
The Updated OWASP API Security Top 10 for 2023 is Here
The Open Web Application Security Project (OWASP)…
{ "term_id": 184, "name": "Mark Campbell", "slug": "mark-campbell", "term_group": 0, "term_taxonomy_id": 184, "taxonomy": "wpx-authors", "description": "", "parent": 0, "count": 3, "filter": "raw" }
Gartner estimates that in 2021, APIs will account for 90% of the attack surface for web-enabled applications, and API abuse will become the most frequent attack vector by 2022. By some estimates, API traffic represents 83% of all web traffic. These APIs provide a direct on-ramp deep into the organization’s systems and critical data.
Breaches and data exfiltration can look like normal application behavior, meaning that current application security systems, such as Web Application Firewalls or SIEMs are insufficient to identify attacks. API security is far more complex than simply detecting run-time attacks, which may explain why many sophisticated organizations still fall victim. When it comes to API security, the current systems can fall short. It’s not just a case of buying a new tool that gives visibility into API inventory and behavior. Instead, API security should be thought of as a process that looks at how APIs can be discovered, misconfigurations identified, vulnerabilities mitigated, and new APIs tested.
Before we dive into the API security process, let’s take a step back and find out how we got here. After all, there have been plenty of new threat vectors in the past that the cybersecurity community was able to prevent. What makes API security so different that it requires a process, not just a product?
The following is what we see as driving the adoption of API use and the resulting dramatic increase in the attack surface they represent:
Each of these transitions has significant implications from a security perspective. The fact that all four are happening at once has overwhelmed security teams already hard-pressed with changes such as mobile adoption and the transition to remote work.
It would be great if API security vulnerabilities could be solved by a single control point, such as a WAF or API gateway. However we just aren’t there yet, and there won’t be a magic API security box any time soon.
API security is a process, not a product. It needs a holistic approach that will mitigate threats throughout the API delivery stack, not just at the API edge. The Noname API Security Platform can be used to drive a multi-faceted API security process that starts with testing in the API development stage and continues throughout the API lifecycle. The platform uses a combination of API testing tools, API discovery, continuous monitoring, and run-time threat mitigation. Process is crucial when it comes to API security.
Here are the four stages of the most advanced API Security methodology, which we have named D.A.R.T.:
The API security threat is real and it can seem overwhelming. Security teams lack visibility into the extent of the problem, let alone have the means and methods to control exposure. The D.A.R.T. API Security methodology gives a framework for cybersecurity teams to approach the challenge in a structured manner. Curious how D.A.R.T. could benefit your organization and keep your APIs out of the headlines, request a demo.
Experience the speed, scale, and security that only Noname can provide. You’ll never look at APIs the same way again.