leaves the door open to authentication flaws
• Does your data loss prevention (DLP) program such as brute force.
include data loss through APIs?
Just like with web applications, monitoring your API
• Are you up to date on the legal and industry-
traffic is critical to ensure the availability of your
specific data security mandates?
business products and services to your customers.
• Is your data at rest and in transit secure? Do you
use the appropriate encryption standards for your Some questions to ask your teams:
industry and jurisdictions?
• Can your tools throttle abusive API traffic?
Security considerations for teams • How do you know what are the appropriate traffic
limits for each API and the number of resources in
• Check for exposed/leaked credentials used in API
any response?
requests
• Scan for personally identifiable information Security considerations for teams
(PII), credit card data and personal health care
Deploy intelligent rate limits on your APIs based on
information in API requests and responses
observed traffic patterns for each endpoint.
Article: LinkedIn - 700 million users’ data scraped Article: T-Mobile API vulnerabilities exploited
over the years
Cloudflare | The CISO’s Guide to API Security 7
For holistic security and performance around your public facing APIs without inhibiting
innovation, check out the approach taken by Web Application and API Protection solutions
such as Cloudflare API Gateway.
Use case: APIs in Use cases: APIs in produc- Use case: APIs in highly reg-
pre-production tion, real-time monitoring, and ulated industries, legacy API
protection against abuse, zero standards
• Will require another tool to days and attackers
generate API traffic • These tools often focus
• Provide real-time API on API management
• Cannot protect APIs from protection compared to API while lacking in security
abuse/attacks; need to security point solutions sophistication
hook into a WAF to block
• Easier to deploy and • These tools can be more
manage than full lifecycle cumbersome to integrate
management solutions for developers
• Integrate with your APIs,
irrespective of cloud
provider, API structure and
development language
• Shadow API discovery • Positive security model for real-time blocking and
traffic acceptance
• Centrally manage APIs and monitor use
• Threat intelligence from real-time traffic analysis
• Authentication validation (mTLS and JSON Web
Tokens) • Machine learning driven abuse and vulnerability
exploit protection
• Sensitive data detection for popular industry and
legal requirements • Optimised edge network to serve API traffic
without disruptions
• Data encryption in transit
Cloudflare | The CISO’s Guide to API Security 9
Integrated Management
& Analytics
Application DDoS
Block L7 DDoS attacks
Bot Management
Stop bot traffic
API Gateway
API security and management
Page Shield
Stop client-side attacks
TLS/SSL
Data security
REV:BDES-4431.2023APR05