当前位置:网站首页>It is urgent for enterprises to protect API security
It is urgent for enterprises to protect API security
2022-06-30 21:17:00 【Software test network】
lately ,Imperva A new study was published , Revealing the vulnerable API Global costs are rising , Close to 117000 Analysis and estimation of specific network security events , Find out API Security threats lead to 410-750 Billion dollars in losses .

From the results of the study , Large enterprises have API The proportion of relevant safety incidents is higher , The income is at least 1000 A billion dollar enterprise encounters API The possibility of safety problems is a problem for small and medium-sized enterprises 3-4 times . This data shows that , Large enterprises are accelerating their digital transformation , Particularly vulnerable and unprotected API Related safety risk impact .
API As an invisible connecting organization , Enable applications to share data , Finally, the user experience is improved . Studies have shown that , At this stage , Enterprises use API The number is growing rapidly , Nearly half of the enterprises have deployed internally or publicly 50-500 individual API, Some larger enterprises have even deployed more than 1000 Active API.
Many enterprises deploy API It is directly connected to the back-end database storing sensitive data , therefore , Increasingly, cyber attackers will API As a way to access the underlying infrastructure , To steal sensitive information . Today, , Every time 13 In a network event , There is 1 Cause and effect API Unsafe causes , With API The number has multiplied , Expected in the next few years , This proportion will continue to grow .
in addition , The study also found that there are great differences between industries , information technology 、 Industries such as professional services and retail are most likely to suffer from API Related security events .

Imperva Senior vice president of product management 、 General manager of application security department Karl Triebes Express , If not solved API Strategies for security issues , Companies around the world will continue to lose huge amounts of money every year , To alleviate the growing API Related security threats , Enterprises need to be able to discover all of the... In their environment API And make it clear that the data is API Flow trends .
Improve API Security advice :
- Identify and classify flows through each API The data of : Visibility is important for understanding every API The complete architecture of as well as the identification and classification of the data flowing through it in order to assess the risk is crucial ;
- Auto discovery :API Is fast to generate and frequently modified , This makes them a blind spot for many organizations . Through automation , Organizations can eliminate “ ills ”API. Besides , Through automation API detailed list , The security team can clearly see that developers are modifying in production API The situation of ;
- Enable API government : For entities in highly regulated industries ,API The governance model is crucial , Only when visibility exceeds API It is only possible when the end point extends to the underlying payload , Therefore, sensitive data can be fully protected .
Last ,Triebes emphasize , Each and API The root cause of related security events is data , Protect API We need to change our way of thinking , The point is to classify the data , Understand every... In production API How to access data , This approach requires the joint efforts of the security and development teams , Embed security in the development lifecycle .
Unfortunately , Before you do that , Cyber criminals will continue to take advantage of the fragile API, Massive theft of sensitive data .
notes : This article is collected from helpnetsecurity.com, The producer is responsible for its integrity , But not responsible for its authenticity and effectiveness .
Reference article :https://www.helpnetsecurity.com/2022/06/28/properly-securing-apis/
边栏推荐
猜你喜欢

《ClickHouse原理解析与应用实践》读书笔记(3)

凤凰架构——架构师的视角

Introduction of 3D Max fine model obj model into ArcGIS pro (II) key points supplement

Iclr'22 spotlight | how to measure the amount of information in neural network weights?

文本识别-SVTR论文解读

DM8:生成DM AWR报告

Text recognition svtr paper interpretation

uniapp-生命周期/路由跳转

Software engineering UML drawing

双立体柱状图/双y轴
随机推荐
双立体柱状图/双y轴
Open source internship experience sharing: openeuler software package reinforcement test
ncat详细介绍(转载)
Gartner聚焦中国低代码发展 UniPro如何践行“差异化”
ArcGIS构建发布简单路网Network数据服务及Rest调用测试
Icml2022 | utility theory of sequential decision making
将博客搬至CSDN
The 16th Heilongjiang Provincial Collegiate Programming Contest
等级测评是什么意思?工作流程包含哪些?
RP原型资源分享-购物类App
凤凰架构——架构师的视角
MySQL advanced 3
【无标题】
What about degradation of text generation model? Simctg tells you the answer
毕业设计
Radar data processing technology
ceshi deces
A small step in code change and a big leap in thinking
Adobe Photoshop (PS) - script development - remove file bloated script
Fletter nested hell? No, constraintlayout to save!