Published on 00/00/0000
Last updated on 00/00/0000
Published on 00/00/0000
Last updated on 00/00/0000
Share
Share
INSIGHTS
6 min read
Share
It used to be that practicing data security meant securing individual machines and the networks they resided on (firewall, anyone?). But as applications have risen out of specific machines and into the cloud, so have security threats. Instead of the vulnerabilities existing solely at the network layer, they are now also at the broad API layer, the doorway into our modern, cloud-native applications. APIs specify the types of interactions that are allowed with our applications and the level of security needed to interact. They are, therefore, the veritable keepers of the keys to the kingdom of data stored in the cloud, or accessible from the cloud.
The use of APIs is on the rise, and so too is the number of API security breaches. As APIs continue to grow, a recent Gartner report predicts that “by 2025, less than 50% of enterprise APIs will be managed.” This means that less than half of all APIs that potentially have access to important data in applications will be known, secured and controlled. Given both the explosive growth in APIs and in API security breaches, there is much work to be done. If all APIs allowed by an application aren’t known and secured, a huge attack surface is just waiting to be exploited and breached.
Why do breaches happen? Some of the top motivations include:The attack vector for wide-scale data breaches can take many forms. For some types of exploits, even the most solid API implementations wouldn’t prevent them, such as where a human is “attacked” via social engineering, phishing, MFA fatigue or where someone internal to the company is the bad actor. However, there are many examples where API security is the source of vulnerability, including:
You don’t have to look far to find reports of API security breaches. A DarkReading article estimates that US companies have lost anywhere from $12 billion - $23 billion in 2022 alone from API data breaches. TechWire Asia puts the estimate as high as $75 billion globally. That’s already a lot of zeros without even considering the damage to companies' reputation and trust.
APIs are here to stay, and are increasingly becoming a common target for data breaches, so without further ado, here is a list of the top 5 data breaches in 2022 that were due to API security issues, ordered by number of accounts impacted:
The sheer scope of the exploits listed above underlines just how much data can be compromised when an API is breached, and it's not just external, public-facing APIs that can create risk. Internal APIs can be just as problematic – or even more so – because they can access data that typically wouldn't be exposed publicly. It's critical to secure all assets that are accessible via APIs, even internal ones that aren’t expected to be exposed in the public domain.
Given the many ways in which APIs can be hacked, there's no "trick" for protecting all of them, but there are effective layers of security that can be built into API architectures and API gateway security tools to provide a multi-pronged strategy of protection. It is becoming increasingly important to follow API best practices, starting from design, development, testing and staging and continuing into production.
A recent Forbes article provides a list of guidelines to mitigate API security issues, including taking inventory of existing APIs, doing a security assessment of each and providing threat protection both during development and in the field.
One method of assessing API security is the CVSS Vulnerability Scoring System, which can help identify any APIs that present a potential security risk and rate how severe the risk is. This allows an application team to prioritize security risks and create a mitigation plan.
In terms of API discovery and observability, the Forbes article recommends using APIClarity, which is an open-source solution that has the ability to:
Get emerging insights on innovative technology straight to your inbox.
Discover how AI assistants can revolutionize your business, from automating routine tasks and improving employee productivity to delivering personalized customer experiences and bridging the AI skills gap.
The Shift is Outshift’s exclusive newsletter.
The latest news and updates on generative AI, quantum computing, and other groundbreaking innovations shaping the future of technology.