Security of APIs — Shifting Left

Rohit Ranjan
3 min readJun 17, 2023

--

API Security

API security program refers to the process of monitoring and managing the security posture of APIs. It involves identifying potential vulnerabilities and misconfigurations that could be exploited by attackers, and taking the necessary steps to remediate them. API security program also helps organizations classify sensitive data and ensure that it’s compliant with the leading data compliance regulations such as GDPR, HIPAA, and PCI DSS. There are two types of Security namely Reactive & Proactive.

Reactive: This approach works for an already existing set of APIs i.e Post-Development and involves several key steps starting with:

  1. Discovery: The first step is to identify all APIs in use within an organization. This can be done using automated tools or through manual inventory.
  2. Assessment: Once APIs have been identified, they need to be assessed for potential vulnerabilities and misconfigurations. This can be done using tools that scan APIs for known vulnerabilities or by conducting manual penetration testing.
  3. Remediation: Any vulnerabilities or misconfigurations that are identified need to be remediated. This may involve applying patches, reconfiguring APIs, or implementing additional security controls.
  4. Monitoring: Finally, APIs need to be continuously monitored to ensure that they remain secure. This may involve implementing intrusion detection systems, log analysis, or other monitoring tools.

Proactive: This type focuses on Security of APIs in developmental stages i.e Pre-Development. Here are some best practices that can help improve your API security posture:

1. Use Secure Authentication and Authorization Mechanisms:

Authentication and authorization mechanisms are essential components of API security. They help ensure that only authorized users can access the API and perform specific actions. It is essential to use secure authentication and authorization mechanisms, such as OAuth 2.0 or OpenID Connect, to protect your APIs from unauthorized access.

2. Implement Role-Based Access Control:

Role-based access control (RBAC) is a security model that restricts access to resources based on the user’s role. RBAC can help prevent unauthorized access to sensitive data by limiting access to only those users who need it to perform their job functions.

3. Use SSL/TLS Encryption:

SSL/TLS encryption is a security protocol that encrypts data transmitted between the client and the server. It helps prevent eavesdropping and ensures that data is transmitted securely. It is essential to use SSL/TLS encryption to protect your APIs from man-in-the-middle attacks. Latest version is TLS 1.2/1.3 which is recommended over TLS 1.0/1.1

4. Implement Rate Limiting:

Rate limiting is a technique that restricts the number of API requests that can be made within a specific time frame. It can help prevent API abuse and ensure that the API is available to all users. Implementing rate limiting can also help protect your APIs from denial-of-service (DoS) attacks. Rate limiting threshold depends on case to case basis and is custom tailored as per organizational needs.

5. Monitor and Log API Activity:

Monitoring and logging API activity can help detect suspicious activity and potential security breaches. It is essential to monitor API activity in real-time and log all API requests and responses. This can help identify security incidents and enable you to take appropriate action.

6. Conduct Regular API Security Audits:

Regular API security audits can help identify vulnerabilities and misconfigurations that may have been missed during the initial implementation. It is essential to conduct regular security audits to ensure that your APIs are secure and compliant with industry standards.

OWASP TOP 10 API Security: OWASP is de facto baseline for Application Security and it’s an unwritten rule to abide by in software development. Current list of OWASP TOP 10–2023 is as shown below:

  • Broken Object Level Authorization
  • Broken Authentication
  • Broken Object Property Level Authorization
  • Unrestricted Resource Consumption
  • Broken Function Level Authorization
  • Unrestricted Access to Sensitive Business Flows
  • Server Side Request Forgery
  • Security Misconfiguration
  • Improper Inventory Management
  • Unsafe Consumption of APIs

Reference: https://owasp.org/API-Security/editions/2023/en/0x11-t10/

Final Thought!

In today’s world, APIs are the most critical component of a software and with ever increasing use of APIs, the risk of security breaches has also increased. However, implementation of API Security program can greatly improve overall security posture and protect the organization from threats. Best practices outlined in this article above can reduce risk of security breaches and can ensure security of APIs as well compliance with industry & government standards.

--

--