0% found this document useful (0 votes)
9 views

SaltSecurity-Report-State_of_API_Security

The State of API Security Q3 2022 report reveals a significant rise in API attack traffic, with 94% of respondents experiencing security issues in production APIs. Despite the increasing reliance on APIs for business efficiency, many organizations lack effective security strategies, leading to deployment delays and breaches. The report emphasizes the need for improved API security measures, particularly in runtime protection and addressing outdated APIs.

Uploaded by

monicazhumt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

SaltSecurity-Report-State_of_API_Security

The State of API Security Q3 2022 report reveals a significant rise in API attack traffic, with 94% of respondents experiencing security issues in production APIs. Despite the increasing reliance on APIs for business efficiency, many organizations lack effective security strategies, leading to deployment delays and breaches. The report emphasizes the need for improved API security measures, particularly in runtime protection and addressing outdated APIs.

Uploaded by

monicazhumt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

State of API Security

Q3 2022

Report by
State of API Security
Q3 2022
Executive Summary start building a comprehensive API security program is by initiating controls to address the OWASP API Security Top
The State of API Security Report from Salt Labs is the industry’s only report on API security risks, challenges, and 10 list. Interestingly, 62% of all attacks seen by Salt Labs over the past six months leveraged one or more of these
strategies. The fourth edition of this pioneering research offers security, DevOps, and risk management teams a vulnerabilities. Curiously, 45% of survey respondents admit this guide is not a focus area, which may help explain why
deeper perspective into the dozens of factors that impact API security. It also provides insights on building strategies so many have experienced API security concerns over the past year.
to reduce the growing API attack surface.
Respondents are also clear about the value they place on the various components of the API security landscape. The
As with previous editions, the Q3 2022 report incorporates survey results and empirical data from the Salt SaaS ability to stop attacks was rated the most critical attribute by most respondents (41%), compared to only 22% who
platform hosting our customers' API metadata. The most eye-opening finding from the report comes from our rated shift-left capabilities a top need. Despite the higher value on runtime protection, the industry push towards
customers. Over the past year, Salt customers experienced a 117% increase in API attack traffic while their overall “shift left” security has clearly influenced API security practices, with 53% attempting to identify and remediate API
API traffic grew 168%. security gaps during development and 59% during testing. These steps are important, but with 94% of respondents
citing recent API security incidents, shift-left tactics alone aren’t adequately protecting them. Only 31% of respondents
Unfortunately, attackers have also been busy. A review of our customer data found that malicious traffic now accounts are addressing security gaps during runtime/production, which is troubling as most successful API attacks target gaps
for 2.1% of all API traffic. In fact, 34% of Salt customers have experienced 100+ attempted attacks per month, up from in logic flows that cannot be identified during pre-production testing.
30% a year ago. This attack activity is causing real business concerns, with 94% of survey respondents saying that
they have experienced security problems in production APIs. Most troubling, nearly 20% of respondents say their Survey results also make it evident that traditional application security and API management tools simply aren’t
organizations have experienced a breach resulting from insecure APIs. providing sufficient API protection – only 18% of respondents believe their existing tools are “very effective” in
preventing API attacks. Added to the fact that most rely on manual processes to document APIs and 86% lack
Reliance on APIs is at an all-time high, with 60% of survey respondents managing 100+ APIs. The top drivers of this confidence that this documentation is complete, security professionals are at a crossroads.
heavy API usage include development efficiency, platform/systems integrations, and digital transformation. However,
with key strategic initiatives so closely tied to API usage, there is no room for deployment delays or rollbacks. APIs are at the core of every modern application, and attackers continue their efforts at unprecedented rates. Survey
Unfortunately, over half of survey respondents say they have had to delay rolling out a new application because of responses and Salt customer data overwhelmingly demonstrate that the time is now for organizations to get serious
API security concerns. about securing their APIs.

