13 API Security Questions 1733501165
13 API Security Questions 1733501165
13 Questions to Ask
Your API Security Vendor
Introduction
But while APIs unlock many new opportunities for innovation and growth, they also
introduce a new set of security challenges, including:
• Remote code execution, injection, local file inclusion, and other attack techniques
• API scraping
Security vendors offer many options for detecting and mitigating these and other API
threats, but those options are not all equally effective or easy to use.
The following 13 questions will help you frame your discussions with API security
vendors and assess how effectively their products will address your organization’s API
security needs.
akamai.com | 2
Does your product discover APIs continuously and, if so,
2
how manual is this process?
APIs appear and disappear regularly because of fast-moving DevOps processes.
Therefore, point-in-time inventories of APIs are insufficient. Your API security product
must perform continuous discovery, which ensures that new documented APIs are
inventoried, analyzed, and protected. It should also detect any future instances of shadow
or zombie APIs. Additionally, products that place an ongoing burden on your team to
interpret and act on findings will not be sustainable over the long term. In contrast,
products that apply automation and machine learning to both discovery and assessment
of APIs will keep your business running smoothly, instead of adding more manual tasks
to your team’s daily to-do list.
akamai.com | 3
How much time and effort will it take to deploy your product
4
in my environment?
The fastest and most effective way to get started is by using a security as a service
(SaaS)–based API security product that can nonintrusively ingest and analyze API activity
data from your existing systems. A well-designed SaaS architecture for API security can
be integrated into your environment in minutes, which can accelerate your time to value
by orders of magnitude and eliminate the ongoing costs and risks associated with
system updates. To be even more agile, find a vendor that offers both web application
and API protection (WAAP) and API detection and response so that API traffic data flows
seamlessly between the solution that is protecting your incoming traffic and the solution
that is protecting all API traffic within your organization.
Your API security platform should also allow you to create custom labeling categories
so your API and security teams are speaking a common language that aligns with your
business objectives and security concerns.
akamai.com | 4
Can you capture and analyze datasets that are meaningful
7
enough to effectively determine a baseline of normal behavior
and detect anomalies?
Many API security products focus on monitoring individual API calls or, at best, short-
term session activity. This is insufficient since many legitimate business processes —
and many attacks — occur over a much longer period. API usage must be analyzed over
a sliding time window (30 days at a minimum). This provides a more complete and
accurate baseline of expected behavior, including any business processes that only
occur once per month (e.g., invoicing). It also makes it possible to detect attacks that
are executed slowly, across multiple days or weeks and numerous API sessions.
Granular analysis at this level is the only way to turn the vast amount of data generated
by APIs into a meaningful and understandable baseline of expected behavior.
akamai.com | 5
Can your product plot every activity by every entity in your
9 APIs on a timeline to show behavior changes over time?
While understanding and monitoring API activity and threats at a macro level is critical,
the ability to narrow the focus of your analysis to specific entities is equally important.
For example, if anomalistic behavior is identified for a specific business partner, the
ability to view all the activity for that entity on a timeline is invaluable. The same is true
for business process entities. Seeing the full story of what happened, and when, on a
timeline for every entity within your APIs is a powerful visualization that makes the story
of normal use and business abuse obvious. The ability to rewind the activity to see what
happened before and after an alert is a powerful tool to help you understand business
logic abuse.
Can I query your product’s API and activity data for proactive
11
threat hunting and risk mitigation?
Security and development tool integrations can’t just be black boxes that send one-way
alerts to your tools. Your security and API teams need the ability to tap into the source
data behind an alert or issue. Look for API security platforms that allow users to query
API details directly through a built-in web interface or via APIs that enable integration of
the API security platform with other preferred tools and interfaces. This will empower
your security team to conduct proactive threat hunting efficiently and effectively. It will
also help your developers and other nonsecurity stakeholders understand how APIs are
targeted by attackers while being used legitimately.
akamai.com | 6
What steps do you take to ensure that the sensitive data you
12
collect about my business is protected?
The advanced behavioral analytics required to secure APIs against today’s threat
landscape are only possible with the scale of the cloud. Given the size and sensitivity
of your API dataset, it’s important to challenge your security vendor to ensure that your
data will be protected. Verifying the practices that your vendor uses to secure its cloud
infrastructure is important, but it’s only the starting point. Require your API security
vendor to use techniques such as tokenization; that is, replace sensitive data with
anonymized tokens before it’s transmitted to the cloud. This ensures data privacy
even if the vendor — or their upstream cloud provider — experiences a security incident.
akamai.com | 7
13 questions to ask your API security vendor
1. Is your API security product capable of performing enterprise-wide API discovery?
2. Does your product discover APIs continuously and, if so, how manual is this process?
3. How does your product help my API documentation tools and processes?
4. How much time and effort will it take to deploy your product in my environment?
5. How will your product help identify and prioritize the discovered APIs that are risky?
6. Does your product use behavioral analytics to determine a baseline of expected
behavior and find anomalies?
7. Can you capture and analyze datasets that are meaningful enough to effectively
determine a baseline of normal behavior and detect anomalies?
8. Can your product identify every entity, relationship, and activity within raw API data
to provide business context?
9. Can your product plot every activity by every entity in your APIs on a timeline to show
behavior changes over time?
10. How can I integrate your product with existing tools, processes, and workflows?
11. Can I query your product’s API and activity data for proactive threat hunting and
risk mitigation?
12. What steps do you take to ensure that the sensitive data you collect about my
business is protected?
13. Does the solution provide granular access to API activity data?
As you may have already guessed, Akamai API Security can effectively offer
the protections recommended by this list. Explore our solution.
Akamai protects your customer experience, workforce, systems, and data by helping to embed security into everything you create —
anywhere you build it and everywhere you deliver it. Our platform’s visibility into global threats helps us adapt and evolve your security
posture — to enable Zero Trust, stop ransomware, secure apps and APIs, or fight off DDoS attacks — giving you the confidence to continually
innovate, expand, and transform what’s possible. Learn more about Akamai’s security, compute, and delivery solutions at akamai.com and
akamai.com/blog, or follow Akamai Technologies on X, formerly known as Twitter, and LinkedIn. Published 11/23.
akamai.com | 8