SaltSecurity-eBook-API Security Protects Bottom Line
SaltSecurity-eBook-API Security Protects Bottom Line
SaltSecurity-eBook-API Security Protects Bottom Line
1
Table of Contents
Introduction 3
Reduce risk and introduce controls 4
Eliminate API blind spots and control gaps 5
Uncover malicious API activity to decrease the potential of a security breach 7
Reduce the possibility of future API issues and application downtime 9
Minimize expense 11
Decrease costs by fixing vulnerable APIs quicker with less friction 12
Eliminate potential costly regulatory fines 14
Protect APIs without adding headcount 16
Increase revenue opportunities 18
Unlock existing security team members to do more value-added projects 19
Accelerate innovation by building and delivering new applications more quickly 21
Monetize your data with secure APIs 23
Final thoughts 25
Additional resources 26
2
Introduction
API attacks have dominated the cybersecurity news cycle lately. In early
2022, T-Mobile made news for an API-based breach of 37 million PII records
of its past and present customers. And later that year, Optus, a major
telecommunications company in Australia, experienced an API security incident
that exposed around 10 million customer records. And API attacks that aren't
quite as ”newsworthy” happen every single day. In fact, the Salt Q3 2022
State of API Security Report showed that 94% of survey respondents had
experienced API security problems in production, with 19% admitting to an API-
related breach.
The Gartner prediction that “by 2022, API abuses will move from an infrequent
to the most-frequent attack vector, resulting in data breaches for enterprise
web applications” has certainly come true.
3
Reduce risk and introduce controls
Today’s security leaders are constantly seeking to close security control gaps and
ultimately reduce their risk. APIs have emerged as a predominant business enabler, and
they increasingly provide unprecedented access throughout business systems, so it’s
become crucial to protect them.
But how do you put a financial metric around risk reduction? One calculation we often
utilize to consider the cost of API risk is:
If you need to compare risk vs. investment value, you would simply divide your breach
risk by the cost of your solution. An organization spending $300K on API security would
enjoy a 6x ROI, for example. The cost/benefit math is almost always eye-opening and
supports the business case for API security.
4
REDUCE RISK
What you don’t know can hurt you. An accurate view of your attack surface is
40 -800
essential to informing your security strategy, but understanding your attack surface is
especially challenging with APIs, in part because they’re constantly changing. In fact, % %
a recent Salt Security survey found that 11% of respondents update their APIs daily,
and 31% update them weekly.
The percentage of previously unknown, undocumented APIs
Before keeping up with the changes, you first need to know about all of the APIs in that Salt typically uncovers in a new customer environment.
your environment, including unknown (shadow) and outdated (zombie) APIs that
should have long since been deprecated. Because APIs are being continually released
and updated - and developers aren’t always great about informing security teams -
you need automatic discovery of new and changed APIs, including customer-facing, Ensure you are aware of all the APIs in your environment
partner-facing (provided and consumed), third-party, and internal APIs.
But knowing an API exists is not enough. You need to know about each API at a
granular level – understanding its intended functionality, assessing its risk, and Understand any personally identifiable (PII) or otherwise
determining if it exposes sensitive data such as personally identifiable information sensitive information that is transferred during these API
(PII). Automatic and continuous discovery helps ensure that your view of the attack calls
surface and sensitive data exposure is comprehensive and remains up to date.
Only by knowing all of the APIs in your environment and what information they expose Make sure these insights stay accurate automatically and
can you understand your true risk and begin to close control gaps. continuously, even as APIs get added or changed
5
REDUCE RISK
• Are you confident you know all of the APIs in your environment? Insurance Industry Review
on Gartner Peer Insights
“Like a lot of companies, our company has increased its
(hint: according to the Salt Security Q3 2022 State of API Security, only 14% 5.0
usage of APIs. Our CISO understood that we needed to
said were very confident that their API inventory was complete) Sep. 8, 2022
get ahead of potential risk by adopting an API security
solution that could protect our assets.”
• What would it cost your organization if your customers’ PII data were
– Application Security Analyst in the Insurance Industry
stolen? (hint: according to the 2021 IBM Cost of a Data Breach report,
organizations lose $180 per lost or stolen PII record)
“One of the solutions we considered needed our
• How would your C-suite and board of directors react if your organization
documentation of our APIs and endpoints, but that’s
suffered a breach because of an unknown or unprotected API?
part of the problem. We’re sure we don’t know about all
our APIs... Now that we have Salt, we’ve got a solid idea
• How much peace of mind would having a complete and accurate API
of what’s out there, and we’re protected in runtime.”
inventory give you?