In addition to growing attack volume, respondents are challenged by the increasing complexity of their own APIs.
The pace of API change has skyrocketed, with 42% updating their APIs at least weekly, and 11% updating them Research Methodology
daily. In addition, 97% of respondents rely on multiple API protocols, which only increases the complexity of their API To understand the state of API security today, Salt Labs – the API threat research arm of Salt Security – initiated and
landscape. compiled this API security industry report. Our in-depth research combines survey responses and empirical data
from Salt Security customers. The findings reflect the input of more than 350 security, DevOps, and app development
Security and development teams are concerned about this convergence of API criticality and attack growth. When professionals across companies big and small, in a variety of industries across the globe (page 17). Salt Labs also
asked about their overall API program concerns, 38% of respondents ranked security as their top consideration. pulls aggregated and anonymized data from the SaaS component of the Salt Security API Protection Platform – this
However, 61% admit to lacking any API security strategy or to having only a basic one. One of the best ways to empirical data gives more context to the survey response findings.
1
Contents

Malicious traffic accounts for 2.1% of overall API traffic 3


API attacks are on the rise and causing significant security concerns 4
The stakes are high, with application rollout delays and sensitive data exposures 5
Security-related concerns top the list of API challenges 6
Stopping attacks is the most highly valued API security attribute; shift left is lowest 7
It’s increasingly difficult to keep up with changing APIs 8
Multiple (solvable) obstacles are preventing strong API security strategies 9
A critical - and obvious - first step in API security knowledge remains overlooked 10
Organizations are continuing to “shift left,” but it’s failing to protect them 11
Traditional tools and processes are falling short in API protection 12
Most continue to rely on manual processes to document APIs 13
API usage grows as companies use them to drive efficiency and innovation 14
API security continues to change the game (for the better) 15
Implications for API security 16
Demographics 17
Resources to help you get started securing your APIs 18
About Salt Security 19
About Salt Labs 19

2
Malicious traffic accounts for 2.1% of overall API traffic
API attack traffic has doubled in the past year
Organizations are embracing APIs to solve critical business
problems and drive innovation at unprecedented levels, and Salt Salt customer data Salt customer data
Security customers are at the forefront of this trend. Salt customer
data shows the average number of APIs per customer grew 82% Growth in average number of APIs per customer Growth in API call volume vs. malicious traffic
over last year, up from 89 in July 2021 to over 162 in July 2022. API call volume, in millions Malicious API call volume, in millions
During the same period, overall API traffic per customer grew 168%, (avg. per customer) (avg. per customer)
indicating that API usage is also exploding. 162 1400 26.46M 28.0
(2.1%)
1300 26.0
Attack activity continues to keep pace with this dramatic API
usage growth and now accounts for 2.1% of overall API traffic for 135 1200 24.0
Salt customers. Malicious API attack traffic surged 117% over the 1.26B 22.0
1100
past year, from an average of 12.22M malicious calls per month to an
average of 26.46M calls. 1000 21.32M 20.0
89 900
)2.6%(
18.0
We take some solace in noting that the rate of malicious traffic is
800 16.0
lower than it has been for the past year, but it's still substantially 820M
higher than the 1.4% of traffic we found 18 months ago. 700 12.22M 14.0
42 600
)2.6%(
12.0

500 10.0
Dec July Dec July 470M
400 8.0
2020 2021 2021 2022
300 6.0
195M
200 4.0

100 2.0
2.73M
(1.4%)
0 0

Dec June Dec June


2020 2021 2021 2022
3
API attacks are on the rise and causing significant security concerns
94% of respondents have experienced security problems in production APIs
Not surprisingly, increased API usage and traffic have
resulted in security concerns. Salt customer data reveals
that 34% of customer accounts have experienced more
than 100 attempted attacks per month. In the past 12 months, what security problems have you found Salt customer data
in production APIs? (Select all that apply)
A resounding 94% of survey respondents reported they Average number of attacks per month per customer
have experienced API security problems in production
APIs. Nearly half (47%) indicate that they have identified Vulnerability 47%
vulnerabilities in production APIs, 38% have experienced 1001+
authentication problems, and 31% have seen sensitive data Authentication problem 38% 1-10
exposure and privacy incidents. Vulnerabilities in production 501-1000 8%
31%
have markedly increased by 8% over the past six months.
And most frightening, nearly 20% of respondents say their
Sensitive data exposure/privacy incident
7% 22%
organizations have experienced a breach resulting from Breach 19%
insecure APIs.
Denial of service 17%
Account misuse/other fraud 15%
101-500 19%
Brute forcing or credential stuffing 15%
Enumeration and scraping 8%
None 6% 44%
11-100

