{"id":49448,"date":"2022-11-03T10:10:03","date_gmt":"2022-11-03T14:10:03","guid":{"rendered":"https:\/\/sdtimes.com\/?p=49448"},"modified":"2022-11-14T12:10:30","modified_gmt":"2022-11-14T17:10:30","slug":"cloud-native-success-requires-api-security","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/","title":{"rendered":"Cloud-native success requires API security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The complexity of modern cloud-native applications, which often leverage microservices, containers, APIs, infrastructure-as-code and more to enable speed in app development and deployment, can create security headaches for organizations that fail to put practices in place to mitigate vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With dependencies on databases and third-party APIs, and sensitive information and secrets such as certificates and passwords exposed, organizations need to have a mechanism<\/span><\/p>\n<p><span style=\"font-weight: 400;\">to track and catalog all the APIs used in their environment. They need visibility into all the inbound and outbound traffic, most importantly, to ensure the mutual communication channels are kept safe and that APIs are properly authenticated.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Proper upfront design and planning of APIs is crucial to help ensure any event-driven APIs are secured and that there is\u00a0<\/span><span style=\"font-weight: 400;\">proper handling of all secrets and sensitive data that gets transmitted in the process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To begin to properly secure cloud-native applications, it is necessary to have a full understanding of the interfaces that are being exposed, Kimm Yeo, who works in application security at Synopsys, wrote in a recent blog post. &#8220;Organizations with internally developed cloud-native applications faced a variety of security incidents in recent years, with the leading causes being insecure use of APIs, vulnerable source codes and compromised account credentials,&#8221; she wrote.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is the expanded use of APIs in today&#8217;s applications that create the biggest security challenges. In a report, Gartner found that 90% of a web application&#8217;s attack surface area are APIs, and that in 2022, APIs would be the most frequent attack vector.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;<\/span><span style=\"font-weight: 400;\">Effective <\/span><a href=\"https:\/\/www.synopsys.com\/glossary\/what-is-api-security-testing.html\"><span style=\"font-weight: 400;\">API security<\/span><\/a><span style=\"font-weight: 400;\"> can\u2019t be done by merely protecting and blocking vulnerable APIs with some web firewalls and monitoring tools,&#8221; Yeo wrote in a recent blog post. &#8220;API-based apps need to be treated and managed as a complete development life cycle of their own. Just as the software app development life cycle goes through upfront planning and design, so must the API life cycle. There needs to be proper API design with API policies built into an organization\u2019s overall business risk and continuity program.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yeo points out that traditional application security scanning tools were not designed for cloud-native applications, and lack visibility into modern application development and deployment architectures. This is because, she wrote, that &#8220;most API and serverless function calls are event-driven triggers\u2026&#8221;\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In her blog, Yeo states that organizations need to view and treat APIs holistically as a life cycle development and deployment framework of its own \u2013 like how they look at application development as a life cycle. This would entail up-front design and planning, as well as policies around API management to ensure vulnerabilities are kept to a minimum.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Further, she encourages organizations to do risk assessments of all API-based applications, with the goal of focusing on those apps with the highest risk factors.<\/span> <span style=\"font-weight: 400;\">She wrote that effective API security practices require continuous testing to verify vulnerable APIs during application tests at runtime compilation with third-party components.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Beyond all that, the use of modern scanning tools and techniques can further ensure that any vulnerabilities can be addressed (or the risk mitigated) before the apps are deployed. SCA, SAST,\u00a0 and DAST tools \u2013 which have been more commonly used as app security test practices \u2013 and now, more frequently, IAST tools can provide insights to where those security holes are, so they can be fixed before the application is released, when it is less expensive to remediate and can do less damage to the organization&#8217;s business and reputation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;This,&#8221; Yeo wrote, &#8220;is the key essence of effective API security strategy in my opinion.\u00a0 An organization needs the ability to quickly identify and proactively test and remediate the apps with highest risk (as defined by its security policies and API risk classifications) before they go into production release. An API risk classification system can use criteria such as the application\u2019s exposure (internal- or external-facing apps), the types of information it handles (such as PII\/ PCI-DSS payment related), the record size that the app manages (which can get into thousands and millions), and the cost of data breaches, disaster recovery, and business continuity impact.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><em>Content provided by SD Times and Synopsy<\/em>s.