There’s a big API security problem most organizations need to address. It’s the gap that emerges between application and security teams. Software developers are fueled by their drive to create and ship new products quickly. While application teams sprint ahead, security teams are left scrambling to secure infrastructure, applications, and APIs that have already been deployed. It’s like an endless game of whack-a-mole. Here we look at what it takes to keep application and security teams on the same page when it comes to APIs.
API Security: Why the Gap
Developers and security professionals have different concerns and motivations. It’s easy to see why gaps emerge. The ability to quickly ship new products, features or functionality is a real source of competitive advantage in the digital economy. Business needs demand speed. Engineers constantly work to tight deadlines and are always focused on that next release. And with the rise of microservice architectures and the proliferation of cloud services in modern software, APIs are an essential part of effective and speedy development. No one in a business wants to hinder the pace of innovation. On the other hand, in an ever-evolving threat landscape, cybersecurity is a constant concern for organizations of all sizes. Novel attack vectors, particularly those related to APIs, emerge as quickly as technology evolves. It is more important than ever for application and security teams to work together. Failure to close the gap can be catastrophic.
The Dangers of Unsecured APIs
APIs, by design, serve as a gateway to your data. It makes them extremely attractive to attackers. APIs are also often the interface where business functions can be invoked. For that reason, APIs are the only construct that has both data access and transactional capabilities, so APIs are a doubly enticing target. Our research shows that API breach incidents are accelerating at a rate of 227% year-on-year and the average volume of records exposed is close to 3M per event.
Even the largest and most sophisticated organizations are at risk. Here are just a few examples:
API Vulnerability - In 2021, the exercise equipment company had to deal with fallout as researchers identified a bug in its API that allowed unauthorized access to users' private data, including user IDs, instructor IDs, group memberships, location, workout stats, gender, age, and studio status. The vulnerability arose due to the fact that the API authenticated once, but then didn’t require subsequent authorization to access additional functions. Furthermore, sequential numbering made scraping very easy. It was a major concern, especially given the fact that the smart exercise bike company’s user base included President Joe Biden. The potential risks of built-in cameras and microphones in the bikes were highlighted, with questions about the security of such features in sensitive locations like the White House.
API Flaws - In 2020, web application security researcher, Sam Curry identified a vulnerability in a popular coffee chain’s web application that would allow attackers to access over 100 million records. The data included sensitive items such as names, emails, phone numbers, and addresses. The APIs in question allowed attackers to traverse API calls to hit URLs that weren’t supposed to be accessible on the internal host. Overly verbose error responses were a major factor. The internal API also had an exposed Microsoft Graph instance which would’ve allowed an attacker to exfiltrate those 100 million records. The bug was reported, patched and a bounty was awarded.
API Attack - The Australian telco was rocked by an attack in 2022. An internal API was inadvertently made public due to a DNS or network configuration change. Once public the API had inadequate authentication. This resulted in a significant cyber-attack which exposed the data of about 10 million customers, nearly 40% of the Australian population. The breach involved personal data, including names, birthdates, addresses, and ID numbers, with passport and driving license details for approximately 2.8 million individuals. There were ransom demands for $1 million in cryptocurrency and the situation became more complex as data samples were released and then retracted.
As illustrated by these examples, any API vulnerability or misconfiguration can open the door to data breaches that could cause reputational damage, financial loss, regulatory repercussions, and more. If data is the new oil, API breaches have the potential to be the next Deepwater Horizon or Exxon Valdez. Keeping your security teams and application developers on the same page is vital. But what if examples like those above aren’t enough to keep everyone aligned? How can you ensure API security without sacrificing speed to market? How can you protect your organization’s data without stifling innovation?
Here we look at some of the components of an effective API security strategy and how they bring benefits to both security teams and developers.
The trade-off between productivity and protection will never be eliminated entirely. Security and application teams will always be driven by different motivations. But when it comes to API security, the ability to communicate the benefits of an effective API security strategy to both developers and security teams will go a long way towards bridging the gap. And by doing so you’ll achieve increased security while giving developers the confidence to deliver even greater innovation through APIs.