– Jason Weitzman, Senior Security Engineer
• Do you know how many APIs you have?
• Do you know which APIs handle sensitive data? “Once we deployed the Salt platform, we were surprised
to discover a lot of old APIs still running. We also
• If someone were tampering or trying to abuse your APIs, would you be able discovered some routes for calling those APIs that were
to detect this behavior and block it? not alive anymore.”
6
REDUCE RISK
There is no way around it – study after study shows that security breaches cost
millions. And with APIs being the most frequent attack vector for application attacks
according to Gartner, it simply makes financial sense to do everything you can to
$9.44 in the US
protect your production APIs during runtime.
$4.35M globally
Unlike when they launch more traditional attacks, bad actors targeting APIs use The average cost of a data breach
far more subtle methods to uncover and exploit vulnerabilities. They’re looking for 2022 Cost of a Data Breach, IBM
business logic flaws they can exploit to access data they should not be able to get.
For example, attackers often obtain access to an API – in many cases using valid
credentials they’ve established – and then manipulate elements of an API request to
find a logic gap and exploit it to abuse an API or gain unauthorized access to systems Protect the most frequently attacked element in your
or data. environment – your APIs
Hackers have to do a lot of experimentation to find these business logic flaws, so this
reconnaissance activity can take days and weeks. And the API manipulations used Recognize and thwart API business logic attacks, attack
during recon are often subtle, so you need sophisticated – and accurate – anomaly types your traditional tools like WAFs and API gateways
detection to spot them. Combining big data with AI and ML will enable you to capture are not built to identify
and baseline all API traffic and spot these deviations. Given the duration of API
attacks, you need to apply cloud-scale big data to this problem, so that you have
enough context over time to find these attackers. Tap cloud-scale big data and advanced ML/AI to provide
the context needed to uncover "low and slow" attacks
over time
7
REDUCE RISK
Questions to ask yourself “Salt Security makes it easy for us to mitigate the
risk of API-based exposure when storing and sharing
• Are attackers actively probing your APIs for weaknesses? information online about our customers' financial data.“
(hint: according to the Salt Security Q3 2022 State of API Security report,
malicious traffic currently accounts for 2.1% of all API traffic) – Ryan Melle, CISO
• Have your applications been breached via an API attack? How would you
know? “We’re moving fast and our APIs are changing all the
time, so we count on Salt to understand our users’
• What would you estimate the cost of a breach to be at your organization?
Formerly TripActions
baseline activity and adjust the baseline as we evolve.“
8
REDUCE RISK
Security leaders fear many things, but top on the list are security breaches and
$300,000/hour
resulting downtime (and the certain fallout resulting from both of these). Attacks cost
millions, but downtime costs also add up quickly.
Organizations are in a constant battle to stay ahead of the bad guys. API security The average cost of downtime of hardware and
solutions must analyze APIs to identify gaps before an attacker finds them and enable critical applications
developers to proactively eliminate potential vulnerabilities while simultaneously 2022 Hourly Cost of Downtime Survey, ITIC
sharpening their API security best practices.
After you’ve stopped the “bleeding” by delivering runtime protection of APIs already
in production, it’s time to eliminate future gaps. DevOps teams play an essential role in Take preventative measures to prevent API attacks that
security. Despite everyone’s best efforts, no one can write perfect code, so software can lead to costly downtime of apps and services
releases have security gaps. APIs are no different. Agile development practices and
tight release cycles mean that stretched-thin development teams are constantly
under pressure to meet tight schedules. APIs have the added challenge that most of Find and fix business logic vulnerabilities as early in the
the exploits against them cannot be identified in pre-prod testing. API development lifecycle as possible
So runtime security provides your most critical protection, but you always want to
improve the security posture of your code, so you want your dev teams to identify Learn from security insights gained during runtime to
and eliminate gaps. Today’s leading API security solutions can block fraudsters and harden your existing APIs and build more secure APIs in
learn from their reconnaissance activities to provide insights into the vulnerabilities the future
unique to a given API and remediation details to eliminate those gaps quickly.
9
REDUCE RISK
5.0
potential problems in the APIs we're running. We stay
• What would you estimate the cost of downtime to be at your organization? ahead of the risk that way.“
Sep. 8, 2022
• What application outages would be disastrous to your organization? Which – Application Security Analyst in the Insurance Industry
would be ok?
go down? How long would it take before your business was irreparably vulnerabilities in pre-production and running APIs.
