Versaria + Axway

solving-the-top-11-api-threats

Issue link: https://axway.uberflip.com/i/991646

Contents of this Issue

Navigation

Page 23 of 27

TRUSTED ≠ TRUSTWORTHY CONTEXT The security architect's most dangerous suspect is probably not a malicious attacker, but rather him or herself. Microso's John Lambert says it well, "Defenders think in lists, attackers think in graphs. As long as that is true, attackers win." VULNERABILITIES IDENTIFICATION & TRACKING Humans have cognitive biases including overconfidence, blind spots, and being susceptible to seductive details, data, and security-conference presentations. Root out fuzzy concepts in your security architecture. Are you using the terms "trust" or "principle of least privilege?" What do these mean? Can you be more specific? COUNTERMEASURE(S) Don't rely on lists alone. Think of ways an API gateway and other security can make it more difficult for an attacker to access your enterprise's resource graph. ASSURANCE Continually stress-test your assumptions and update your security architecture. It should be a living, breathing exercise — more like practicing a martial art than admiring a painting in a frame hung on a wall. 11 | The Curious Case of "Trusted ≠ Trustworthy"

Articles in this issue

view archives of Versaria + Axway - solving-the-top-11-api-threats