Securing Applications in an Evolving API Security Landscape
July 16, 2024

Eric Schwake
Salt Security

APIs have become the lifeblood of modern software development. These digital messengers allow applications to talk to each other, enabling seamless data exchange and functionality. But as the API economy booms, so does the API monster is lurking in the shadows. The API security market, already experiencing explosive growth, is on track to reach a staggering valuation of over $905 billion by 2031. This surge is fueled by two key factors: the evolving landscape of Generative AI and an expanding attack surface.

API abuse is rampant, impacting organizations of all sizes and industries. Dell became the target of an API attack earlier this year where 49 million customer records were stolen. The worst part of it all, this particular attack wasn't very sophisticated nor was it novel. The attacker used a business logic flaw and an API. This attack emphasizes the increasing complexity of API protection in a continuously expanding landscape of API usage.

Despite increasing awareness, many organizations are still in the initial stages of implementing strong API security. Our recent research, the Salt Security State of API Security Report 2024, painted a concerning picture of the current state of the market. A significant 95% of organizations reported difficulty containing API security incidents, highlighting a massive gap between existing security measures and the evolving threat landscape.


The Expanding Attack Surface

The API security market is facing a growing attack surface due to a confluence of factors. One key driver is the sheer proliferation of APIs themselves. As businesses embrace digital transformation and cloud-based solutions, they produce more APIs to fuel innovation and interconnectedness. A significant percentage (35%) of these organizations are dealing with the security implications of managing over 500 APIs.

Many organizations have also experienced a rapid increase in API growth over the past year. 38% have reported an increase of 51-100%, and another 26% have reported an increase of over 100%. This expansion has created a vast and constantly changing attack surface that is hard to secure with traditional security tools.

Adding further fuel to the fire, threat actors constantly innovate, developing new techniques to target APIs. This includes exploiting zero-day vulnerabilities, leveraging stolen credentials through phishing attacks, or even using bots to automate brute-force attacks against API endpoints.

Traditionally, API security focused on reactive measures, patching vulnerabilities and detecting attacks after they happened. However, GenAI allows attackers to automate tasks, churning out mass phishing campaigns or crafting malicious code specifically designed to exploit API weaknesses. These attacks, known for their speed and volume, easily overwhelm traditional security solutions designed for static environments.

Keeping Up to Stay Ahead

APIs are crucial for modern business operations, driving innovation and customer interactions. However, without proper security measures, APIs can be vulnerable to attacks that can put sensitive data at risk, disrupt operations, and damage customer trust. Our survey revealed that 55% of respondents experienced delays in application rollout due to security issues with their APIs. This underscores the real-world impact of inadequate API security, including delayed innovation, frustrated customers, and lost revenue. Ensuring robust API security isn't just an IT issue, it's a critical business continuity imperative.

Compounding the problem, a staggering 42% of organizations lack a formal process to discover all their APIs. This creates significant blind spots in their security posture. This incomplete inventory is like defending a city with a blindfold on — hidden vulnerabilities become easy targets for attackers.This incomplete inventory makes it incredibly challenging to implement effective security measures and govern the access controls across all APIs. You cannot protect against what you cannot see, right?

Moving in the Right Direction

Traditional API security solutions like WAFs are no longer enough. While WAFs and API gateways offer some protection, a comprehensive API security strategy is crucial for a complete defense that protects APIs throughout their lifecycle and assigns clear security ownership across teams.

Here's how to fortify your API defenses:

Define a holistic strategy: This includes API design analysis, continuous discovery, runtime protection with AI/ML, developer feedback loops, security team training, and a shared responsibility model.

Assess your current risk: Regularly evaluate your APIs against security best practices, conduct penetration testing, and simulate real-world attacks.

Enable frictionless security across environments: API discovery and protection should span all your environments, from on-premise to cloud, and integrate seamlessly without impacting application performance.

