Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

08:00 PM
Connect Directly

Inconsistent API Security Puts App Economy At Risk

Better ownership and accountability needed in security APIs, report finds.

As APIs increasingly serve as the essential glue in today's app economy, many enterprises are struggling to keep pace with a consistent API-security strategy, according to a survey out today by Ovum on behalf of Distil Networks. And with many APIs intentionally made public to the outside world, a lack of a singular strategy could be adding undue risk in the wake of innovation and open development communities.

“The use of APIs to enable applications to interact across single and multiple infrastructures is skyrocketing and innovation is being fueled by companies finding new ways to monetize their software assets by exposing APIs to outside developers,” says Rik Turner, senior analyst at Ovum. “However, exposing APIs to developers outside the company creates significant risk and APIs are becoming a growing target for cyber criminals."

Conducted among 100 midmarket and enterprise firms across North America, Europe, and Asia, the survey found that at least 40% of organizations were maintaining, building, or publishing 25 or more APIs. About one in five said they were running more than 50. Ovum reported that the vast majority of APIs respondents build and maintain are public, with interfaces exposed to developers outside the company. This largely comes from the fact that the majority of API initiatives are driven either to enable an external developer ecosystem or to establish partner connectivity with their software assets.

On the plus side, 87% of organizations say they have some sort of API management system in place. However, digging further into the efficacy of those systems showed that their results have proven uneven at best. Hardly surprising, considering that 63% of respondents reported running home-grown in-house platforms rather than a third-party commercial platform.

For example, the practice of rate limiting--often viewed as a fundamental API security function--was enabled by fewer than half of systems in place. About two-thirds of respondents say their organizations spend over 20 hours a month managing API rate limiting. 

Meanwhile, when questioned on four major API attack vectors--API malicious usage, API developer errors, automated API scraping and Web and mobile API hijacking, fewer than a quarter of systems in place have the capability of protecting against them all.

"Most of them are using some form of API management platform, and the majority of platforms in use provide some level of security capability," the report explained. "However, there is by no means blanket coverage of all aspects of API security by all platforms." 

More disconcerting to Ovum is the fact that there is no clear sense of ownership by security teams over API security. Around 47% of shops report that API security is the developers' responsibility. And in many of those instances, 41% of the time, the security team is not consulted until well after the API has been designed and developed.

"CIOs and CISOs must get a handle on how the security of their companies' APIs is handled and determine whether the current process is appropriate," the report said. "If they choose to leave ultimate responsibility for it with the developers, they should at least make sure that the IT security team within their organization is consulted as early as possible in the development process."

Gain insight into the latest threats and emerging best practices for managing them. Attend the Security Track at Interop Las Vegas, May 2-6. Register now!

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-14
JIZHICMS 1.5.1 allows admin.php/Admin/adminadd.html CSRF to add an administrator.
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
PUBLISHED: 2019-10-14
A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to...
PUBLISHED: 2019-10-14
The csv-parse module before 4.4.6 for Node.js is vulnerable to Regular Expression Denial of Service. The __isInt() function contains a malformed regular expression that processes large crafted input very slowly. This is triggered when using the cast option.