Express Computer
Home  »  News  »  “API Vulnerabilities”: The threat to crack on

“API Vulnerabilities”: The threat to crack on

0 440

(By Santosh Matam)

In today’s world of ever-increasing interconnectivity, application programming interfaces (APIs) have cropped up as a powerful tool for providing access to data and capabilities beyond the firewall. Businesses are increasingly running APIs to bring together ecosystem partners and unlock new sources of value. A recent 2019 State of Application Services (SOAS) report found that of the 2000 technology professionals who responded to the survey, 42 percent had already deployed API gateways and 27 percent planning were planning to deploy gateways in 2019.

As APIs become a part of standard enterprise architecture, their security risk profile is emerging as an issue that potentially diminishes the appeal of this powerful technology. The security risk is a result of the broad permissions to access any data within the application environment. Permissions are usually set up for the user making the original request, which are, in turn, passed to the API. That is all well and good until an attack bypasses the user authentication process and goes directly to the downstream app.

API Breaches of Large Platforms

Organizations with high traffic sites offering a wide range of services (such as social media or e-commerce platforms) often feature many third-party integrations. These integrations rely on APIs to collect data from third parties and deliver them to the user in a seamless fashion. The growing decentralization of infrastructure—represented by multi-cloud environments, third-party functions, content, and serverless and containerized architectures—means that APIs are essential for modern, high-volume platforms. Some of these platforms have hundreds of APIs, all of which need to be managed and monitored. These kinds of organizations and business models have tended to figure prominently in the API breach notifications, and breaches of this type constituted 41 percent of known API breaches from September 2018 to September 2019.

Mobile Apps

Most mobile apps rely on APIs to pull data from servers, which allow apps to use fewer resources on the devices themselves. Because of some of the inherent challenges with securing mobile applications, there is a vibrant community of attackers who decompile and reverse engineer mobile applications looking for vulnerabilities, such as hardcoded credentials or weak access controls. The API is often a focal point of these efforts.

It is important to automate and integrate an agile process into the release in order to remain competitive and close the widening gap between development and security teams. However, security should keep pace with CI/CD pipeline where the controls should be automated and embedded into the release process in a manner that the team can enforce common controls without striking the release cycles.

Cracking the Vulnerability threat

As such, it is important to put together a comprehensive API security program that reduces the most important risks to back-end systems. The architecture, tools, and controls vary but the fundamental security requirements should be able to defend against the major threats that can exploit vulnerabilities in APIs. This practice is recommended for application security, but with APIs, the pace of changes to API code and the number of disconnected parties involved in their use make life-cycle security management essential. 

Secondly, developing an API security policy for each API is important especially which defines who can do what to which internal services, when they can do it, and how much.

Enable App-to-App Authorization: As businesses build and release more apps, the number of APIs, which enable apps to communicate automatically with one another, has risen exponentially. In this fast-paced environment, DevOps teams need to rapidly create and manage application services without worrying about cross-app vulnerabilities. The challenge with more and more APIs is that they become additional targets for threats. To mitigate threats at the API level, it is essential to have secure authorization between apps based on standardized and open methods across web, mobile, and desktop environments.

Continuously test: The prevalence of APIs is matched only by their obscurity. Constant testing is required to stay current. It is also a good idea to place a bug bounty on API vulnerabilities and harness the insight of proactive security researchers.

(The author is the Security Manager at F5 Networks)

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image