APIs Considered Harmful
There has recently been a lot of attention (because of some recent news stories) about the security of APIs. (Or really - lack of security.) Especially, about APTs having success using them as attack vectors. So, really no surprise here, as an API is part of the attack surface of a system, typically, an application. (But it is somewhat of a surprise as APIs are not a new thing, and they were not at all on the security communities radar - including my own.)
Certainly over the last few years, the number of systems that provide APIs have expanded greatly, towards the goal of opening up functionality to other systems to make their system more useful to customers. Fundamentally, an API is just another interface (the “I” is for Interface) into a system – So it needs to be protected.
APIs can provide a wide variety of functionality – E.g.,
Here are some basic requirements for a Secure API that I have thought of that system (application) developers should consider -
The developers of APIs know their API’s functionality, their issues, and weaknesses. They should be the first ones to be asked (about their API): “Where are the problems, weaknesses, areas for abuse, misuse, etc.?” They will gladly tell you. (In my experience, they have already been documented in bug reports, but not acted on because they are given low priority, so they never get addressed.) You just need to ask them, as it is likely that they have been complaining about them for a long time.
领英推荐
Above I used the phrase “Secure API”, as opposed to just “API”. This should be a new term in cybersecurity that denotes that the system developers have taken all necessary precautions to secure their API.
As we experience more attacks on APIs, we should look at their root cause and adjust or add to the above requirements that should be considered and applied to APIs.
The above are just a few ideas for developers to consider.?
I am sure the list is not complete, so feel free to add your ideas in the comments.
Postscript -
Add to the above list -
10. Inventory your APIs - So you know what you have and what needs to be managed
vCISO Platform for MSPs & MSSPs | Strategic Partnerships Development | Coffee aficionado ??
1 年Thanks for those tips, Howard. Will share with the relevant team.