{"id":18544,"date":"2024-04-10T17:33:33","date_gmt":"2024-04-10T16:33:33","guid":{"rendered":"https:\/\/staging2022.42crunch.com\/?p=18544"},"modified":"2024-04-10T21:49:18","modified_gmt":"2024-04-10T20:49:18","slug":"addressing-api-security-regulations-in-financial-services","status":"publish","type":"post","link":"https:\/\/staging2022.42crunch.com\/addressing-api-security-regulations-in-financial-services\/","title":{"rendered":"Addressing API Security Regulations in Financial Services"},"content":{"rendered":"
APIs are disrupting almost every industry vertical, and nowhere is their impact more profound than in the financial services industry. Whether helping modernize legacy systems or creating entirely new business opportunities through innovations such as OpenBanking, APIs are the lifeblood of the financial services industry. At the same time, there is increasing scrutiny on the security of these very APIs to ensure that they both meet the requirements of strict regulatory standards (such as PSD2 and PCI-DSS) and instil confidence within their customers.\u00a0<\/span><\/p>\n OpenBanking depends on APIs to connect banking systems, customer devices, and third-party providers (TPPs). OpenBanking allows TTPs to provide innovative services, access account information, and initiate payments on the account holder\u2019s behalf. It is becoming widely adopted, with one in nine people in the U.K. using associated services in 2023 and a doubling in the volume of payments in that period. Due to the sensitive nature of the data and operations processed by OpenBanking APIs, providers must ensure they are implemented securely to meet regulatory requirements and customer demands.\u00a0<\/span><\/p>\n The overarching regulatory standard to ensure secure APIs is the European Union (EU) Payment Services Directive (PSD2), which has specific requirements for the following:<\/span><\/p>\n The <\/span>Payment Card Industry Data Security Standard <\/span><\/a>(PCI-DSS) version 4.0 also has specific mandates relating to software security, which providers should be aware of. Section 6.2.4 requires providers to implement automated application vulnerability security testing of public-facing web applications, APIs, and internal components. Typically, these requirements can be met by incorporating various software engineering techniques, such as secure design or static code analysis \u2014 in general, a shift-left approach is recommended. Section 6.2.3 recommends implementing a secure code review process that is well suited to an API design-first approach since reviews can be conducted on API definitions to ensure they comply with the OpenAPI Specification (OAS) and implement security best practices. Of specific interest to API providers is the new section 6.4.2, which requires affected businesses to <\/span><\/p>\n “Deploy an automated technical solution for public-facing web applications that continually detects and prevents web-based attacks.”<\/p><\/blockquote>\n The technical requirements mandate that such a device be placed in front of public-facing interfaces or applications, be active and capable of either directly blocking web-based attacks or generating alerts that are immediately investigated.\u00a0\u00a0<\/span><\/p>\n 42Crunch works with many leading financial institutions providing and consuming APIs and we acknowledge that these requirements may initially seem daunting. Let us break them down to see how to address them.\u00a0<\/span><\/p>\n To address the requirements of OpenAPI \/ PSD2, begin with the following:<\/span><\/p>\n 42Crunch provides a range of solutions across the SDLC that address many of these requirements. PCI-DSS sections 6.2.3 and 6.2.4 mandate the use of tooling to address design issues early in the development lifecycle, and here, the <\/span>42Crunch API Audit<\/span><\/a> product can address design issues in the earliest development stage, namely the API definition. The 42Crunch API Scan product is able to assess the API implementation as the developer builds the API in their IDE or anywhere further down the pipeline. The API Scan validates the API implementation against the definition and is able to detect deviations in a continuous manner with low false positives. This Audit and Scan combination can also address the needs of OpenAPI\/PSD2 by enforcing well-documented APIs (via the OpenAPI definition) and a regimen of continuous testing across the lifecycle.<\/span><\/p>\n\n
Mandate For Automated API Security Testing<\/span><\/h2>\n
\n
How to Automate API Security\u00a0<\/span><\/h2>\n