Building a cutting edge API security methodology: A five-section series — Overview
The remote code execution (RCE) flaw was not an API (API) vulnerability however, it was an autobinding security flaw of the kind that could be easily applied to APIs. It was able to trick to trick the Tomcat logger into creating an entirely brand new JSP file that could perform whatever attackers wanted it to: All they needed to do was open it.
Spring4Shell
is significant since the flaw was not their blame. Spring -- an
open-source application framework, which provides the infrastructure needed to
develop Java application -- was protected by a solid security plan in
place. Also, the programmers who wrote the code. It was merely an
interaction between components that led to the issue to become that serious.
Spring4Shell
is a good example of how to secure APIs is quite different than securing
apps. Although APIs are equally vulnerable to hacking as traditional web
applications However, many people are shocked to discover that securing
APIs isn't
as simple as the security of applications. You might think the security tools
we have today are suitable for APIs however they're not. Static Analysis
Security Testing (SAST) and Dynamic Analysis Security Testing (DAST) -- in
which scanners don't have visibility into the exact nature of what they're
examining -- were developed for web-based applications in the beginning of
2000, and haven't been updated much since then.
Spring4Shell
is only one instance of the reason API security demands a more modern approach
which integrates instrumentation into insides of the code to study the behavior
of every component, including all the libraries, as well as the API server, and
the platforms. When you think of the security of APIs you must be aware
of the problems that can arise from all these sources, including libraries,
code, platforms, frameworks, or interactions between the various parts.
The five components of API security. API security
API
security is the five areas listed below. This series will dig into each of
them each weekstarting next weekto illustrate how a modernand integrated API
security platform can do what traditional API security or application security
cannot do, namely, protect APIs from the inside out.
- API
inventory: It's impossible to be sure of what you don't. You require
an inventory process.
- Testing
API security: You have the ability to create code that is secure which
means identifying undiscovered weaknesses that exist in microservices,
APIs, and functions. The Top 10 OWASP security vulnerabilities are
as relevant to APIs as they are with traditional web applications.
- Components:
You need to ensure the security of your supply chain by finding
vulnerabilities in third-party libraries, frameworks , and services.
- API
security: In order to ensure the security of production, you must find out
if there are attacks or probes that target both unknown and known
vulnerabilities and avoid attacks.
- API
access: Secure authentication and authorization of processes at an API
level, as well as in the data layer is essential.
Stay
tuned: next week, we'll take a look into API inventory and the reason why
Contrast concentrates on inventory at runtime. What we mean by this is why
bother with uninvoked dead-weight code riding along with your binaries?
Be
sure to read this
conversation among
Jeff Williams, Co-Founder & CTO, Contrast Security, and Melinda Marks,
Senior Analyst, ESG Research, where they talk about:
- What does
the direction of API security is for businesses.
- What do
you need to be aware of to protect your APIs.
- Strategies
to keep in the forefront of the CD/CI game.
- The way
forward is to build unifying security and developer teams which can create
secure APIs.
DIGITAL
DEVICES LTD
Long before Apple set an average consumers
mindset to replacing their handheld gadgets in two years, Digital Devices
Ltd believed in Moore's law that computing will double every two years.
With our heritage from the days of IBM Personal Computer XT, our founders have
gone through the technology advancements of the 1990s and 2000s realizing that
technology is an instrumental part of any business's success. With such a fast
pace industry, an IT department can never be equipped with the tools and
training needed to maintain their competitive edge. Hence, Digital Devices has put together a team of engineers and
vendor partners to keep up with the latest industry trends and recommend
clients on various solutions and options available to them. From forming close
relationships with networking and storage vendors like Juniper, SolarWinds and
VMWare to high-performance computing by HPE or AWS Cloud solutions, Digital
Devices Limited offers the latest technology
solutions to fit the ever-growing needs of the industry.
Our
experts can guide you through the specifications and build cost efficiencies
while providing high end, state-of-the-art customer services. We research and
analyses market and its current demand and supply chain by offering wide range
of bulk supplies of products like AKG C414 XLII, Shireen Cables
DC-1021, Shireen Cables DC-2021, Dell p2419h monitor,
Dell U2419H, Dell P2719H, Dell P2219H, Lenovo 62A9GAT1UK, LG 65UH5F-H
and Complete IT Infrastructure products and services.
Comments
Post a Comment