5.0
harmed? We can then review the details and send them to the
Dec. 27, 2022
developers for remediation.”
• What would happen if your board realized you could have implemented a – Security Specialist in the Banking Industry
solution to prevent this issue but prioritized something else instead?
• How can you help your developers build better code based on the insights “[Salt Security] started identifying errors and delivering
your security team uncovers? insights on how to craft better APIs within minutes.”
10
Minimize expense
11
MINIMIZE EXPENSE
API vulnerabilities are different from traditional software vulnerabilities, which is why
47%
traditional vulnerability management tools cannot spot them. API vulnerabilities are
almost always business logic-based, and because each API is unique, they are all in
essence zero-day vulnerabilities.
of organizations have identified vulnerabilities in
But how do you spot these logic-based vulnerabilities? Unfortunately, you can’t production APIs during the past year
simply “test” or “scan” APIs – security teams must see APIs in action and understand Q3 2022 State of API Security, Salt Security
their functional purpose. They also need to understand the behavioral characteristics
of each API parameter and element. A single API endpoint can have thousands of
possible permutations of business and underlying application logic that need to be
vetted and exercised to understand if the endpoint is capable of performing any Shift left and shield right with pre-production API testing
negative behaviors. tuned to your APIs and remediation insights learned in
runtime
Security leaders need a solution that can do “double duty” to discover API
vulnerabilities as early and quickly as possible in the development process and also
reduce the effort required to fix vulnerabilities once discovered. Development teams Turns attackers into penetration testers. See how they
need to work more efficiently and focus limited remediation efforts on high-priority probe your APIs and identify high- priority business logic
vulnerabilities that are being actively exploited in production. Together, security and vulnerabilities
development teams can collaborate to have the most impact and ultimately reduce
time and cost.
Provide developers with detailed information to fix
vulnerabilities found in production
12
MINIMIZE EXPENSE
5.0
vulnerabilities in pre-production and running APIs.
• How quickly are API vulnerabilities being discovered today? We can then review the details and send them to the
Dec. 27, 2022
developers for remediation.”
• Can you identify business logic-based API vulnerabilities?
– Security Specialist at a Banking Institution
• What is your mean time to resolution (MTTR) for API vulnerabilities? What
could go wrong during that period of time?
“DevOps teams don’t want reactive protection – they’re
• How does your MTTR differ between API-related vulnerabilities and other all about proactive detection. Salt provides actionable
applications? info our dev teams can use to make the security of our
APIs inherently better.”
• How much time does it take your developers to research how to fix an API- – Curtis Simpson, CISO
related vulnerability? What else could they be doing with that valuable
time?
• How frequently do you update your APIs? Does that process potentially
add new unknown vulnerabilities to your environment? (hint: according
to the Salt Security Q3 2022 State of API Security report, 42% are making
updates to their APIs at least weekly)
13
MINIMIZE EXPENSE
Organizations must pay attention to API-related and adjacent regulations. Regulators Address API-related regulator questions with ease
often need a complete list of all APIs in an environment as well as classification of
data types within them. Without comprehensive API discovery, it’s difficult to pull
together such an inventory. And it’s nearly impossible when zombie APIs (outdated
but not deprecated APIs) and shadow APIs are involved. You need an API security Quickly get a complete and accurate inventory of APIs to
solution that automatically and continuous inventories APIs and can help you respond provide to auditors and regulators
to requests from auditors and regulators, without scrambling and extensive manual
efforts.
14
MINIMIZE EXPENSE
• What compliance mandates is your company subject to? “We’re seeing an increase in the number of API
transactions, but we’re also seeing an increase in API
• What compliance frameworks would you like to achieve to open new attacks. We have to keep our data secure and our
markets? regulators happy, and we can’t get in the way of digital
transformation – Salt fits right into that.”
• Have you ever been fined by a regulator? If so, how much was the fine?
– Ryan Melle, CISO
• How much would your business suffer should you find yourself out of
compliance with an industry compliance mandate? (hint: according to a
“We’ve also been able to use Salt for compliance and
true cost of compliance study by Ponemon Institute and Globalscape, the
FedRAMP. We were able to submit the full catalog of
average loss of revenue due to a single non-compliance event is $4 million)
all our APIs and where sensitive data was involved to
FedRAMP right out of the Salt platform.”
