top of page
  • Writer's pictureRyan Siu

Establishing a Mature API Security Strategy

In order for your APIs to meet the long-term needs of your consumers, it is important for them to be built with sustainability in mind, which ultimately translates to a well-defined strategy for preparing their delivery. Companies sometimes skip to the operational phase of the API cycle without planning key details as to how consumers will integrate those APIs and, where relevant, build applications and user interfaces.


Brevity of an API security strategy can lead to an organisation wasting time and resources when making decisions on which security controls to implement for their APIs. It is therefore important to ensure your strategy is defined a good level of depth. You should also work closely with your developers when defining this strategy, as it will be important for you to understand the motivators for your developers and the necessary actions you must take to get buy-in from them to support your AppSec initiatives.


Key Areas To Consider In Your API Security Strategy

  1. Information Privacy In concert with other stakeholders outside of your development teams, it is important to perform information privacy reviews of the information accessible through your APIs. These reviews should include quantifying the privacy breach impact on your organisation. The outcomes of this review should drive any future decisions relating to the security controls you place around your APIs.

  2. Authentication and Authorisation Adopting the right authentication and authorisation models will depend on the nature of your API set. You need to define whether your APIs need to be accessed by an authenticated or unauthenticated API consumer. Given the variety of authorisation models available today, from traditional models such as Basic and Digest auth to modern models including OAuth and AWS Signatures, you should research and ensure the type of authorisation implemented is suitable for the intended usage of your APIs. For example, you should consider the sensitivity of data your API provides access to, and the types of privileged actions your API can perform.

  3. Access Controls Defining security and access policies, that will be implemented later in the API cycle, are critical steps to the longevity of your API security presence. By formalising developer personas in your organisation, you will be able to define the corresponding level of access for each persona in your strategy.

  4. Securing API Network Traffic As part of the threat models you create, it is likely that you will identify use cases for ensuring the availability and robustness of API traffic between your API endpoints and consumers. Depending on the nature of your API endpoints, it may be necessary to enforce quotas or rate-limits to restrict the frequency at which your endpoints can be accessed. In connection with your developer personas and the priority of specific API endpoints, particularly when scalability is a requirement for the API, a tailored quota and rate-limiting ruleset may need to be applied. This would ensure access is granted to the right developers and API consumers. In order to gauge which API endpoints are utilised more than others, it is necessary to capture API usage data, including patterns, responsiveness and performance – it is important to choose an appropriate API monitoring method that does not negatively influence API performance beyond a threshold that you deem acceptable.

  5. Layered Security Controls In alignment with a larger overarching DevSecOps capability, it is important to plan layered security controls across your development cycles. These should include API threat modeling, security testing, prevention, detection, response and improvement.

  6. Security Testing API security testing, which is linked to the reliability of the API, should be planned in alignment with meeting your consumers’ needs. The inherent advantage of a loosely coupled, isolated and cohesive API is the ease of performing testing, including security testing, on the API; compared to the increased difficulty of comprehensively testing the web application that the API likely supports. To propagate a tailored security outlook for each API set, it is important for your developers to test APIs as products, as opposed to isolated projects. If your security testing does not take into account the unique product context and only tests each API set separately, it is likely for security vulnerabilities to fly under the radar as a result of generic security testing that is not enriched by high-value security test cases.

  7. API Documentation In many commercial environments, particularly for technology organisations with aggressive growth plans, poor visibility of APIs can potentially result in serious security challenges. In order to minimise long-term cyber risk posed by shadow APIs, we recommend you register all your APIs to your API management platform or populate them in an API catalogue. To drive adoption of your APIs, by your developers as well as your wider community of practice, your strategy should mandate a structure for documenting APIs that is enforced across all your development teams. This will assist you in satisfying the requirement of your API being easily maintainable and providing the necessary foundations for your developers to use them productively. By defining an effective API security strategy with the direction provided in this article, you will be well-positioned to design, implement and manage your APIs long-term in a manner that minimises cyber risk being introduced into your digital ecosystem.

3 views0 comments

Recent Posts

See All

Using an API Mediation Layer to Improve API Security

A pragmatic approach for secure API development begins at the root of the journey, which is design. API design should dictate the architectural choices that in turn drive the API service implementatio

Wilbourne
Contact Us

+44 (0) 203 668 2258

Follow Us
Wilbourne bird
  • LinkedIn
  • Twitter
  • Facebook
Cyber Scheme logo
image.png
IASME logo
Certifications

© Copyright Wilbourne LTD 2024. All rights reserved

bottom of page