{"id":9693,"date":"2020-10-25T20:03:31","date_gmt":"2020-10-25T20:03:31","guid":{"rendered":"https:\/\/staging-site.42crunch.com\/?p=9693"},"modified":"2023-02-28T11:17:26","modified_gmt":"2023-02-28T11:17:26","slug":"knowing-api-security-is-the-best-choice","status":"publish","type":"post","link":"https:\/\/staging2022.42crunch.com\/knowing-api-security-is-the-best-choice\/","title":{"rendered":"Why knowing is better than guessing for API Threat Protection"},"content":{"rendered":"

Why do we need different solutions for API Threat protection?<\/h2>\n

APIs are becoming a hot target for hackers. Analysts and cyber security specialists agree that the privileged position of APIs as the open doors to the enterprise kingdom make them a favorite to breach.<\/p>\n

For the past 20 years, Web Application Firewalls (WAFs ) have dominated the Application Security market. Such products became a must if you wanted to achieve PCI-DSS compliance for example. How do firewalls work? Much like anti-viruses, they need signatures to recognize and block attacks. You need to constantly feed them rules, and having to manually design and deploy such rules has always been one of the main complaints against WAFs.<\/p>\n

WAFs traditionally work with negative rules, built to recognize the traffic you want to block. It is technically possible to write positive rules of course, and as we explained in this post,<\/a> while positive rules are universally recognized as more powerful, they are also much more difficult to maintain.<\/p>\n

Fast forward 20 years and all applications are now based on APIs. What does that imply for WAFs? Nothing good.<\/p>\n

In an article from Dark Reading<\/a> dated July 2020, Ericka Chickowski mentioned that “organizations are particularly struggling as their current WAF deployments are unable to handle a broader range of application attacks, particularly client-side attacks, API-based attacks, and bot-driven attacks.”.<\/p>\n

Why are APIs different?<\/h4>\n

APIs have totally changed our applications architectures, pushing business logic on the client side and removing the controller layer<\/a>. Furthermore:<\/p>\n