{"id":998,"date":"2024-06-12T09:00:00","date_gmt":"2024-06-12T08:00:00","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=998"},"modified":"2024-06-09T11:53:53","modified_gmt":"2024-06-09T10:53:53","slug":"the-api-security-tightrope-why-most-organizations-are-falling-off","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/the-api-security-tightrope-why-most-organizations-are-falling-off\/","title":{"rendered":"The API Security Tightrope &#8211; Why Most Organizations Are Falling Off"},"content":{"rendered":"\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" data-id=\"999\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/API-Security.jpg\" alt=\"\" class=\"wp-image-999\" srcset=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/API-Security.jpg 1024w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/API-Security-300x300.jpg 300w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/API-Security-150x150.jpg 150w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/API-Security-768x768.jpg 768w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/API-Security-100x100.jpg 100w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/figure>\n<\/div><\/figure>\n\n\n\n<p>APIs are at the heart of modern software. They allow different applications to share and integrate data seamlessly. APIs are a huge security blind spot, which most organizations fail to properly address. Over 60% of organizations have experienced an API data breach within the last two years. 74% had multiple breaches. This has led to revenue loss, fines for compliance, and damaged trust from customers.<\/p>\n\n\n\n<p>Why do so many organizations fail to secure APIs? What&#8217;s interesting is that 74% of these organizations believe they have robust security programs in place. There seems to be an issue with perceptions and reality.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Risks with API Security<\/h2>\n\n\n\n<p>Here is a look at the tightrope walks that organizations are doing:<\/p>\n\n\n\n<p>API proliferation: APIs are multiplying per application. Many organizations use open APIs which makes securing each connection difficult.<\/p>\n\n\n\n<p>Cloud-native apps are growing rapidly and it is difficult for security teams and their staff to monitor and control everything.<\/p>\n\n\n\n<p>Security vs. Development Speed: Trying to integrate security into a fast-paced development cycle can be a struggle.<\/p>\n\n\n\n<p>Legacy Tools: Security applications designed for traditional applications don&#8217;t always work well with APIs.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><em>The threat landscape continues to worsen. In the next 12-24 month, API attacks are expected to increase.<\/em><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Who Should Care?<\/h2>\n\n\n\n<p>API security is a concern for anyone responsible for digital transformation in their organization. API security is a concern for CISOs and DevOps teams as well as business leaders.<\/p>\n\n\n\n<p>API security is still not getting the attention or resources it deserves, despite the high stakes. Only 43% have policies in place to secure and manage APIs. Budgets are unclear and there is no clear owner. Basic vulnerabilities, such as poor authentication, persist.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Solution?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"333\" height=\"248\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-1.png\" alt=\"\" class=\"wp-image-1001\" style=\"width:333px;height:auto\" srcset=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-1.png 333w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-1-300x223.png 300w\" sizes=\"auto, (max-width: 333px) 100vw, 333px\" \/><figcaption class=\"wp-element-caption\">Research Towards key Issues of API Security -Security Audit Process<\/figcaption><\/figure>\n<\/div>\n\n\n<p>A successful API security strategy requires several key steps.<\/p>\n\n\n\n<p><strong>Inventory and Control:<\/strong> Take control of all your APIs. This includes identifying shadow APIs, which are APIs created outside the IT department\u2019s control.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"582\" height=\"546\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image.png\" alt=\"\" class=\"wp-image-1000\" srcset=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image.png 582w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-300x281.png 300w\" sizes=\"auto, (max-width: 582px) 100vw, 582px\" \/><figcaption class=\"wp-element-caption\">Research Towards key Issues of API Security &#8211; Critical API Assets<\/figcaption><\/figure>\n<\/div>\n\n\n<p><strong>Authentication and Authorization:<\/strong> Implement the proper authorization. Use unpredictable IDs. Understand authentication flows. Use authorization &amp; authorization standards to secure credential recover, reauthentication, anti-brute-force mechanisms.