Versaria + Axway

solving-the-top-11-api-threats

Issue link: https://axway.uberflip.com/i/991646

Contents of this Issue

Navigation

Page 3 of 27

01 | The Curious Case of Unprotected APIs UNPROTECTED APIS CONTEXT Most enterprise cores are as so and chewy as the center of a candy bar. That means that once inside, an attacker has free reign. Therefore, the API layer is a table-pounding, must-have security priority. VULNERABILITIES IDENTIFICATION & TRACKING REST, SOAP and other APIs that make access available to back-end systems lack access control, monitoring and management Build a service repository or API catalog Keep repository up to date to reflect changes COUNTERMEASURE(S) Enforce access policy to all APIs through a central chokepoint such as an API gateway. Implement an API gateway to: • Mediate and monitor all access requests to the API layer • Enforce API access control policy • Ensure the system does not expose unprotected assets via APIs ASSURANCE Use dynamic scanning tools to look for exposed APIs. These scanning tools should run continuously.

Articles in this issue

view archives of Versaria + Axway - solving-the-top-11-api-threats