Whitepaper - Top 5 API Security Best Practices
Whitepaper - Top 5 API Security Best Practices
Executive Summary 03
Introduction 04
01 API Sprawl 05
02 API Standardization 06
02
02 API Governance: Rule Over Your Digital Estate 07
03 API Data Security: Dive a Step Deeper 08
04 API Discovery: Finding New Spaces 09
05 API Security Testing: Keep Everything Wrapped 09
03
IT teams have been faced with the call to secure their organization’s
digital estate while dealing with shrinking budgets. IT leaders
must balance the impossible task of ensuring every API is secure
without sacrificing time. And there is a lot at stake if security is not
taken seriously.
Customer trust is slow to build and quick to lose — one data breach
is all it takes to rattle even the most loyal customer. This means
employing a comprehensive API security strategy is necessary and
not a luxury for IT teams since your digital estate is only as secure as
©2022 M U L E S O F T — M U L E S O F T . C O M
04
bad actors love to take advantage of. digital estate are secure, which can be
time-consuming.
Organizations that do not prioritize
cybersecurity have a lot to lose for taking
a lax stance. While every company that
deals with customer information needs to As more individuals build
prioritize cybersecurity initiatives, certain automations and APIs,
finance and healthcare industries have the need for improved
even more at stake thanks to external API security increases.
regulations like HIPAA. Governments
have also taken a firm stance to create
customer protections, and violations of
these laws can incur hefty fines. And APIs are now acting as a launching
©2022 M U L E S O F T — M U L E S O F T . C O M
01 API Sprawl
05
As an organization’s digital estate grows, compounding number of APIs also needs
systems are often siloed from one another. to be secured, similar to any technical
To digitally transform, many organizations component of the digital estate.
quickly adopted APIs to open up data
This drastic increase has resulted in an
across the organization. Teams may have
API sprawl and less visibility of your API
also adopted pre-built or bespoke APIs
estate. The result is challenging to manage
from partners or vendors to share data and
and dramatically increases bad actors'
create engaging experiences. This required
opportunities to take advantage.
BY THE NUMBERS
©2022 M U L E S O F T — M U L E S O F T . C O M
Organizations have
will have more attack
90% 200%
seen a 200% increase
surface area in the
in the number of APIs
form of exposed APIs.
in the last 12 months.
of web apps Source: Gartner MQ more APIs Source: 451 Research API
Application Security Testing
Security Trends Survey
Quality issues across a 02 API Standardization
06
determine and enforce these standards.
Microservices
Multi-cloud Multiple
and modern
initiatives protocols
applications
©2022 M U L E S O F T — M U L E S O F T . C O M
07
delete your APIs?
Developers that create APIs are likely
02
familiar with authorization, essentially
API Governance: Rule Over
the controls implemented on who can
Your Digital Estate
access the data within an API. While this is
a foundational step towards API security, To implement an industry-leading API
additional measures are required. Best security strategy, organizations must
practices indicate that your organization establish a centralized governance model
should implement strict API access control to set the standards used when any
and ensure that layered protections APIs are developed. Ensuring uniformity
are in place. saves IT teams valuable time, rather than
requiring them to spend time on review
This strict control can be implemented in
©2022 M U L E S O F T — M U L E S O F T . C O M
08
than ever. These high-priority initiatives
require specific technical knowledge, and
enforcing governance standards ensures Tokenization
and Healthcare
additional security while directly reducing
the burden on developers.
It wouldn’t make sense for a doctor
Tokenization
customer data, and protection of that Policy
Organizations have digital estates Testing the security of your APIs is what
comprised of APIs developed in various comes to mind when IT leaders picture an
environments, with several teams having API security strategy. But note that it is the
a hand in creating. For APIs to be secure, last step in our guideline, meaning it can
they must be managed and visible within only be employed after a full-scope API
a single source of truth that includes all security strategy has been enforced.
APIs within the organization. This single
API security testing is the practice of
view must include APIs developed in all
testing to identify vulnerabilities in APIs.
environments, which include APIs built on:
Two types of vulnerabilities should be
→ Cloud platforms using cloud- considered when designing your API
native architecture security testing:
09
indistinguishable from trusted inputs
Additionally, your comprehensive API
→ API-focused attacks: These attacks
discovery strategy must be able to view all
target vulnerabilities specific to APIs
third-party APIs used by the organization,
and include API-specific DDoS attacks
APIs that are part of SaaS products, and
and Man in the Middle attacks
APIs used as part of mobile and web
frameworks. • DDos attacks aim to overwhelm
APIs with hundreds or thousands
A complex digital environment that has
of requests to the API
fallen to API sprawl is almost sure to
have shadow APIs — APIs that have been • Man in the Middle attacks occur
created and are potentially in use but are when the bad actor intercepts and
not visible across the organization. relays information between two
©2022 M U L E S O F T — M U L E S O F T . C O M
If an API is not visible and easy to IT teams can only security test APIs they
discover, it cannot be secured. are aware of. So for security testing to be
effective, it must be employed along with
API security best practices.
TOP 5 API SECURIT Y BEST PR ACTICES
Empower Your IT Team
to Secure APIs
As IT teams move through the five steps, a few core strengths
must be kept in mind. By focusing on these areas, IT leaders can
empower everyone across IT to take ownership of API security.
