Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

01:30 PM
Connect Directly

Insecure APIs a Growing Risk for Organizations

Security models for application programming interfaces haven't kept pace with requirements of a non-perimeter world, Forrester says.

Application programming interfaces (API) that connect enterprise applications and data to the Internet are subject to the same vulnerabilities as regular web applications and need to be addressed with at least the same rigor.

In fact, the direct external access to transaction updates and mass data that APIs enable subject them to additional threats that web applications rarely encounter, according to Forrester Research.

Related Content:

Why You Need to Think About API Security

The Changing Face of Threat Intelligence

New on The Edge: Bug Bounty Hunters' Pro Tips on Chasing Vulns & Money

In a report summarizing some of the major security issues surrounding API use, the analyst firm warned about API breaches becoming increasingly common and the next big attack vector for threat actors.

"As organizations are securing their web applications, they can't forget about their APIs," says Forrester analyst Sandy Carielli. "Security pros must specifically build in API security and not assume that it's rolled into their existing web application protections."

An API basically allows applications or components of applications to communicate with each other over the Internet or a private network. Initially, most organizations used them within a secure private network or accessed them through secure communications channels. But, increasingly, organizations have begun using APIs to open up access to internal applications and data to partners, suppliers, customers, and others. Many see APIs as fundamental to enabling digital transformation initiatives and powering a new generation of mobile applications.

A survey of 1,500 developers, architects, QA professionals, and others conducted earlier this year by SmartBear found 77% of organizations represented in the survey both develop and consume APIs. The most common use case for APIs continues to be interoperation between internal tools, teams, and systems and reducing development time and cost. Other popular use cases include partnering with external organization, extending product or service functionality, and absorbing data and features from external products.

According to Forrester, many of the security issues surrounding APIs have been years in the making and have to do with the shift away from early SOAP messaging protocol-based APIs to today's REST APIs.

Previously, SOAP APIs were typically accessed securely over VPNs or two-way encrypted connections. REST APIs, on the other hand, are designed for access through browsers and mobile apps. When a mobile user makes an airline reservation on his phone, for instance, a REST API conveys the user's instructions to the airline or travel services vendor's back-end applications and delivers the response back to the user.

REST APIs are open for exploitation through commonly available client-side inspection and hacking tools, just like web applications are unless protected. Long-held security best practices such as least-privilege data access and server-side data validation are therefore as critical to APIs as they are to web applications, Forrester says.

The tools for exploiting APIs are not complicated, Carielli says.

"Basic proxies that attackers use to manipulate HTTP and HTTPS requests would apply here, too," she says. "Sometimes it's as simple as changing a parameter in the HTTP request."

Rogue Endpoints
Additionally, REST APIs can provide direct access to transaction updates and other important data on back-end systems. That's because firms can often fail to track all API endpoints buried deep within their mobile apps or web apps or put adequate controls in place to authenticate and verify API calls. Such rogue endpoints can put them at heightened risk of unauthorized access and data exposure, Forrester says.

Carielli says if a publicly accessible API doesn't go through the organization's API authentication and authorization gateway or through a web application firewall that might validate the request format, then an external party might have access to any data to which the API has access.

"Remember that APIs serve to make various application data and functionality available to developers outside of the organization," Carielli says. "Because API endpoints can be accessible to anyone externally that calls the API, a rogue endpoint that returns sensitive information is high risk."  

One common result of unauthenticated API endpoints is that customer data gets exposed. For example, if an API to access customer transaction data is accidentally deployed without putting in the proper authentication and authorization checks, anyone who used the API could see a lot of sensitive customer information, Carielli says.

The sheer diversity of technologies, designs, and contexts in which APIs are used makes securing them a challenge, Forrester said in its report. The analyst firm outlined several measures that organizations can take to bolster API security.

For instance, in developing APIs, organizations need to pay attention in the design stage to security measures like default deny and verification of any client-supplied data. Organizations should ensure that all API traffic, just like web application traffic, is encrypted but in a manner so as not to impact performance. Also critical is the need to authenticate API calls at every layer and to stop thinking of APIs merely as an interface layer between applications, Forrester said.

"Whether the API ultimately touches data, legacy, or modern application architectures, or even hardware or firmware, work through those touch points collaboratively with the security owners of the relevant systems," the analyst firm advised.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Sander Vinberg
Sander Vinberg,
User Rank: Author
11/10/2020 | 2:26:24 PM
Pending Review
This comment is waiting for review by our moderators.
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-26
ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
PUBLISHED: 2020-11-26
slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
PUBLISHED: 2020-11-26
Cloudera Data Engineering (CDE) before 1.1 was vulnerable to a CSRF attack.
PUBLISHED: 2020-11-26
An issue was discovered in BigBlueButton through 2.2.29. A brute-force attack may occur because an unlimited number of codes can be entered for a meeting that is protected by an access code.
PUBLISHED: 2020-11-26
An issue was discovered in BigBlueButton through 2.2.29. When at attacker is able to view an account_activations/edit?token= URI, the attacker can create an approved user account associated with an email address that has an arbitrary domain name.