Securing Applications in an Evolving API Security Landscape
July 16, 2024

Eric Schwake
Salt Security

APIs have become the lifeblood of modern software development. These digital messengers allow applications to talk to each other, enabling seamless data exchange and functionality. But as the API economy booms, so does the API monster is lurking in the shadows. The API security market, already experiencing explosive growth, is on track to reach a staggering valuation of over $905 billion by 2031. This surge is fueled by two key factors: the evolving landscape of Generative AI and an expanding attack surface.

API abuse is rampant, impacting organizations of all sizes and industries. Dell became the target of an API attack earlier this year where 49 million customer records were stolen. The worst part of it all, this particular attack wasn't very sophisticated nor was it novel. The attacker used a business logic flaw and an API. This attack emphasizes the increasing complexity of API protection in a continuously expanding landscape of API usage.

Despite increasing awareness, many organizations are still in the initial stages of implementing strong API security. Our recent research, the Salt Security State of API Security Report 2024, painted a concerning picture of the current state of the market. A significant 95% of organizations reported difficulty containing API security incidents, highlighting a massive gap between existing security measures and the evolving threat landscape.


The Expanding Attack Surface

The API security market is facing a growing attack surface due to a confluence of factors. One key driver is the sheer proliferation of APIs themselves. As businesses embrace digital transformation and cloud-based solutions, they produce more APIs to fuel innovation and interconnectedness. A significant percentage (35%) of these organizations are dealing with the security implications of managing over 500 APIs.

Many organizations have also experienced a rapid increase in API growth over the past year. 38% have reported an increase of 51-100%, and another 26% have reported an increase of over 100%. This expansion has created a vast and constantly changing attack surface that is hard to secure with traditional security tools.

Adding further fuel to the fire, threat actors constantly innovate, developing new techniques to target APIs. This includes exploiting zero-day vulnerabilities, leveraging stolen credentials through phishing attacks, or even using bots to automate brute-force attacks against API endpoints.

Traditionally, API security focused on reactive measures, patching vulnerabilities and detecting attacks after they happened. However, GenAI allows attackers to automate tasks, churning out mass phishing campaigns or crafting malicious code specifically designed to exploit API weaknesses. These attacks, known for their speed and volume, easily overwhelm traditional security solutions designed for static environments.

Keeping Up to Stay Ahead

APIs are crucial for modern business operations, driving innovation and customer interactions. However, without proper security measures, APIs can be vulnerable to attacks that can put sensitive data at risk, disrupt operations, and damage customer trust. Our survey revealed that 55% of respondents experienced delays in application rollout due to security issues with their APIs. This underscores the real-world impact of inadequate API security, including delayed innovation, frustrated customers, and lost revenue. Ensuring robust API security isn't just an IT issue, it's a critical business continuity imperative.

Compounding the problem, a staggering 42% of organizations lack a formal process to discover all their APIs. This creates significant blind spots in their security posture. This incomplete inventory is like defending a city with a blindfold on — hidden vulnerabilities become easy targets for attackers.This incomplete inventory makes it incredibly challenging to implement effective security measures and govern the access controls across all APIs. You cannot protect against what you cannot see, right?

Moving in the Right Direction

Traditional API security solutions like WAFs are no longer enough. While WAFs and API gateways offer some protection, a comprehensive API security strategy is crucial for a complete defense that protects APIs throughout their lifecycle and assigns clear security ownership across teams.

Here's how to fortify your API defenses:

Define a holistic strategy: This includes API design analysis, continuous discovery, runtime protection with AI/ML, developer feedback loops, security team training, and a shared responsibility model.

Assess your current risk: Regularly evaluate your APIs against security best practices, conduct penetration testing, and simulate real-world attacks.

Enable frictionless security across environments: API discovery and protection should span all your environments, from on-premise to cloud, and integrate seamlessly without impacting application performance.

Prioritize robust runtime security: Advanced runtime protection with AI/ML is crucial to continuously defend against evolving threats and malicious intent hidden within seemingly legitimate traffic. Cloud-based security offers the processing power needed for this sophisticated analysis.

Shift left with API posture governance: Integrate security throughout the entire development lifecycle, from design to runtime. This reduces risk by identifying vulnerabilities early and ensuring that APIs are built with security in mind.

Finding Footing for the Future

The growing reliance on APIs necessitates a proactive approach to security. Organizations must move beyond reactive measures, like patching vulnerabilities after attacks occur, and embrace a comprehensive API security strategy. This strategy should encompass the entire API lifecycle, from design to runtime, baking in security from the very beginning.

Rising technologies such as GenAI can and should be implemented and utilized to analyze vast amounts of data better and identify subtle anomalies and malicious intent hidden within seemingly legitimate traffic. By taking these proactive steps, businesses can fortify their API defenses and ensure the secure exchange of data that fuels modern digital interactions. This not only safeguards sensitive information and prevents costly disruptions, but also fosters trust with customers and partners who rely on the seamless flow of data through APIs. Investing in robust API security is no longer optional; it's a strategic imperative for success in today's API-driven digital landscape.

Eric Schwake is Director of Cybersecurity Strategy at Salt Security
Share this

Industry News

September 16, 2024

Docker is introducing a new way for developers and organizations to access its suite of products – including Docker Desktop, Docker Hub, Docker Trusted Content, Docker Scout, Docker Build Cloud, and Testcontainers Cloud.

September 16, 2024

The Linux Foundation, the nonprofit organization enabling mass innovation through open source, announced the launch of the OpenSearch Software Foundation, a community-driven initiative that will support OpenSearch and its search software, which is used by developers around the world to build search, analytics, observability, and vector database applications.

September 16, 2024

Copado announced the Copado AI platform encompassing a suite of AI-powered DevOps agents.

September 16, 2024

Kong announced the release of Kong Gateway 3.8, a major update that sets a new standard for API management.

September 16, 2024

Perforce Software announced that its mobile application testing platform, Perfecto, will support Apple's latest iOS version, iOS 18, on Monday, September 16, 2024.

September 12, 2024

Check Point® Software Technologies Ltd. has been recognized as a Leader in the latest GigaOm Radar Report for Security Policy as Code.

September 12, 2024

JFrog announced the addition of JFrog Runtime to its suite of security capabilities, empowering enterprises to seamlessly integrate security into every step of the development process, from writing source code to deploying binaries into production.

September 12, 2024

Kong unveiled its new Premium Technology Partner Program, a strategic initiative designed to deepen its engagement with technology partners and foster innovation within its cloud and developer ecosystem.

September 11, 2024

Kong announced the launch of the latest version of Kong Konnect, the API platform for the AI era.

September 10, 2024

Oracle announced new capabilities to help customers accelerate the development of applications and deployment on Oracle Cloud Infrastructure (OCI).

September 10, 2024

JFrog and GitHub unveiled new integrations.

September 10, 2024

Opsera announced its latest platform capabilities for Salesforce DevOps.

September 09, 2024

Progress announced it has entered into a definitive agreement to acquire ShareFile, a business unit of Cloud Software Group, providing SaaS-native, AI-powered, document-centric collaboration, focusing on industry segments including business and professional services, financial services, healthcare and construction.

September 05, 2024

Red Hat announced the general availability of Red Hat Enterprise Linux (RHEL) AI across the hybrid cloud.