• Do you know which APIs transmit personally identifiable information? (hint:
according to the Salt Security Q3 2022 State of API Security report, 91% of – Curtis Simpson, CISO
all APIs protected by the Salt contain sensitive PII data)
15
MINIMIZE EXPENSE
Security leaders face the trifecta of tight budgets, already over-tasked teams, and an
industry security skills shortage, so adding headcount to accommodate new security
use cases is rarely an option.
$134,800/year
But even though you can’t add more bodies, that doesn’t mean you can avoid the is the average cybersecurity salary in North America, not
work of implementing new security measures to protect the business. API security including benefits, which equates to $64.81 per hour.
is one of the arenas where organizations simply cannot afford to take a “wait and (ISC)2 Cybersecurity Workforce Study, 2022
see” approach. Security leaders need to ensure that they can address API security
concerns without needing to bring in an army of new team members to support it.
They need to look for solutions that take no more than a few hours a week to manage,
fit within existing workflows, and make the most of the investments in people and Adding an API security discipline should not require
technology you’ve already made. Leveraging advanced artificial intelligence and adding team members
machine learning models to automate manual workloads at scale can make security
teams exponentially more efficient.
Ensure that your API security tools fits within existing
workflows to maximize team efficiency
16
MINIMIZE EXPENSE
• How much time could your team spend per week to undertake a new
security discipline like API security? (hint: Salt customers spend on average
“Deploying the Salt platform took almost no effort – it
4 staff hours per week working in the Salt platform)
integrated quickly with our existing Cloudflare, AWS,
Jira, and other systems. It also started identifying errors
• What is the average salary for a security team members at your
and delivering insights on how to craft better APIs within
organization? Does your budget allow you to add 1 more this fiscal year? 2
minutes.”
more? 0?
– Jason Weitzman, Application Security Engineer
• What operations and management tools and processes do you already
have in place that an API security solution could integrate with to help your
team be more efficient? “We were pleased about full-time employees that we
don't have to hire since Salt's AI/ML is automating manual
• What infrastructure do you already have in place that could help you “jump work.”
start” your API security program by mirroring traffic? API gateway? WAF?
– Banking Customer
Load balancers? Microservices? Cloud traffic?
Retail Industry Review “A very lightweight solution that builds upon existing
on G2 Peer Review Site
integrations, a responsive and open-minded support
Feb. 1, 2022
team, and an easy-to-navigate product.”
– Retail Customer
17
Increase revenue
opportunities
18
INCREASE REVENUE
It’s no secret that security teams are burned out and being asked to do more with 700,000 US
less. Frequent, boring manual tasks only make matters worse. Every day, these teams – and –
have to hunt down information from multiple sources, across many alerts, and then
attempt to stitch them together to see the bigger picture. 3.4M global
shortage of cybersecurity professionals.
Fortunately, advanced ML/AI-based threat detection tools have changed the
(ISC)2 Cybersecurity Workforce Study, 2022
industry in recent years, reducing that monotony and freeing up security teams (and
developers) to do more interesting work. This evolution has happened across all
attack vectors, and API security is no different.
What could your team accomplish if they could continuously and automatically know Clearly see all of the steps an attacker has taken over
all of the APIs in your environment, what typical usage patterns look like, and what weeks and months in one place versus hunting through
sensitive data is exchanged? What if they could automatically baseline API and dozens of alerts
user behavior and recognize unusual and malicious activity, whether it spans hours,
days, weeks, or months – all without manual work? And finally, what if they could get
meaningful alerts that provide all of the information they need to understand what Leverage advanced ML/AI to gain context and reduce
attackers are doing, how they’re doing it, and optionally automatically block their alerts and false positives
activities, even while they’re still doing reconnaissance on your APIs?
This kind of true insight allows security teams to be more efficient and effective, Automatically block malicious activity through your
pinpointing true threats and acting accordingly. And it eliminates the manual effort existing WAF without having to write a single rule
required to spot API attacks, freeing security teams and developers to do more
meaningful work. It also allows security to be the team of “yes let’s do it” versus “no, it
won’t be safe.”