4
The stakes are high, with application rollout delays and sensitive data exposures
More than half of respondents have delayed rolling out a new application due to API security concerns
Companies rely on their APIs to build the applications that drive innovation and produce revenue, so there is leaks, and this quarter’s survey responses showcase this fact. Nearly a third of respondents admit they
no room for deployment delays. Unfortunately, 54% of respondents indicate that they have had to slow the have experienced sensitive data exposure or a privacy incident within their production APIs over the past
rollout of a new application because of an API security concern. year, a sharp increase over last year’s 19%.

Furthermore, the increasing regulatory focus on sensitive data leaks is impacting profitability, and the Within Salt customers, 91% of APIs expose some PII or sensitive data, so it’s imperative to know where and
public is taking notice. Poor API design and security practices are often at the root of sensitive PII data how that sensitive data is transmitted and to protect those APIs with extra diligence.

Have you ever slowed the rollout of a new application Have you found a sensitive data exposure or privacy incident Salt customer data
into production because of API security concerns? in your production APIs?
Percentage of APIs that expose PII or sensitive data
Do not expose PII or sensitive data

10% 9%
I don't
know
31%
Yes

36% 54% 19% 91%


Expose PII or sensitive data
No Yes Yes

Q3 2021 Q3 2022

5
Security-related concerns top the list of API challenges
Out-of-date or "zombie" APIs create the greatest worries
As organizations continue to mature their API programs, it’s no surprise that security-related considerations to maximize the business value associated with APIs. As organizations build new APIs, they often fail to
top their list of concerns. Not investing enough in pre-production security (20%) and not adequately deprecate previous versions, leaving them vulnerable since nobody is patching or documenting these out-
addressing runtime security (18%) were the top API concerns noted by respondents. Also high on the of-date APIs.
list is a lack of focus on requirements and documentation (19%), which is paramount for those tasked with
maintaining secure APIs. Account takeover and accidental exposure of sensitive information tied for the second-highest concern at
15%. Also interesting is an increasing level of concern about “shadow” or unknown APIs, which rose from
When asked about the most concerning API security risks, 42% of respondents said that their biggest 5% rating it a top concern to 11% only six months later. This news is welcome, showing that organizations
worry is outdated or “zombie” APIs. Zombie APIs have been consistently rated the #1 concern for the are becoming more aware of the potential risk associated with these unknown and unsecured APIs.
past four surveys, likely a direct result of the increasingly fast pace of development as companies seek

What is your biggest concern about your company's API program? Please rank the following risks, with 1 being your least concern and 6 your greatest concern, related to API security

It doesn't drive enough Other )4%(


observability and control It's too manual and slows 30% 20% 15% 12% 12% 11%
down delivery
Shadow/unknown APIs
10%
It doesn't include
17% Accidental exposure of
21% 18% 22% 15% 8% 15%
sensitive information
enough testing
13% Data exfiltration 12% 20% 23% 20% 19% 7%

It doesn't invest Denial of service 16% 15% 14% 23% 21% 10%
20% enough in
It doesn't adequately
address runtime or
18% pre-production Account takeover/misuse 9% 14% 17% 19% 25% 15%
security
production security Outdated/zombie APIs 12% 13% 9% 10% 14% 42%
19%
1 - Least concern 6 - Greatest concern
It doesn't focus enough time on fleshing out
requirements and documenting

