当前位置:网站首页>It is urgent for enterprises to protect API security
It is urgent for enterprises to protect API security
2022-06-30 21:17:00 【Software test network】
lately ,Imperva A new study was published , Revealing the vulnerable API Global costs are rising , Close to 117000 Analysis and estimation of specific network security events , Find out API Security threats lead to 410-750 Billion dollars in losses .

From the results of the study , Large enterprises have API The proportion of relevant safety incidents is higher , The income is at least 1000 A billion dollar enterprise encounters API The possibility of safety problems is a problem for small and medium-sized enterprises 3-4 times . This data shows that , Large enterprises are accelerating their digital transformation , Particularly vulnerable and unprotected API Related safety risk impact .
API As an invisible connecting organization , Enable applications to share data , Finally, the user experience is improved . Studies have shown that , At this stage , Enterprises use API The number is growing rapidly , Nearly half of the enterprises have deployed internally or publicly 50-500 individual API, Some larger enterprises have even deployed more than 1000 Active API.
Many enterprises deploy API It is directly connected to the back-end database storing sensitive data , therefore , Increasingly, cyber attackers will API As a way to access the underlying infrastructure , To steal sensitive information . Today, , Every time 13 In a network event , There is 1 Cause and effect API Unsafe causes , With API The number has multiplied , Expected in the next few years , This proportion will continue to grow .
in addition , The study also found that there are great differences between industries , information technology 、 Industries such as professional services and retail are most likely to suffer from API Related security events .

Imperva Senior vice president of product management 、 General manager of application security department Karl Triebes Express , If not solved API Strategies for security issues , Companies around the world will continue to lose huge amounts of money every year , To alleviate the growing API Related security threats , Enterprises need to be able to discover all of the... In their environment API And make it clear that the data is API Flow trends .
Improve API Security advice :
- Identify and classify flows through each API The data of : Visibility is important for understanding every API The complete architecture of as well as the identification and classification of the data flowing through it in order to assess the risk is crucial ;
- Auto discovery :API Is fast to generate and frequently modified , This makes them a blind spot for many organizations . Through automation , Organizations can eliminate “ ills ”API. Besides , Through automation API detailed list , The security team can clearly see that developers are modifying in production API The situation of ;
- Enable API government : For entities in highly regulated industries ,API The governance model is crucial , Only when visibility exceeds API It is only possible when the end point extends to the underlying payload , Therefore, sensitive data can be fully protected .
Last ,Triebes emphasize , Each and API The root cause of related security events is data , Protect API We need to change our way of thinking , The point is to classify the data , Understand every... In production API How to access data , This approach requires the joint efforts of the security and development teams , Embed security in the development lifecycle .
Unfortunately , Before you do that , Cyber criminals will continue to take advantage of the fragile API, Massive theft of sensitive data .
notes : This article is collected from helpnetsecurity.com, The producer is responsible for its integrity , But not responsible for its authenticity and effectiveness .
Reference article :https://www.helpnetsecurity.com/2022/06/28/properly-securing-apis/
边栏推荐
- 文本生成模型退化怎么办?SimCTG 告诉你答案
- Auto-created primary key used when not defining a primary key
- Oracle 数据库表结构 Excel 导出
- Auto-created primary key used when not defining a primary key
- uniapp-生命周期/路由跳转
- Move blog to CSDN
- 报错:Internal error XFS_WANT_CORRUPTED_GOTO at line 1635 of file fs/xfs/libxfs/xfs_alloc.c.
- 学习总结
- [grade evaluator] how to register a grade evaluator? How many passes?
- What does grade evaluation mean? What is included in the workflow?
猜你喜欢
一文读懂什么是MySQL索引下推(ICP)

ArcGIS构建发布简单路网Network数据服务及Rest调用测试

Qiao NPMS: search for NPM packages

clickhouse原生监控项,系统表描述

Adobe-Photoshop(PS)-脚本开发-去除文件臃肿脚本

多态在代码中的体现

asp. Net core JWT delivery

ArcGIS construction and release of simple road network data service and rest call test

1.微信小程序页面跳转方法总结;2. navigateTo堆栈到十层不跳转问题

Apply for vector bus protocol color picture wallpaper hanging picture, very good!
随机推荐
Coefficient of variation method matlab code [easy to understand]
MySQL introduction, detailed installation steps and usage | dark horse programmer
Failed to configure a DataSource: ‘url‘ attribute is not specified and no embedded datasource could
[untitled]
Understanding polymorphism
What happens when word encounters an error while trying to open a file?
sqlserver 字符串类型转换成小数或者整数类型
变异系数法matlab代码[通俗易懂]
Double solid histogram / double y-axis
sdfsdf
SqlServer 获取字符串中数字,中文及字符部分数据
开发技术-获取10分钟前的时间
Analysis and proposal on the "sour Fox" vulnerability attack weapon platform of the US National Security Agency
侧睡哈哈哈哈
What about degradation of text generation model? Simctg tells you the answer
A small step in code change and a big leap in thinking
MySQL batch update
Peking University ACM problems 1003:hangover
Oracle 数据库表结构 Excel 导出
Side sleep ha ha ha