19
INCREASE REVENUE
• Does your team spend too much time chasing down false positives? – Curtis Simpson, CISO
(hint: Salt customers experience a 94% reduction in alerts than they would
with other tools)
Healthcare & Biotech “The Salt platform gives us immediate alerts about
Industry Review
• Would your team be more engaged if they could eliminate boring, manual on Gartner Peer Insights
potential threats so we can respond fast. We especially
tasks? 4.0
like the intelligence of the system. It learns the patterns
Aug. 26, 2022 of our APIs, and it flags anomalies, and by our actions,
• What if your API security solution could recognize true anomalies, after it learns which anomalies are non-issues, so we
determine probable malicious intent, and block users through your WAF or don't waste time chasing phantom threats.”
API gateway? What kind of time would that save (not to mention, how much
– Security Director, Healthcare and Biotechnology
better protected would your organization be)?
Industry
20
INCREASE REVENUE
APIs drive today’s economy, helping organizations bring data together in new ways
54%
to provide the applications and services that consumers expect. Therefore, it’s no
surprise that a recent study featured in Forbes found that businesses that utilize
APIs were more profitable over the past decade, experiencing 12.7% higher growth in
market capitalization growth than those that did not use APIs. APIs allow access to of organizations have slowed the rollout of a new
a company’s most valuable data, helping them efficiently reuse internal capabilities, application due to an API security concern.
share assets, and co-innovate with partners. Q3 2022 State of API Security, Salt Security
Because APIs are so lucrative and essential, delaying API deployment over security
concerns can hurt a company’s bottom line. Top-notch API security practices, on
the other hand, can have the opposite affect and speed up innovation. Today’s Deploy new APIs quickly to open new revenue
sophisticated API security tools can prevent exploits of vulnerable APIs, acting as a opportunities, without worrying about security gaps
safety net and enabling organizations to roll out new software with greater speed
and confidence. These advanced API security platforms can also gain insights from
running traffic to provide remediation advice to harden APIs, so developers can make
current and future APIs more secure. Gain knowledge from unsuccessful attack attempts that
will harden future APIs
21
INCREASE REVENUE
• Have you ever had to roll back an application or temporarily take it offline
over API security concerns? A transportation customer was forced to delay the release
of new payment application that would have provided
• How quickly do you build and deploy new APIs today? How quickly could a markedly better customer experience due to a lack
you be launching them if you could easily demonstrate security readiness? of API security controls. They are now eagerly awaiting
deploying of this application now that they have brought
• How much quicker could you be deploying APIs if you were confident that in Salt to provide the necessary API security controls.
any vulnerabilities missed during development would be countered with
– Transportation Company (now a Salt customer)
comprehensive runtime protection coverage?
• What if your security team could say “yes” and keep up with the API
A digital banking leader was increasingly relying on APIs
development demands of the business rather than being the “no” police?
to deliver innovative products and services, but the
security team couldn’t provide the proper vetting without
slowing down the business. After implementing Salt, the
bank continuously discovers APIs as the business rolls
them out, enabling continuous innovation.
22
INCREASE REVENUE
APIs are essential for companies to support their innovative and revenue-generating
13%
digital transformation initiatives. Open banking services, mobile and online services,
digital information sharing apps, DoorDash, Uber, PayPal, Spotify, Netflix, Tesla – you
name it – they all require APIs to function.
of organizations say that monetizing data is the main
Companies are developing and pushing out APIs faster, and in larger quantities, than driver behind the use of APIs.
ever before. APIs allow companies to build and bring advanced services to market, Q3 2022 State of API Security, Salt Security
23
INCREASE REVENUE
• What revenue streams could your organization benefit from if you could “We want to be a business enabler. We want to enhance
prove your APIs were protected? digital transformation for ourselves and our customers,
and the best way for us to allow business to move
• Which APIs in your organization are already being monetized? How many forward quickly is to stay out of the way, but our top
more could be? priority is keeping everything secure. Salt lets us do
both.”
• What would happen if the APIs you already use to drive revenue were
– Ryan Melle, CISO
breached? What would such an incident do to the confidence of your
business partners?
One prospective customer was not able to introduce
• What would happen if an API attack led to a major breach and outage? How
a new application to provide critical medical treatment
long would it take to recover that lost revenue and lost trust?
because there was concern about the security of the
payment APIs. After deploying Salt, the company was
able to solve its API security challenges and launch the
application, increasing revenue and improving patient
outcomes.
24
Final thoughts
25
Additional resources
Salt loves to help you Get Smart(er) about API security – check out these additional resources.
A CISO’s Essential Gartner® Innovation Insight Q3 2022 State of API API Security for Dummies API Security Evaluation
Guide to API Security for API Protection Security Report Guide
26
Securing Your Innovation
27