6
Stopping attacks is the most highly valued API security attribute; shift left is lowest
The ability to stop attacks was rated the most critical attribute by the most respondents (41%), compared to only 22% who rated shift-left capabilities a top need
API security offers organizations a variety of capabilities and use cases, spanning discovery, attack Meeting compliance or regulatory requirements came in third on the list of “highly important” platform
prevention, incident response, and compliance. When asked to rate each attribute from unimportant to capabilities, with 39% rating it so. As with runtime protection and sensitive data, security audits present a
highly important, the ability to “stop attacks” took the top spot of highly important capabilities, with 41% “here and now” challenge for organizations who have to answer to auditors increasingly well informed on the
giving it that most valued rating. It should come as no surprise that 30% of respondents also cited the ability risks that APIs present.
to defend against the OWASP API Security Top 10 as highly important as well.
Coming in at the bottom of the list of most valued capabilities is shift-left capabilities, with only 22%
The ability to identify which APIs are exposing PII or sensitive data was second highest, with 40% of citing it a “highly important” capability. It stands to reason that the delayed effect of shift-left practices,
respondents ranking that capability as “highly important.” These two areas – runtime protection and exposed which protect only new assets yet to be released vs. those already running in production, would impact
sensitive data – represent the greatest sources of immediate risk for organizations. its perceived value. In addition, survey respondents may also recognize the lower overall value proactive
security can provide, given the need for active API traffic to spot the business logic gaps that dominate
today’s API attacks.

On a scale of 1-5, how would you rate the value of each of these attributes of an API security platform? (1 is unimportant and 5 is highly important)

Stop attacks 5% 12% 22% 21% 41%

Identify all APIs, including undocumented APIs 3% 7% 36% 27% 27%

Identify which APIs expose PII or sensitive data 6% 26% 26% 40%

Implement shift-left API security practices 10% 38% 28% 22%

Streamline API incident response and investigations 9% 35% 32% 23%

Cover the OWASP API Security Top 10 3% 6% 28% 32% 30%

Meet compliance or regulatory requirements 3% 6% 26% 25% 39%

1 - Unimportant 3 - Somewhat important 5 - Highly important


7
It's increasingly difficult to keep up with changing APIs
42% are updating their APIs at least weekly, and the majority are relying on multiple API protocols
Beyond just a growing quantity, securing and maintaining APIs is further complicated by the fast pace of remained relatively flat over the past several surveys, but what has changed is that 20% are now leveraging
updates. One year ago, only 6% of survey respondents indicated that they update their APIs daily. Today, that this architecture for more than half of their APIs. Therefore, it’s more important than ever to discover and
number has increased to 11%. An additional 31% update their APIs weekly, while only 10% update them less protect APIs of all protocol types – GraphQL poses particular challenges for security, given its nested query
frequently than every few months. structure.

Adding further complexity is the reliance on multiple API protocols as developers leverage the architecture
that works best for each unique project. Nearly all respondents (97%) utilize REST, 87% use SOAP, 82%
use GraphQL, and 79% use RPC protocols. The percentage of respondents who utilize GraphQL has

On average, how often do your primary APIs get updated? How many of your APIs (in percentages) use which of the following protocols?

I have no idea
Daily
Less frequently than REST 19% 38% 23% 21%
every few months 6% 11%
10% SOAP 38% 39% 20% 3%

RPC 43% 34% 19% 5%


Every few
months 18%
GraphQL 48% 32% 15% 5%
31% Weekly

0-25% 25-50% 51-75% 76+%


24%
Monthly
28%
8
Multiple (solvable) obstacles are preventing strong API security strategies
61% of respondents admit they lack any or have only a basic API security strategy
With reliance on APIs at an all-time high and critical
business outcomes relying upon them, it is even more
imperative that organizations build and implement a
strong API security strategy. Unfortunately, only 9% of
How would you describe the security strategy for What is the biggest obstacle keeping you from
respondents can confidently state that they have an
advanced API security strategy that includes dedicated
your API development program? implementing an optimal API security strategy?
API testing and protection. 61% admit that they lack any
API security strategy or have only basic protections Advanced
(dedicated API testing and protection) Non-existent Other )2%(
(risk assessment, network scanning, manual reviews). Competing priorities
Time
9% 6% 7%
The top reasons cited for the lack of a robust API Tooling/solutions
11%
security strategy include budget (24%), expertise 6%
(20%), resources (19%), and time (11%). With the current
Planning stage
economic climate and budget cuts, it’s not surprising
26% Defined strategy 10%
that budget constraints rose from 20% to 24% over Intermediate
(app sec testing, 30% 24% Budget
the past six months. Fortunately, these problems are
surmountable: an existing security budget can be re- gateways)
allocated to tackle API security with the right business
justification. And a lack of expertise, people, and time 19%
can be remedied with the right API security tools,
processes, and partners. 29%
Resources/people 20%
Basic (risk assessment, Expertise
network scanning,
manual reviews)