10
governance standards, human error is
inevitable. As a digital estate begins to
form, some IT teams opt to monitor each
Five key features
API manually.
of Auto-Cataloging CLI
While this approach is appealing, it
that bolster your API
is prone to errors and does not scale
with additional APIs. This is why your security strategy
API security strategy should include an
1. Identify all APIs in a
automated process to ensure visibility into project directory
every API in your digital estate.
2. Identify all new and changed APIs
That's where MuleSoft Auto-Cataloging and update the descriptor file
©2022 M U L E S O F T — M U L E S O F T . C O M
CLI comes in. Auto-Cataloging CLI helps 3. Conditionally trigger the publish
new APIs based on criteria
discover and catalog non-Mule APIs using
CI/CD pipelines when they are created, 4. Conditionally set the asset version
strategy based on criteria
regardless of the environment where they
5. Publish APIs in the descriptor
are developed.
file by running commands by
Using an automated workflow enables a a command prompt or as part
of your CI/CD pipelines or
continuous discovery of all APIs, resulting
custom scripts
Be proactive with security compliance standards extends review
11
What is a
ruleset?
API Governance
Rulesets
Authentication Security ... OWASP API Security Top 10 A ruleset is a collection of rules that can be
applied over the metadata extracted from any
Anypoint Platform Anypoint Platform
The starting point for API security is the OWASP API Security Top 10
API definition itself
Governance
1 Rulesets can be used to create a profile, a
View details in Console
Exchange / Create Profile View details in Exchange
©2022 M U L E S O F T — M U L E S O F T . C O M
Loyalty API
standard. With Anypoint API governance,
Inventory API
a profile can define the rules of a given
2 group of APIs.
Customer API
IT teams need to quickly secure APIs with policies, manage client access, and gain critical
insights into your API programs. And Anypoint API Manager allows you to manage all your
APIs and microservices from one place — no matter where they live.
12
→ Unlock and manage any service securely
K E Y FE ATURE S
with a flexible API gateway
There are two simple questions IT team → Secure any API running anywhere
leaders need to ask that can shed some
→ Extend Anypoint Platform to all APIs
troubling light on API security practices:
→ Build responsive experiences
1. If someone were abusing your
Anypoint Security provides a layered
organization’s APIs, would you know?
approach to secure your application
2. How can you find API vulnerabilities network. These layers work together to
throughout the development life cycle control access to APIs, enforce policies,
and improve API security posture? and proxying all inbound or outbound
traffic to mitigate external threats and
Your API security strategy should take attacks. Anypoint Security also provides a
measures to ensure your solutions detect dedicated endpoint to detect attacks and
vulnerabilities based on rulesets like validate traffic without taxing your network
OWASP, TLS, or security best practices. implementations.
And by employing a runtime protection
Anypoint Security is built with WAF and
framework across the organization, IT
Tokenization to protect against threats:
teams can create policies that control
access to APIs. → Tokenization allows customers to
13
tokenize sensitive data processed by
Mulesoft API Gateway provides built-in
the API. This protects sensitive data like
policies to authenticate, authorize and
credit cards, social security, or other
control access to APIs. IT teams can use
PII and helps prevent data breaches.
API Gateway to configure a robust set
of authentication, security, and traffic → WAF (Web application Firewall)
management policies with zero trust policy adds protection at the
implemented right out of the box. IT teams web application level.
are setting the foundation for additional
security measures by using an API gateway. ©2022 M U L E S O F T — M U L E S O F T . C O M
TOP 5 API SECURIT Y BEST PR ACTICES
CUSTOMER STORY
Identifying
shadow APIs
with Takeda
Pharmaceuticals
Takeda Pharmaceutical Company is one of the top 20 largest pharma
companies in the world, employing almost 50,000 people worldwide and
providing healthcare to millions of patients.
14
→ How to govern all APIs in Mulesoft and AWS
With MuleSoft, Takeda identified 30% additional APIs that had not been
previously categorized.
Read more
TOP 5 API SECURIT Y BEST PR ACTICES
Your API Security Strategy
Shows Your Dependability
15
The stakes have never been higher for IT leaders. With
shrinking budgets and increased expectations, API security
might not seem necessary when business goals are on the
line. However, the risk of putting API security on the back
burner is not worth it. Your team’s reputation is on the
line, and one data breach is enough to create significant
problems — ultimately, customer trust is on the line.
Developing a comprehensive API security strategy is
©2022 M U L E S O F T — M U L E S O F T . C O M
See how MuleSoft helps IT teams Watch and learn how to apply security
secure every API in the digital estate. guardrails in Anypoint Governance.
16
Get to know MuleSoft See the webinar
©2022 M U L E S O F T — M U L E S O F T . C O M
Manage and secure any API built MuleSoft and Okta have joined forces
anywhere with Anypoint Flex Gateway. to support developers across the entire
development cycle
Start securing
Watch now
Salesforce, the global CRM leader, empowers companies of every size and industry to
digitally transform and create a 360° view of their customers. For more information about
Salesforce (NYSE: CRM), visit salesforce.com.