Cloud Infrastructure Risks: How Combining Edge and Runtime Protection Can Better Protect APIs and Apps
February 01, 2024

Bret Settle
ThreatX

The acceleration of digital transformation and subsequent rise in API, containerization, and multi-cloud deployments are creating a dynamic attack surface that's growing increasingly complex. Maintaining visibility to keep track of new, changed, unmanaged, or insecure APIs grows increasingly difficult.

In addition, many threat actors now bypass edge and perimeter defenses by exploiting vulnerabilities in running APIs and applications. As we've seen with the recent credential stuffing attack(link is external) on biotechnology company 23andMe, companies risk both massive data loss, and reputational and financial damage, when their APIs aren't protected. But defending APIs and applications in this new multi-cloud environment has proven challenging. Just protecting the edge is no longer enough in this dynamic landscape, today combining protection at the edge with protection at runtime is required.

The Problem: Why APIs and Apps Will Be Harder to Defend in 2024

According to a report from Gartner(link is external), by 2027, more than half of enterprises will use industry cloud platforms to advance their business initiatives. In addition, organizations will have invested close to $600 billion(link is external) this year to move their data to the cloud. 

Complicating matters, 98% of enterprises(link is external) report they already deploy multi-cloud architectures, with data distributed across several cloud providers. Multi-cloud deployments further expand the attack surface and make security more challenging to address.

Back in January 2023, T-Mobile reported(link is external) for the second time that hackers exploited unprotected APIs, resulting in the data of 37 million customers being stolen. In addition to the stolen data, T-Mobile failed to notify customers in a timely manner once the breach was discovered — the attack went undetected for over a month. A few months later in July, JumpCloud abruptly announced(link is external) that the company needed to reset customers' API keys to combat an ongoing spear-phishing campaign. The attack granted threat actors access to the company's internal infrastructure and prevented customers from accessing services.

These attacks are just two examples that signal the complicated battle organizations are up against when it comes to defending their cloud environments.

How Organizations Can Better Defend Their APIs and Apps in a Modern Cloud-Based Environment

Web application firewalls and stand-alone API observability solutions have proven effective in protecting and providing visibility into the edge, or "front door," of an organization's environment.

However, it can leave the back door vulnerable to runtime attacks. To ensure the protection of APIs and applications in a multi-cloud, containerized environment, organizations will need adopt a strategy that provides protection from the edge to runtime. You can think of it as monitoring both who is going into and out of a house (HTTP requests and responses), and what's going on inside the house (the runtime environment). If an attacker is flooding an organization's APIs with credential stuffing attacks, edge protection stops the threats from infiltrating the "house." This protection is critical, but it doesn't address threats that can arise from exploitations at the OS level, across in-network traffic (i.e., east-west), or zero-day threats. Runtime protection, on the other hand, is like cameras monitoring activity inside a house. It detects and prevents threats in the application runtime environment.

The Solution: How Both Operate in Tandem to Block Attacks

Runtime and edge security solutions work together to provide comprehensive protection that identifies and blocks different types of threats. The two solutions work together to allow users to see what threats are coming in and out and also what's happening inside an organization's API and application landscape.

Edge solutions will stop any malicious activity from entering the house as primary defense, by monitoring the traffic attacking your APIs, and alerting on and blocking threats before they gain access to your system. Although this protection is necessary, it doesn't always address exploitations that are right at the OS level (east-west), or zero-day threats.

This is where runtime comes in. It allows you to monitor and protect from the inside at the operational level, operating as surveillance, documenting activity inside the house and identifying intruders (threat actors) that made it past the front door.

Start Taking Your API Protection Security More Seriously in 2024

Although multi-cloud platforms have provided organizations with agility to deploy and scale across all of their workloads, giving them greater flexibility, it has also opened the floodgates to threat actors lying in wait in the cloud. This increased use of cloud infrastructure will undoubtedly expand the threat landscape and breed new risks that organizations will need to defend against. Attackers have endless time and resources to find a way around defenses, and to prepare, organizations must rethink API and application protection and consider protection from the edge to runtime.

Bret Settle is Co-Founder and Chief Product Officer of ThreatX
Share this

Industry News

February 24, 2025

Couchbase announced that its Capella AI Model Services have integrated NVIDIA NIM microservices, part of the NVIDIA AI Enterprise software platform, to streamline deployment of AI-powered applications, providing enterprises a powerful solution for privately running generative (GenAI) models.

February 20, 2025

GitLab announced the general availability of GitLab Duo Self-Hosted.

February 20, 2025

Tigera announced the introduction of several new innovations to Calico, including a new Ingress Gateway capability for Calico Cloud and Calico Enterprise, and the launch of Calico Dashboards.

February 20, 2025

Copado introduced three AI-powered DevOps apps for Slack.

February 20, 2025

Gearset announced that it now supports Salesforce's Agentforce.

February 19, 2025

Sonar announced the acquisition of AutoCodeRover, an autonomous AI agent platform for software development.

February 19, 2025

Faros AI announced a collaboration with Microsoft to deliver its AI-powered platform for optimizing engineering workflows on Azure.

February 19, 2025

Apollo GraphQL announced the general availability of Apollo Connectors for REST APIs and new GraphOS platform enhancements — giving enterprises a faster, more efficient way to execute their API strategies.

February 18, 2025

Check Point® Software Technologies Ltd.(link is external) announced that its Check Point CloudGuard solution has been recognized as a Leader across three key GigaOm Radar reports: Application & API Security, Cloud Network Security, and Cloud Workload Security.

February 13, 2025

LaunchDarkly announced the private preview of Warehouse Native Experimentation, its Snowflake Native App, to offer Data Warehouse Native Experimentation.

February 13, 2025

SingleStore announced the launch of SingleStore Flow, a no-code solution designed to greatly simplify data migration and Change Data Capture (CDC).

February 13, 2025

ActiveState launched its Vulnerability Management as a Service (VMaas) offering to help organizations manage open source and accelerate secure software delivery.

February 12, 2025

Genkit for Node.js is now at version 1.0 and ready for production use.

February 12, 2025

JFrog signed a strategic collaboration agreement (SCA) with Amazon Web Services (AWS).

February 12, 2025

mabl launched of two new innovations, mabl Tools for Playwright and mabl GenAI Test Creation, expanding testing capabilities beyond the bounds of traditional QA teams.