9
A critical - and obvious - first step in API security knowledge remains overlooked
The security teams at nearly half of organizations are not making the OWASP API Security Top 10 list a focus area
A shrinking number of respondents say they include the OWASP API Security Top 10 list as a focus area This lack of focus is particularly troubling for the industry because the OWASP API Security Top 10 is a critical
within their API security programs. A total of 62% of respondents consider “Defending against the OWASP first step in security APIs. In fact, Salt customer data shows that 62% of all attack attempts leverage
API Security Top 10” to be highly important (30%) or important (32%). Unfortunately, only 55% say their at least one of these ten security vulnerabilities, and they are often leveraged in a layered approach
security team is actually highlighting the OWASP API Security Top 10 in their security program, down from to propagate more sophisticated attacks. With such a large percentage of attacks taking advantage of
61%. these most common and well-documented security flaws, organizations cannot afford to overlook this
fundamental principle in API security.

Do you consider "Defending against the OWASP API Security Has your security team highlighted the OWASP API Security
Top 10" to be an important attribute of an API security platform? Top 10 threats as a focus area for your security program? Salt customer data
Attack attempts leveraging OWASP API Security Top 10 list
Unimportant
Slightly important
3%
6% 13%
Highly important I don't
30% know
38%
62%
Did not involve
28% Somewhat
important 32% 55%
OWASP API Top 10
Involved
no yes OWASP API Top 10

32%
Important

10
Organizations are continuing to "shift left," but it's failing to protect them
Respondents focus on fixing API security gaps during dev (53%) and test (59%), yet 94% still suffered API security incidents
”Shift Left” security has been the topic of many
industry conversations over the past year, and
survey responses indicate that organizations
are listening. 53% of respondents say they
At what point(s) in the development life cycle does your
identify and remediate API security gaps during company identify and remediate API security gaps? What tools/approaches do you use in pre-production to improve
development, and 59% look for API issues in (Select all that apply) API security? (Select all that apply)
testing. Tactics include penetration testing
(46%) and leveraging security best practices for
developers (45%). These steps are important, but Test 59% Penetration testing 46%
with 94% of respondents admitting to API security Dev 53% Security best practices for developers 45%
incidents (page 4), shift-left tactics alone are not
enough. Initial deployment 38% Dynamic application security testing (DAST) 34%

A troubling result of this survey is that only 30%


Runtime/production 31% Static application security testing (SAST) 27%
of respondents say they are identifying and Interactive application security testing (IAST) 22%
remediating API security gaps in runtime. Such
a low number may help explain the high rate of
Software composition analysis (SCA) 22%
API security incidents. Most successful attacks Bug bounties 16%
on APIs target gaps in logic flow, and API testing
and scanning in pre-production can never uncover Fuzzing 10%
those gaps – finding them requires running traffic. We don't work to improve API security in pre-prod 4%
Every organization wants to find security problems
before code is released to production, but that
tactic has fundamental limitations. Runtime
security is the missing piece to achieving robust
API security for many organizations.

11
Traditional tools and processes are falling short in API protection
Most respondents rely on API gateways (54%) and WAFs (44%) to identify API attacks, yet 82% don't believe that their existing tools are very effective
As in previous surveys, this quarter’s respondents indicated that they primarily rely on traditional tools attackers will be long gone with valuable data by the time a security analyst can parse log files. WAF alerts
to manage APIs and protect against application attacks. However, it is interesting that they don’t believe (44% of respondents) are known to be ineffective, since WAFs use proxy architectures to apply signatures
these methods are particularly effective, with 82% of respondents saying their existing tools aren’t very that detect only well-known attacks such as cross-site scripting (XSS), SQL injection (SQLi), and JSON
effective in preventing API attacks. As a result, 73% admit that they lack confidence in their ability to injection. WAFs can’t stitch together the data needed to spot today’s API attacks. API gateways (54% of
respond to an API attack. respondents) also employ traditional protections such as authentication, authorization, encryption, and
rate-limiting. While these tools provide some coarse application protection, they cannot spot much less
Analyzing log files (48% of respondents) to identify API attacks is tedious, reactive, and highly ineffective – defend against the threats in the OWASP API Security Top 10.