Prioritize robust runtime security: Advanced runtime protection with AI/ML is crucial to continuously defend against evolving threats and malicious intent hidden within seemingly legitimate traffic. Cloud-based security offers the processing power needed for this sophisticated analysis.

Shift left with API posture governance: Integrate security throughout the entire development lifecycle, from design to runtime. This reduces risk by identifying vulnerabilities early and ensuring that APIs are built with security in mind.

Finding Footing for the Future

The growing reliance on APIs necessitates a proactive approach to security. Organizations must move beyond reactive measures, like patching vulnerabilities after attacks occur, and embrace a comprehensive API security strategy. This strategy should encompass the entire API lifecycle, from design to runtime, baking in security from the very beginning.

Rising technologies such as GenAI can and should be implemented and utilized to analyze vast amounts of data better and identify subtle anomalies and malicious intent hidden within seemingly legitimate traffic. By taking these proactive steps, businesses can fortify their API defenses and ensure the secure exchange of data that fuels modern digital interactions. This not only safeguards sensitive information and prevents costly disruptions, but also fosters trust with customers and partners who rely on the seamless flow of data through APIs. Investing in robust API security is no longer optional; it's a strategic imperative for success in today's API-driven digital landscape.

Eric Schwake is Director of Cybersecurity Strategy at Salt Security
Share this

Industry News

November 20, 2024

Spectro Cloud completed a $75 million Series C funding round led by Growth Equity at Goldman Sachs Alternatives with participation from existing Spectro Cloud investors.

November 20, 2024

The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, has announced significant momentum around cloud native training and certifications with the addition of three new project-centric certifications and a series of new Platform Engineering-specific certifications:

November 20, 2024

Red Hat announced the latest version of Red Hat OpenShift AI, its artificial intelligence (AI) and machine learning (ML) platform built on Red Hat OpenShift that enables enterprises to create and deliver AI-enabled applications at scale across the hybrid cloud.

November 20, 2024

Salesforce announced agentic lifecycle management tools to automate Agentforce testing, prototype agents in secure Sandbox environments, and transparently manage usage at scale.

November 19, 2024

OpenText™ unveiled Cloud Editions (CE) 24.4, presenting a suite of transformative advancements in Business Cloud, AI, and Technology to empower the future of AI-driven knowledge work.

November 19, 2024

Red Hat announced new capabilities and enhancements for Red Hat Developer Hub, Red Hat’s enterprise-grade developer portal based on the Backstage project.

November 19, 2024

Pegasystems announced the availability of new AI-driven legacy discovery capabilities in Pega GenAI Blueprint™ to accelerate the daunting task of modernizing legacy systems that hold organizations back.

November 19, 2024

Tricentis launched enhanced cloud capabilities for its flagship solution, Tricentis Tosca, bringing enterprise-ready end-to-end test automation to the cloud.

November 19, 2024

Rafay Systems announced new platform advancements that help enterprises and GPU cloud providers deliver developer-friendly consumption workflows for GPU infrastructure.

November 19, 2024

Apiiro introduced Code-to-Runtime, a new capability using Apiiro’s deep code analysis (DCA) technology to map software architecture and trace all types of software components including APIs, open source software (OSS), and containers to code owners while enriching it with business impact.

November 19, 2024

Zesty announced the launch of Kompass, its automated Kubernetes optimization platform.

November 18, 2024

MacStadium announced the launch of Orka Engine, the latest addition to its Orka product line.

November 18, 2024

Elastic announced its AI ecosystem to help enterprise developers accelerate building and deploying their Retrieval Augmented Generation (RAG) applications.

Read the full news on APMdigest

November 18, 2024

Red Hat introduced new capabilities and enhancements for Red Hat OpenShift, a hybrid cloud application platform powered by Kubernetes, as well as the technology preview of Red Hat OpenShift Lightspeed.

November 18, 2024

Traefik Labs announced API Sandbox as a Service to streamline and accelerate mock API development, and Traefik Proxy v3.2.