<\/span><\/p>\n<p>&nbsp;<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>The complexity of modern cloud-native applications, which often leverage microservices, containers, APIs, infrastructure-as-code and more to enable speed in app development and deployment, can create security headaches for organizations that fail to put practices in place to mitigate vulnerabilities. With dependencies on databases and third-party APIs, and sensitive information and secrets such as certificates and  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":804,"featured_media":49449,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1,11110],"tags":[10716,8570],"coauthors":[13640],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud-native success requires API security - SD Times<\/title>\n<meta name=\"description\" content=\"To begin to properly secure cloud-native applications, it is necessary to have a full understanding of the interfaces that are being exposed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud-native success requires API security - SD Times\" \/>\n<meta property=\"og:description\" content=\"To begin to properly secure cloud-native applications, it is necessary to have a full understanding of the interfaces that are being exposed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-03T14:10:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-14T17:10:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"704\" \/>\n\t<meta property=\"og:image:height\" content=\"528\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SD Times\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SD Times\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/\"},\"author\":{\"name\":\"SD Times\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/e0f273b980b8e16bc8d40ac339edafc6\"},\"headline\":\"Cloud-native success requires API security\",\"datePublished\":\"2022-11-03T14:10:03+00:00\",\"dateModified\":\"2022-11-14T17:10:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/\"},\"wordCount\":686,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg\",\"keywords\":[\"cloud native\",\"Synopsys\"],\"articleSection\":[\"Latest News\",\"Sponsored\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/\",\"url\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/\",\"name\":\"Cloud-native success requires API security - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg\",\"datePublished\":\"2022-11-03T14:10:03+00:00\",\"dateModified\":\"2022-11-14T17:10:30+00:00\",\"description\":\"To begin to properly secure cloud-native applications, it is necessary to have a full understanding of the interfaces that are being exposed.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg\",\"width\":704,\"height\":528},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud-native success requires API security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/e0f273b980b8e16bc8d40ac339edafc6\",\"name\":\"SD Times\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/12a3751daacf16712c32bd81bc5a3040\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b13d7778dc0e9a25bd7775c197be5132?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b13d7778dc0e9a25bd7775c197be5132?s=96&d=mm&r=g\",\"caption\":\"SD Times\"},\"url\":\"https:\/\/sdtimes.com\/author\/sd-times-staff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud-native success requires API security - SD Times","description":"To begin to properly secure cloud-native applications, it is necessary to have a full understanding of the interfaces that are being exposed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/","og_locale":"en_US","og_type":"article","og_title":"Cloud-native success requires API security - SD Times","og_description":"To begin to properly secure cloud-native applications, it is necessary to have a full understanding of the interfaces that are being exposed.","og_url":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2022-11-03T14:10:03+00:00","article_modified_time":"2022-11-14T17:10:30+00:00","og_image":[{"width":704,"height":528,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg","type":"image\/jpeg"}],"author":"SD Times","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"SD Times","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/"},"author":{"name":"SD Times","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/e0f273b980b8e16bc8d40ac339edafc6"},"headline":"Cloud-native success requires API security","datePublished":"2022-11-03T14:10:03+00:00","dateModified":"2022-11-14T17:10:30+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/"},"wordCount":686,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg","keywords":["cloud native","Synopsys"],"articleSection":["Latest News","Sponsored"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/","url":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/","name":"Cloud-native success requires API security - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg","datePublished":"2022-11-03T14:10:03+00:00","dateModified":"2022-11-14T17:10:30+00:00","description":"To begin to properly secure cloud-native applications, it is necessary to have a full understanding of the interfaces that are being exposed.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2022\/11\/Screen-Shot-2022-11-03-at-9.41.21-AM.jpg","width":704,"height":528},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/api\/cloud-native-success-requires-api-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"Cloud-native success requires API security"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/e0f273b980b8e16bc8d40ac339edafc6","name":"SD Times","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/12a3751daacf16712c32bd81bc5a3040","url":"https:\/\/secure.gravatar.com\/avatar\/b13d7778dc0e9a25bd7775c197be5132?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b13d7778dc0e9a25bd7775c197be5132?s=96&d=mm&r=g","caption":"SD Times"},"url":"https:\/\/sdtimes.com\/author\/sd-times-staff\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/49448"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/804"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=49448"}],"version-history":[{"count":1,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/49448\/revisions"}],"predecessor-version":[{"id":49450,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/49448\/revisions\/49450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/49449"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=49448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=49448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=49448"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=49448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}