How do you identify an attack or attacker targeting your APIs? How effective are your existing security tools in preventing How confident are you in your team's ability to effectively
(Select all that apply) API attacks? respond to an API attack?

I don't know Not at all confident


Alerts from an API gateway 54%
Not at all effective Very effective Not very
Analyzing log files 48% 6% confident 3%

44%
3%
18% 13%
Very confident

27%
Alerts from a WAF or other security tool Not very
Authentication errors 35%
effective
13%
We cannot identify API attacks 9%
Other 2%

60% 57%
Somewhat effective Somewhat confident
12
Most continue to rely on manual processes to document APIs
86% lack confidence that their API inventory is complete, and 14% admit they are entirely unaware about which APIs expose PII data
As the old security adage goes, you can’t protect what you can’t see (or have no idea even exists). This Even more alarming is that PII and other sensitive data are at risk. More than half (52%) of respondents rely
truism particularly holds for APIs because of the frequent pace of creation and change. Most respondents only on documentation provided by developers to understand the potential PII exposure within their APIs,
state they are relying on manual mechanisms to document their APIs, including Postman (30%), Open while 14% concede they have no idea which APIs contain sensitive data. It stands to reason that only 14%
API Specification / Swagger (29%), and OpenAPI Generator (21%). Many are also using API management of respondents are highly confident that their API inventory provides enough detail about their APIs,
platforms (27%) and application scanning (23%). However, these tools and processes are falling short, since including exposure of sensitive data or PII.
86% lack confidence that their API inventory is complete. Only 14% have a high degree of confidence that
they have all the information they need to understand their API resources.

What mechanism(s) do you use to document and inventory your How do you know which APIs expose sensitive data or PII?
APIs? (Select all that apply) How confident are you that your API inventory is complete? (Select all that apply)

I don't know
Postman 30% Very confident Documentation from developers 52%
Swagger 29% Not at all confident 5% Our API management logs it 50%
API management platform 27% 9% 14% We don’t know which APIs expose PII 14%
Application scanning 23% Other 3%
OpenAPI Generator 21%
Config management database 16%
Not very
confident 21%
DapperDox 15%
ReDoc 15%
Other 6%
51%
Somewhat confident
13
API usage grows as companies use them to drive efficiency and innovation
60% of respondents are managing 100+ APIs, and 50% are sending more than 10 million requests to their APIs each month
API usage continues to be pervasive and critical for organizational success. Almost two-thirds (60%) of What is driving this API adoption? Development efficiencies and platform/systems integrations tie for the
survey respondents develop, deliver, and/or integrate more than 100 APIs, and 11% manage in excess of top driver at 49%. But digital transformation initiatives are a close third with 44%, up 7% over the past six
1000 APIs. These APIs are seeing heavy traffic, with 50% of organizations surveyed sending 10+ million API months. Cloud migration comes in a strong fourth, with 37% of respondents citing this driver as primary in
requests per month and 26% sending 100+ million requests. their API usage. These strategic priorities are imperative to cost containment and revenue growth, so it’s
critical to embrace an API strategy that is scalable and secure.

What are the main drivers behind the use of APIs in your How many APIs does your organization develop, deliver, How many requests are sent to your applications' APIs
organization? (Select all that apply) and/or integrate? each month?

