Subscribe to our blog.

Subscribe Now

The Top 5 Myths in API Security

Jennifer Dignum
Apr 12, 2022

CISOs know technology change is constant and never-ending – just like taxes. In Benjamin Franklin’s famous saying, “Nothing is certain but death and taxes,” he overlooked this third truth. In fact, if you look back in history, technology began its evolution well before taxes. The wheel was invented around 4th millennium BC, whereas organized taxes didn’t show up until about a thousand years later.

Like taxes, technology change can cause FUD – fear, uncertainty, and doubt. CISOs realize that if they don’t keep up with technology advancements, they place the organization at risk. With the growth of APIs, the attack surface has expanded – and so has  API attack traffic.

According to the latest Salt Labs State of API Security report, 95% of organizations have experienced an API security incident in the past 12 months. In addition, numerous companies have suffered public API incidents over the past year, including Facebook, Experian, Starbucks, and Peloton. Clearly, the current crop of application security techniques are not sufficient when it comes to protecting APIs from breaches.

To correct this situation, security leaders must take a close look at how they are currently thinking about API security. In our new and complimentary White Paper, Salt Security describes and analyzes the top misconceptions that we’ve found people often have about their API security. The paper answers questions, such as:

  • Why can’t zero trust architecture protect my APIs?
  • Do my cloud service provider’s security offerings protect my APIs?
  • What are the API security pitfalls to be aware of with WAFs and API gateways?
  • Can workload protection secure APIs?
  • How much security do developers build into APIs?

Learn top API security misconceptions that might be putting your critical data and services at risk.

Why can’t zero trust architecture protect my APIs?

APIs need access to function, but the goal of zero trust is to restrict access. Zero trust breaks down when applied to APIs because they are designed to be consumed by the broader internet and a large customer base. Moreover, while many zero trust network access (ZTNA) offerings use 2FA to authenticate before allowing access, that technique doesn’t work for controlling direct API communication.

Do my cloud service provider’s security offerings protect my APIs?

Even though some cloud providers offer tools like API management and API gateways, these point products don’t deliver the level of protection that enterprises need for APIs. With limited API security capabilities at the application and API layer, your APIs are underprotected if you only rely on cloud provider tools. Also, did you know? Because APIs are application logic, cloud customers hold the ultimate responsibility for protecting them within the shared responsibility model for security.

What are the API security pitfalls to be aware of with WAFs and API gateways?

WAFs and API gateways were not designed to provide the visibility and gateway security controls that are needed to protect APIs. WAFs and API gateways are simply unable to detect certain malicious behaviors, for example, when attackers bypass access controls or harvest keys and tokens. They also can’t detect many API-specific problems such as business logic abuse and authorization exploits.

Can workload protection secure APIs?

Workload security solutions help provide infrastructure security to ensure you aren’t running workloads on a vulnerable software version. They can also block access to a workload from external users. However, they don’t provide API or application-level context, so cannot provide visibility into your APIs.

How much security do developers build into APIs?

Be aware that shift-left support doesn’t mean that security will be baked into every API by your development groups. Developer testing tools, while valuable, can’t identify all vulnerabilities. There are many security issues that can’t be spotted as part of automated design, development, and build scans with common security analysis and testing tools – the APIs need to be exercised to spot business logic flaws.

Internal digitalization initiatives, mobile applications, and web-based services all contribute to the increased usage of APIs. The way companies could protect a handful of APIs in the past doesn’t work when you are rapidly building dozens or hundreds of APIs.

You never know. Maybe someday, taxes won’t be a certainty, but technology will certainly continue to evolve and progress.

Salt Security pioneered the industry’s first patented solution to prevent the next generation of API attacks, using machine learning and AI to automatically and continuously identify and protect APIs. If you’d like to learn how we can help you to secure your organization’s critical APIs, we invite you to a personalized demo of the award-winning Salt Security API Protection Platform.

Go back to blog

Download this guide for advice on evaluating key capabilities in API Security

Learn everything you need to know to keep your APIs secure

We have updated and re-designed our Privacy Policy as of  March 2024 to make it easier to understand how we collect and use your personal data.

Get the guide
Read the new policy
Back