<\/p>\n\n\n\n<p><strong>API Gateways:<\/strong> They act as gatekeepers by controlling API access and enforcing policies.<\/p>\n\n\n\n<p><strong>DevSecOps<\/strong>: Integrate security tests throughout the entire development lifecycle. It means giving developers the power to write secure code, and making security a joint responsibility.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Bottom Line<\/h2>\n\n\n\n<p>We live in an API driven world, whether or not most companies are aware of it. They&#8217;ll continue to be a huge security liability until they lock down their APIs.<\/p>\n\n\n\n<p>There are solutions &#8211; from improved API discovery tools to automated checks for security in the CI\/CD process. It will take a shift in mindset to make API Security a priority, rather than an afterthought.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"792\" height=\"370\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-2.png\" alt=\"\" class=\"wp-image-1002\" srcset=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-2.png 792w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-2-300x140.png 300w, https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/image-2-768x359.png 768w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><figcaption class=\"wp-element-caption\">Research Towards key Issues of API Security &#8211; API Security Framework<\/figcaption><\/figure>\n<\/div>\n\n\n<p>The API security epidemic is too big for companies to ignore. Inaction is simply not worth the risk.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"146\" height=\"53\" src=\"https:\/\/www.itminister.co.uk\/blog\/wp-content\/uploads\/2024\/06\/itminister-logo.png\" alt=\"\" class=\"wp-image-1003\"\/><\/figure>\n<\/div>\n\n\n<h1 class=\"wp-block-heading\">How Can ITM Help You?<\/h1>\n\n\n\n<p id=\"ember717\">IT Minister covers&nbsp;all&nbsp;aspects&nbsp;of Cyber Security including but not limited to&nbsp;<a href=\"https:\/\/www.itminister.co.uk\/homecybermanagement.html\">Home cyber Security Managed Solutions<\/a>&nbsp;to automated,&nbsp;<a href=\"https:\/\/www.itminister.co.uk\/businesscybersecurityservices.html\">Manage Threat Intelligence<\/a>,&nbsp;<a href=\"https:\/\/www.itminister.co.uk\/digitalforensics.html\">Digital Forensic Investigations<\/a>,&nbsp;<a href=\"https:\/\/www.itminister.co.uk\/penetrationtesting.html\">Penetration Testing<\/a>,&nbsp;<a href=\"https:\/\/www.itminister.co.uk\/mobiledevicesecurityassessment.html\">Mobile Device Management<\/a>,&nbsp;<a href=\"https:\/\/www.itminister.co.uk\/publiccloudhardening.html\">Cloud Security Best Practice<\/a>&nbsp;&amp;&nbsp;<a href=\"https:\/\/www.itminister.co.uk\/businesscybersecurityservices.html\">Secure Architecture by Design<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.itminister.co.uk\/cybersecuritytraining.html\">Cyber Security Training<\/a>. Our objective is to support organisations and consumers at every step of their cyber maturity journey.&nbsp;<a href=\"https:\/\/www.itminister.co.uk\/contact.html\">Contact Us<\/a>&nbsp;for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>APIs are at the heart of modern software. They allow different applications to share and integrate data seamlessly. APIs are a huge security blind spot, which most organizations fail to properly address. Over 60% of organizations have experienced an API data breach within the last two years. 74% had multiple breaches. This has led to &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/the-api-security-tightrope-why-most-organizations-are-falling-off\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The API Security Tightrope &#8211; Why Most Organizations Are Falling Off&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[70,65,17,18,23,50,28],"tags":[],"class_list":["post-998","post","type-post","status-publish","format-standard","hentry","category-api-security","category-asset-discovery","category-cyber-risk","category-cyber-security-best-practice","category-cyber-security-research","category-cybersecurity-strategy","category-devsecops"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=998"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/998\/revisions"}],"predecessor-version":[{"id":1004,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/998\/revisions\/1004"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}