Platform or system
integrations 49% I have no idea I have no idea

Development efficiencies 1,000+ 6% More than 1 billion 12%


1-100 0-10 million
and/or standardization 49% 11% 3%

Digital transformation
34% 500 million-
1 billion 38%
44% 8%
initiatives
501-1,000 12%
Cloud migration 37%
100-500 million 15%
Partner enablement 29%

Monetization of
37% 24%
functionality or data 13%
101-500 10-100 million
14
API security continues to change the game (for the better)
64% say that API security has helped security collaborate and even embed with DevOps teams
As API attacks continue to dominate the news, organizations are beginning to look closely at their But change and clarity are increasing as teams seek to address the challenge. Development, operations,
development and security practices to ensure they can address this formidable challenge. Fortunately, API and security teams are collaborating to tackle the challenge of API security at a pace greater than seen
security is driving a positive shift in how security and DevOps teams collaborate. It is increasingly clear that in prior surveys. In fact, respondents say that API security has compelled security and DevOps teams to
all parties who touch APIs must work together to ensure they can both deliver the innovation companies collaborate more (33%) and even embed security engineers within DevOps teams (31%). Only 4% state
need while keeping risks at bay. Survey responses indicate confusion about who is ultimately responsible that traditional roles and silos remain unchanged as teams tackle API security. The move towards bringing
for securing APIs: 37% say developers and DevOps are responsible, 25% say AppSec and InfoSec, 18% say Dev and Sec closer together is promising for both API security and the cybersecurity industry as a whole.
DevSecOps, and 15% say their dedicated API team.

Who is primarily responsible for securing APIs? How do you feel API security is creating changes in how security professionals do their jobs?

API security has not changed how


Platform or Product Team )3%( Other )1%( security teams do their jobs
SecOps teams and SOC analysts are
InfoSec API team having to triage incidents
4%
6% 15% 8% Security must collaborate
more with DevOps teams
33%
DevSecOps 18%
19% AppSec
DevOps is asking for Security's
input on API guidelines 24%
team

DevOps
12%
25% 31%
Developers Security engineers are getting embedded
with DevOps teams
15
Implications for API security
The results from the Q3 2022 State of API Security survey are clear. Respondents overwhelmingly told us that reliance on APIs is continuing to grow as APIs become ever more imperative to their organizations’ success. At
the same time, APIs are getting harder to protect as current tools and processes can’t keep pace with new protocols and attack trends. API traffic and customer usage trends from the customer base further confirm these
trends.

Organizations must move from traditional security practices and last-generation tools to a modern security strategy that addresses security at every stage of the API lifecycle and provides a broad range of protections that
foster collaboration across teams. Here are some tips to consider as you build a more robust and manageable API security program:

Define a robust API security strategy Tap the power of cloud-scale big data, AI, and ML to pinpoint the subtle probing of
WAFs and API gateways leave significant gaps when defending against API attacks, so companies need to API attackers
define and execute an API security strategy that covers the complete API lifecycle and addresses cross- Since every API is unique, bad actors must perform extensive reconnaissance to understand how each
functional responsibilities. A comprehensive program must include API design analysis and drift analysis, API works and identify vulnerabilities or gaps in business logic they can exploit. Attackers know how to
automatic and continuous discovery, augmented runtime protections, a feedback loop for developers to use probe your systems with subtlety, to avoid tripping coarse security protections such as rate limiting on
runtime insights to harden APIs, training for SecOps teams to understand and triage API security incidents, WAFs. To see these nefarious but quiet activities, an API security platform must be able to capture millions
and a clear model for shared responsibility across functional groups. of data points over a long period of time, since API attacks can take weeks and months to unfold. Then,
the platform must tap AI and ML to process all that data in near real time, so they can discern the recon
Assess your current level of risk activities of a bad actor and correlate them into a single attacker profile to avoid alerting on each bad
action. Such robust analysis requires cloud-scale big data and mature AI algorithms – it cannot be achieved
Validate current API designs against API security best practices, checking whether authentication and using VM-based collection and AI and ML of limited experience.
authorization controls are in place throughout the sequence of API calls for a given business function, for
example. Launch attacks based on the OWASP API Security Top 10 list and see whether your WAF or API
gateway can detect them. Emulate the tactics of well-known API security incidents of 2021 and 2022 to see Don’t over-rotate on shift-left tactics
whether similar business logic flaws exist in your APIs. Shift-left and secure build pipeline approaches have their merits. But many API security gaps can’t be
detected as part of code review – they can be detected only in runtime. Look for an API security platform
Enable frictionless API security across all your application environments that complements pipeline testing and analysis with robust runtime protection. Shift-left tactics take
much longer to deliver value and ultimately offer limited value as they identify only a fraction of API security
With APIs being the foundation of all application development today, you can’t afford to leave some of your risk and leave your security teams dependent on developers to work through a backlog of vulnerability
environments unprotected. You must be able to apply API discovery and runtime protection on applications fixes. Get your APIs protected today with runtime security – then you can make hardening APIs over time a
running on prem and in the cloud and on legacy apps as well as your container and Kubernetes deployments. realistic goal.
How you connect the API security tooling into your environments is also crucial – avoid inline deployments,
agents, or the need to instrument code to keep your API security platform from being blamed for any
application impact.
Get a Salt Security demo »
16
Demographics
These report findings are a combination of live Salt customer data and the survey responses of more than 350 respondents. The survey respondents are well distributed across a range of job responsibilities, industries, and
company sizes. Nearly half (49%) hold roles in security, 19% are executive-level security or IT leaders, and another 21% sit within platform, DevOps, or product teams. Technology and financial services companies – widely
viewed as at the forefront of API use – make up 47% of respondents. Companies large and small are evenly represented.

