Protecting APIs from Cyber Attack
Protection of application programming interfaces (APIs) has emerged as an important aspect of modern cybersecurity.

Protecting APIs from Cyber Attack

First mention of an application programming interface (API) appeared in Roy Fielding’s now-famous PhD thesis at UC Irvine in 2000. Soon after, we all watched as Salesforce, eBay, and later Amazon, took advantage of the new construct to extend the scale, interoperability, and automation of their fledgling websites. (This is a humbling narrative, by the way, for those of us who’ve completed doctoral thesis projects noticed by no one.)

Before APIs, programs communicated with other programs through a maze of inter-process communication (IPC), shared memory, and other ad hoc means. Today, the modern API powers introduction of new capabilities and expansion in social media and across the web. One cannot underestimate the transformative effect of data and functionality being exposed by one group of programmers to another through standard service interfaces.

With all new ideas, however, comes the usual security issues. Different types of API abuse have emerged including data theft, fraud, account takeovers, and denial of service. These attacks generally occur by exposing business logic flaws due to software bugs. Every new or modified feature thus introduces a potentially new attack vector. Since services are being modified and enhanced continuously, the API attack surface becomes infinite.

To learn more about this emerging challenge of handling API security risk, I spent some productive time with one of the experts working in this area. Simon Sorrell from imVision Technologies was kind enough to take me through the relevant technical and platform issues related to modern API usage, and the attendant cyber security risks. Here’s a summary of what I learned:

To protect an API requires three functional capabilities: First, basic visibility into the APIs within the domain is required. That is, you can’t protect what you can’t see. Second, advanced detection capabilities are required to identify abnormal functional behaviors or abnormal consumption patterns. Finally, preventive controls are required to support the need for corrective action against abnormal API transactions in real time.

The imVision platform supports these capabilities via their API Anomaly Management Platform (API AMP). “Our platform currently monitors over ten billion API calls per month for over seven hundred business partners (API consumers) covering over one hundred million end-users,” Sorrell said. “This coverage, combined with our advanced technology, gives us the reach necessary to support security protections that scale across different API attack vectors.”

The API AMP platform includes support for security discovery and risk scoring of API endpoints to provide visibility. It also includes detection of API anomalies which impact API functionality or consumption patterns, using machine learning to detect API attacks with zero configuration. API AMP can be run in monitoring mode or with auto protection enabled. “Our goal is to ensure that early detection and prevention of API-based attacks will allow enterprise teams to reduce their overall cyber security risk,” Sorrell explained.

From a TAG Cyber analysis perspective, note first that APIs today are managed by various management systems provided by a long list of vendors such as IBM (API Connect), Google (Apigee), Salesforce (Mulesoft), and Amazon (API Gateway), as well as some open source platforms like KONG. One would expect platforms such as API AMP to be soon offered in the context of an integrated package with API Management.

More generally, it’s good to see increased emphasis from commercial vendors on securing APIs. Early application security efforts appeared to have a blind spot to this aspect of web functionality, which perhaps helps to explain the frequency of data theft across so many industry sectors. With capable vendors now offering solutions, one would expect to see the incidence of such familiar breaches start to recede – at least, one would hope.

I’d recommend checking out what Sorrell and his team have to offer. They are spread out geographically across Tel Aviv, Dallas, and Hong Kong, which doesn’t seem like much fun to manage – but which does increase the likelihood that you can arrange a face-to-face with one of the principals. As always, please be sure to share back with all of us what you learn after you contact the company for a briefing. I look forward to hearing from you.

Ed... interesting background and current uses of API’s....I’m really dating myself .... but even though first mentioned in the PhD thesis you referenced.....first uses of API’s goes back to the late 1960’s and early 1970’s when we were forced to design programs and use system overlay programs and libraries and other system resources due primarily to lack of memory resources.

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    13 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了