{"id":3478,"date":"2017-07-25T13:50:53","date_gmt":"2017-07-25T12:50:53","guid":{"rendered":"https:\/\/staging-site.42crunch.com\/?p=3478"},"modified":"2022-11-24T10:23:33","modified_gmt":"2022-11-24T10:23:33","slug":"act-on-api-security","status":"publish","type":"post","link":"https:\/\/staging2022.42crunch.com\/act-on-api-security\/","title":{"rendered":"Start acting on API Security today!"},"content":{"rendered":"

APIs are the access doors to your enterprise assets and the backbone of pretty much any application that has been written in recent years. While most companies apply token-based access to APIs with OpenIDConnect and OAuth, there are still many aspects of security which are not properly covered for APIs such as common injection attacks, keys and certificates secured storage, fine-grain access to resources, non-repudiation, or simply message encryption. Also, security is often a last minute thought in the API development process.<\/p>\n

To properly protect those access doors, enterprises need to invest in tools and processes that put security at the heart of APIs development, testing and deployment. You can start by:<\/p>\n

    \n
  1. Educating personnel on security risks: everybody should know about the\u00a0top 10 OWASP risks<\/a>\u00a0list and how to address them. OWASP offers countermeasures you can apply to protect your assets. It’s worth noting that Unprotected APIs<\/strong> have recently been added to the OWASP threats list!<\/a><\/li>\n
  2. Deploying code analyses tools (static\/dynamic) and hook them to the CI\/CD pipeline.<\/li>\n
  3. Actively scanning APIs for vulnerabilities. Start with\u00a0ZAP<\/a>, an OWASP open source penetration testing tool which also plugs to the CI\/CD pipeline.<\/li>\n
  4. Making sure all apps and APIs are tested with security ON as early as possible – Don’t flip the security switch at the last minute and hope that the security teams catch all issues by some miracle.<\/li>\n
  5. Assessing the APIs risk and apply proper security policies, addressing authentication, authorization, data encryption, and auditing.<\/li>\n
  6. Testing deployments with tools such as\u00a0SSL Labs<\/a>\u00a0or\u00a0securityheaders.io<\/a>\u00a0and get the best grade!<\/li>\n
  7. Keeping systems up to date and keep an eye on all security fixes.<\/li>\n<\/ol>\n

    At\u00a042Crunch, we are working hard to make security policies much easier to define and apply to your APIs. We will also allow development, security and operations teams to collaborate throughout the API delivery lifecycle, to deliver an infrastructure and security policies optimized by API.<\/p>\n","protected":false},"excerpt":{"rendered":"

    APIs are the access doors to your enterprise assets and the backbone of pretty much any application that has been written in recent years. While most companies apply token-based access to APIs with OpenIDConnect and OAuth, there are still many aspects of security which are not properly covered for APIs such as common injection attacks, […]<\/p>\n","protected":false},"author":11,"featured_media":11351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Learn how to start securing your APIs ","_seopress_titles_desc":"Enterprises need to invest in tools and processes that put security at the heart of APIs development, testing and deployment. Start by...","_seopress_robots_index":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"disabled","ast-hfb-above-header-display":"disabled","ast-hfb-below-header-display":"disabled","ast-hfb-mobile-header-display":"disabled","site-post-title":"disabled","ast-breadcrumbs-content":"disabled","ast-featured-img":"disabled","footer-sml-layout":"disabled","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6],"tags":[14,16,25],"class_list":["post-3478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-api-security","tag-api-security-training","tag-api-testing"],"_links":{"self":[{"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/posts\/3478"}],"collection":[{"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/comments?post=3478"}],"version-history":[{"count":0,"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/posts\/3478\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/media\/11351"}],"wp:attachment":[{"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/media?parent=3478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/categories?post=3478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging2022.42crunch.com\/wp-json\/wp\/v2\/tags?post=3478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}