Versaria + Axway

solving-the-top-11-api-threats

Issue link: https://axway.uberflip.com/i/991646

Contents of this Issue

Navigation

Page 15 of 27

INVISIBLE ATTACKER CONTEXT Information security has long relied on access-control technologies that are necessary, but not sufficient. Access control divides the system into known-good and known-bad states. These partitions are useful for defining and enforcing authorized access, but they do not hold up in all cases when deliberate malice is involved. VULNERABILITIES IDENTIFICATION & TRACKING Attackers inject false messages into log files, find events that are not tracked, and/or tamper with log messages Ensure a reliable event stream reports log messages to a central secure log server COUNTERMEASURE(S) Network-only logging won't cut it; logging and monitoring must be done at an application level. Application sensors should be deployed at boundary-crossing layers like the API gateway. These sensors should record access, exception, malicious and related events. ASSURANCE Red team testing should be done to ensure that the logging systems do in fact detect malicious use. 07 | The Curious Case of Invisible Attacker

Articles in this issue

view archives of Versaria + Axway - solving-the-top-11-api-threats