What area best represents your functional role? Size of company (employee count) Industry

CISO/BISO/VP Security Other Education


Other
10,001+ 1-100 Energy/Utilities
6% 5% 6%
12% CIO or other C level 17% 14% 6%
Entertainment
DevOps 13% & Media
7%
11%
5,001-10,000 10% Technology 29%
Financial
Application
security
9% 18% services/
25% Security 33% 101-1,000 Insurance
architect
10%
API platform
25% 6% 5%
15% 1,001-5,000 Retail 6% 9%
Government
Manufacturing
Security analyst Healthcare

17
Resources to help you get started securing your APIs

Salt Security Special Edition The Top Five Myths in API A CISO's Essential Guide to API Security Best Practices API Security Evaluation
API Security for Dummies Security » API Security » Guide » Guide »
eBook »

18
About Salt Security
Salt Security protects the APIs that form the heart of every modern application.
The Salt Security API Protection Platform is the industry’s first patented solution to prevent the next
generation of API attacks. Only Salt harnesses the power of AI and big data at cloud scale to detect
and prevent API attacks, providing unrivaled end-to-end API security so businesses can innovate with
confidence. Deployed in minutes, the Salt platform learns the granular behavior of your APIs and requires
no agents, configuration, or customization to pinpoint and stop API attackers.

Salt provides a number of technical and business advantages that set us apart as the leader in API
security, including:

• Pioneering expertise – Salt was the first company to recognize the risk of APIs and the first to
develop a dedicated API security platform. We have the biggest customer base, with the greatest
penetration of Fortune and Global 500 companies, and we’re the only company with a security
research team dedicated to API security. About Salt Labs
• Transformative impact – Our breadth of deployments means our algorithms are unparalleled in their Salt Labs identifies API threats and vulnerabilities in customer deployments and in the wild. Our
exposure and learning. Only Salt brings cloud-scale big data to solve this very thorny challenge of in-depth API threat research reports document the steps of an exploit, including the processes
detecting today’s sophisticated low-and-slow API attacks that unfold over days and weeks. We help and tooling, to reveal an attacker’s approach, the details of an exploit, the risk to the business, and
you move faster by taking API risk off the table. the steps an organization can follow to avoid becoming victim to a similar attack. We also apply our
research findings to improve the ML and AI algorithms at the heart of our API security platform, so
• Unwavering integrity – Our research, our technical innovation, and our track record of follow-through all our customers benefit from our ongoing research. Our industry reports, such as this State of API
make us an ideal partner. Listening to your needs and priorities helps shape our development, and Security Report, tap empirical and survey data to educate the market on API security trends.
collaboration with our customers as innovation partners helps us stay out in front.

19
20

You might also like